Trusted computing: Providing security for Peer-to-Peer networks

被引:30
|
作者
Balfe, S [1 ]
Lakhani, AD [1 ]
Paterson, KG [1 ]
机构
[1] Univ London Royal Holloway & Bedford New Coll, Informat Secur Grp, Egham TW20 0EX, Surrey, England
关键词
D O I
10.1109/P2P.2005.40
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In this paper, we demonstrate the application of Trusted Computing to securing Peer-to-Peer (P2P) networks. We identify a central challenge in providing many of the security services within these networks, namely the absence of stable verifiable peer identities. We employ the functionalities provided by Trusted Computing technology to establish a pseudonymous authentication scheme for peers and extend this scheme to build secure channels between peers for future communications. In support of our work, we illustrate how commands from the Trusted Computing Croup (TCG) specifications can be used to implement our approach in P2P networks.
引用
收藏
页码:117 / 124
页数:8
相关论文
共 50 条
  • [1] Secure peer-to-peer networks for trusted collaboration
    Hamlen, Kevin W.
    Thuraisingham, Bhavani
    2007 INTERNATIONAL CONFERENCE ON COLLABORATIVE COMPUTING: NETWORKING, APPLICATIONS AND WORKSHARING, 2008, : 58 - 63
  • [2] Security applications of peer-to-peer networks
    Vlachos, V
    Androutsellis-Theotokis, S
    Spinellis, D
    COMPUTER NETWORKS, 2004, 45 (02) : 195 - 205
  • [3] Trusted information exchange in peer-to-peer mobile social networks
    Qureshi, Basit
    Min, Geyong
    Kouvatsos, Demetres
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2012, 24 (17): : 2055 - 2068
  • [4] PowerTrust: A robust and scalable reputation system for trusted Peer-to-Peer computing
    Zhou, Runfang
    Hwang, Kai
    IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2007, 18 (04) : 460 - 473
  • [5] A Peer-to-Peer Resource Sharing Scheme Using Trusted Computing Technology
    CHEN Lu1
    2. State Key Laboratory of Software Engineering
    3. Department of Information Security
    WuhanUniversityJournalofNaturalSciences, 2008, (05) : 523 - 527
  • [6] A Lightweight Implementation of Security for Peer-to-Peer Networks
    Margariti, S. V.
    Meletiou, G.
    Stergiou, E.
    Vasiliadis, D. C.
    Rizos, G. E.
    INTERNATIONAL ELECTRONIC CONFERENCE ON COMPUTER SCIENCE, 2008, 1060 : 397 - 401
  • [7] Peer-to-Peer Computing
    Iamnitchi, Adriana
    Trunfio, Paolo
    Ledlie, Jonathan
    Schintke, Florian
    EURO-PAR 2010 PARALLEL PROCESSING, PT I, 2010, 6271 : 444 - +
  • [8] An Adaptive Trusted Request and Authorization Model for Mobile Peer-to-Peer Networks
    Li, Zhiyuan
    Bi, Junlei
    2013 IEEE 15TH INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPUTING AND COMMUNICATIONS & 2013 IEEE INTERNATIONAL CONFERENCE ON EMBEDDED AND UBIQUITOUS COMPUTING (HPCC_EUC), 2013, : 1274 - 1280
  • [9] Providing Interoperability of eHealth Communities Through Peer-to-Peer Networks
    Kilic, Ozgur
    Dogac, Asuman
    Eichelberg, Marco
    IEEE TRANSACTIONS ON INFORMATION TECHNOLOGY IN BIOMEDICINE, 2010, 14 (03): : 846 - 853
  • [10] DHTrust: A Robust and Distributed Reputation System for Trusted Peer-to-Peer Networks
    Liu, Yaqiong
    Xue, Weilian
    Li, Keqiu
    Chi, Zhongxian
    Min, Geyong
    Qu, Wenyu
    2010 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE GLOBECOM 2010, 2010,