Passwords in Peer-to-Peer

被引:0
|
作者
Kreitz, Gunnar [1 ]
Bodriagov, Oleksandr [1 ]
Greschbach, Benjamin [1 ]
Rodriguez-Cano, Guillermo [1 ]
Buchegger, Sonja [1 ]
机构
[1] KTH Royal Inst Technol, Sch Comp Sci & Commun, Stockholm, Sweden
关键词
EFFICIENT;
D O I
暂无
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
One of the differences between typical peer-to-peer (P2P) and client-server systems is the existence of user accounts. While many P2P applications, like public file sharing, are anonymous, more complex services such as decentralized online social networks require user authentication. In these, the common approach to P2P authentication builds on the possession of cryptographic keys. A drawback with that approach is usability when users access the system from multiple devices, an increasingly common scenario. In this work, we present a scheme to support logins based on users knowing a username-password pair. We use passwords, as they are the most common authentication mechanism in services on the Internet today, ensuring strong user familiarity. In addition to password logins, we also present supporting protocols to provide functionality related to password logins, such as resetting a forgotten password via e-mail or security questions. Together, these allow P2P systems to emulate centralized password logins. The results of our performance evaluation indicate that incurred delays are well within acceptable bounds.
引用
收藏
页码:167 / 178
页数:12
相关论文
共 50 条
  • [21] Peer-to-peer rating
    Bickson, Danny
    Malkhi, Dahlia
    Zhou, Lidong
    P2P: SEVENTH INTERNATIONAL CONFERENCE ON PEER-TO-PEER COMPUTING, PROCEEDINGS, 2007, : 211 - +
  • [22] Peer-to-Peer Markets
    Einav, Liran
    Farronato, Chiara
    Levin, Jonathan
    ANNUAL REVIEW OF ECONOMICS, VOL 8, 2016, 8 : 615 - 635
  • [23] Peer-to-Peer Systems
    Steinmetz, Ralf
    Liebau, Nicolas
    Wehrle, Klaus
    IT-INFORMATION TECHNOLOGY, 2007, 49 (05): : 269 - 271
  • [24] Peer-to-peer is not for everyone
    Flammia, G
    IEEE INTELLIGENT SYSTEMS & THEIR APPLICATIONS, 2001, 16 (03): : 78 - 79
  • [25] Peer NAT Proxies for Peer-to-Peer Games
    Seah, Daryl
    Leong, Wai Kay
    Yang, Qingwei
    Leong, Ben
    Razeen, Ali
    2009 8TH ANNUAL WORKSHOP ON NETWORK AND SYSTEMS SUPPORT FOR GAMES (NETGAMES 2009), 2009,
  • [26] Peer Discovery in peer-to-peer anonymity networks
    Lu, Tianbo
    Fang, Binxing
    Cheng, Xueqi
    Sun, Yuzhong
    PROCEEDINGS OF THE 2006 IEEE INTERNATIONAL CONFERENCE ON NETWORKING, SENSING AND CONTROL, 2006, : 131 - 136
  • [27] Peer Regulation in a Peer-to-Peer Business Model
    Miao, Li
    Lin, Meizhen
    Wei, Wei
    Moon, Hyoungeun
    JOURNAL OF HOSPITALITY & TOURISM RESEARCH, 2023, 47 (05) : 908 - 926
  • [28] Supervised peer-to-peer systems
    Kothapalli, K
    Scheideler, C
    8TH INTERNATIONAL SYMPOSIUM ON PARALLEL ARCHITECTURES, ALGORITHMS AND NETWORKS, PROCEEDINGS, 2005, : 188 - 193
  • [29] Peer-to-peer: reply to the editor
    Moser, B
    NATURE IMMUNOLOGY, 2001, 2 (07) : 567 - 567
  • [30] Peer-to-Peer search and scalability
    Stiller, B
    Mischke, J
    PEER-TO-PEER SYSTEMS AND APPLICATIONS, 2005, 3485 : 269 - 288