Passwords in Peer-to-Peer

被引:0
|
作者
Kreitz, Gunnar [1 ]
Bodriagov, Oleksandr [1 ]
Greschbach, Benjamin [1 ]
Rodriguez-Cano, Guillermo [1 ]
Buchegger, Sonja [1 ]
机构
[1] KTH Royal Inst Technol, Sch Comp Sci & Commun, Stockholm, Sweden
关键词
EFFICIENT;
D O I
暂无
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
One of the differences between typical peer-to-peer (P2P) and client-server systems is the existence of user accounts. While many P2P applications, like public file sharing, are anonymous, more complex services such as decentralized online social networks require user authentication. In these, the common approach to P2P authentication builds on the possession of cryptographic keys. A drawback with that approach is usability when users access the system from multiple devices, an increasingly common scenario. In this work, we present a scheme to support logins based on users knowing a username-password pair. We use passwords, as they are the most common authentication mechanism in services on the Internet today, ensuring strong user familiarity. In addition to password logins, we also present supporting protocols to provide functionality related to password logins, such as resetting a forgotten password via e-mail or security questions. Together, these allow P2P systems to emulate centralized password logins. The results of our performance evaluation indicate that incurred delays are well within acceptable bounds.
引用
收藏
页码:167 / 178
页数:12
相关论文
共 50 条
  • [31] Peer-to-peer as an infrastructure service
    Jiangchuan Liu
    Ke Xu
    Yongqiang Xiong
    Dongchao Ma
    Kai Shuang
    Peer-to-Peer Networking and Applications, 2014, 7 : 456 - 458
  • [32] Making Peer-to-Peer pay
    Sewhuk, D
    TECHNOLOGY REVIEW, 2003, 106 (06) : 14 - 15
  • [33] Wireless goes peer-to-peer?
    Dornan, Andy
    Network Magazine, 2003, 18 (09): : 44 - 47
  • [34] Peer-to-peer internet television
    Hulsen, P
    Vlemmix, E
    Baker, K
    FIRST INTERNATIONAL CONFERENCE ON AUTOMATED PRODUCTION OF CROSS MEDIA CONTENT FOR MULTI-CHANNEL DISTRIBUTION, PROCEEDINGS, 2005, : 267 - 270
  • [35] Reputation in peer-to-peer communication
    Hussain, FK
    Chang, E
    Dillon, T
    IC'04: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON INTERNET COMPUTING, VOLS 1 AND 2, 2004, : 269 - 271
  • [36] Peer-to-peer cooperative driving
    Bejan, A
    Lawrence, R
    PROCEEDINGS OF THE 17TH INTERNATIONAL SYMPOSIUM ON COMPUTER AND INFORMATION SCIENCES, 2003, : 259 - 263
  • [37] A new perspective on peer-to-peer
    Flammia, G
    IEEE INTELLIGENT SYSTEMS, 2002, 17 (06): : 78 - 79
  • [38] On peer-to-peer media streaming
    Xu, DY
    Hefeeda, M
    Hambrusch, S
    Bhargava, B
    22ND INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS, PROCEEDINGS, 2002, : 363 - 371
  • [39] Peer-to-Peer Networks 2
    Lin Yu 1
    2. Peking University
    ZTECommunications, 2006, (02) : 61 - 64
  • [40] Trustworthiness in Peer-to-Peer Systems
    Nakahira, Shota
    Nakamura, Shigenari
    Enokido, Tomoya
    Takizawa, Makoto
    PROCEEDINGS 2015 18TH INTERNATIONAL CONFERENCE ON NETWORK-BASED INFORMATION SYSTEMS (NBIS 2015), 2015, : 652 - 657