Leveraging Identity-Based Cryptography for Node ID Assignment in Structured P2P Systems

被引:20
|
作者
Butler, Kevin R. B. [1 ]
Ryu, Sunam [2 ]
Traynor, Patrick [3 ]
McDaniel, Patrick D. [1 ]
机构
[1] Penn State Univ, Dept Comp Sci & Engn, University Pk, PA 16802 USA
[2] Def Secur Command, Gwacheon Si, Gyeonggi Do, South Korea
[3] Georgia Inst Technol, Sch Comp Sci, Atlanta, GA 30332 USA
关键词
Network protocols; peer-to-peer; distributed systems; cryptographic controls;
D O I
10.1109/TPDS.2008.249
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Structured peer-to-peer (P2P) systems have grown enormously because of their scalability, efficiency, and reliability. These systems assign a unique identifier to each user and object. However, current assignment schemes allow an adversary to carefully select user IDs and/or simultaneously obtain many pseudo-identities-ultimately leading to an ability to disrupt the P2P system in very targeted and dangerous ways. In this paper, we propose novel ID assignment protocols based on identity-based cryptography. This approach permits the acquisition of node IDs to be tightly regulated without many of the complexities and costs associated with traditional certificate solutions. We broadly consider the security requirements of ID assignment and present three protocols representing distinct threat and trust models. A detailed empirical study of the protocols is given. Our analysis shows that the cost of our identity-based protocols is nominal, and that the associated identity services can scale to millions of users using a limited number of servers.
引用
收藏
页码:1803 / 1815
页数:13
相关论文
共 50 条
  • [1] Leveraging Certificate-less Public Key Cryptosystem for Node ID Assignment in Structured P2P Systems
    Yang, Dengqi
    Yang, Jian
    Chen, Benhui
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2015, 9 (08): : 397 - 408
  • [2] An identity-based security mechanism for P2P VoIP
    Jiang, Hua
    Jia, Yongxing
    Du, Xianru
    Wang, Weizhi
    2010 IEEE INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND INFORMATION SECURITY (WCNIS), VOL 1, 2010, : 481 - +
  • [3] An identity-based approach to secure P2P applications with Likir
    Aiello, Luca Maria
    Milanesio, Marco
    Ruffo, Giancarlo
    Schifanella, Rossano
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2011, 4 (04) : 420 - 438
  • [4] An identity-based approach to secure P2P applications with Likir
    Luca Maria Aiello
    Marco Milanesio
    Giancarlo Ruffo
    Rossano Schifanella
    Peer-to-Peer Networking and Applications, 2011, 4 : 420 - 438
  • [5] ID Repetition in Structured P2P Networks
    Yu, Jie
    Li, Zhoujun
    Xiao, Peng
    Fang, Chengfang
    Xu, Jia
    Chang, Ee-Chien
    COMPUTER JOURNAL, 2011, 54 (06): : 962 - 975
  • [6] P2P Social Network with Partitioned Dynamic Identity-Based Broadcast Encryption
    Meligy, Ali
    Abdo, Azzaa A.
    Alazab, Ayman
    ICENCO 2016 - 2016 12TH INTERNATIONAL COMPUTER ENGINEERING CONFERENCE (ICENCO) - BOUNDLESS SMART SOCIETIES, 2016, : 164 - 168
  • [7] Statistics-based ID Management for Load Balancing in Structured P2P Networks
    Warneke, Daniel
    Dannewitz, Christian
    2009 IEEE 34TH CONFERENCE ON LOCAL COMPUTER NETWORKS (LCN 2009), 2009, : 273 - +
  • [8] Fault resilience of structured P2P systems
    Liu, ZY
    Chen, GH
    Yuan, CF
    Lu, SL
    Xu, CZ
    WEB INFORMATION SYSTEMS - WISE 2004, PROCEEDINGS, 2004, 3306 : 736 - 741
  • [9] Load balancing in structured P2P systems
    Rao, A
    Lakshminarayanan, K
    Surana, S
    Karp, P
    Stoica, I
    PEER-TO-PEER SYSTEMS II, 2003, 2735 : 68 - 79
  • [10] RIAPPA: a Robust Identity Assignment Protocol for P2P overlays
    Caubet, Juan
    Esparza, Oscar
    Munoz, Jose L.
    Alins, Juanjo
    Mata-Diaz, Jorge
    SECURITY AND COMMUNICATION NETWORKS, 2014, 7 (12) : 2743 - 2760