Leveraging Identity-Based Cryptography for Node ID Assignment in Structured P2P Systems

被引:20
|
作者
Butler, Kevin R. B. [1 ]
Ryu, Sunam [2 ]
Traynor, Patrick [3 ]
McDaniel, Patrick D. [1 ]
机构
[1] Penn State Univ, Dept Comp Sci & Engn, University Pk, PA 16802 USA
[2] Def Secur Command, Gwacheon Si, Gyeonggi Do, South Korea
[3] Georgia Inst Technol, Sch Comp Sci, Atlanta, GA 30332 USA
关键词
Network protocols; peer-to-peer; distributed systems; cryptographic controls;
D O I
10.1109/TPDS.2008.249
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Structured peer-to-peer (P2P) systems have grown enormously because of their scalability, efficiency, and reliability. These systems assign a unique identifier to each user and object. However, current assignment schemes allow an adversary to carefully select user IDs and/or simultaneously obtain many pseudo-identities-ultimately leading to an ability to disrupt the P2P system in very targeted and dangerous ways. In this paper, we propose novel ID assignment protocols based on identity-based cryptography. This approach permits the acquisition of node IDs to be tightly regulated without many of the complexities and costs associated with traditional certificate solutions. We broadly consider the security requirements of ID assignment and present three protocols representing distinct threat and trust models. A detailed empirical study of the protocols is given. Our analysis shows that the cost of our identity-based protocols is nominal, and that the associated identity services can scale to millions of users using a limited number of servers.
引用
收藏
页码:1803 / 1815
页数:13
相关论文
共 50 条
  • [21] Study on overlay matching in structured P2P systems
    Chen, Chunhua
    Jisuanji Gongcheng/Computer Engineering, 2006, 32 (21): : 121 - 123
  • [22] P2P email encryption by an identity-based one-way group key agreement protocol
    Yeh, Jyh-Haw
    Zeng, Fiona
    Long, Thomas
    2014 20TH IEEE INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED SYSTEMS (ICPADS), 2014, : 760 - 767
  • [23] A prediction-based fair replication algorithm in structured P2P systems
    Zhu, Xianshu
    Zhang, Dafang
    Li, Wenjia
    Huang, Kun
    AUTONOMIC AND TRUSTED COMPUTING, PROCEEDINGS, 2007, 4610 : 499 - +
  • [24] P2P based Internet services integrated with Open ID
    Chen Y.-L.
    Yuan S.-M.
    Journal of Convergence Information Technology, 2011, 6 (02) : 319 - 328
  • [25] Resource Assignment in Box-Based P2P Video-on-Demand Systems
    Pedro Munoz-Gea, Juan
    Malgosa-Sanahuja, Josemaria
    Manzanares-Lopez, Pilar
    Jose Pinero-Escuer, Pedro
    PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON ADVANCES IN P2P SYSTEMS (AP2PS 2010), 2010, : 38 - 43
  • [26] A Small World Routing Model for Structured P2P Systems
    Huang, Guimin
    Zhou, Ya
    Zhang, Yanchun
    ISISE 2008: INTERNATIONAL SYMPOSIUM ON INFORMATION SCIENCE AND ENGINEERING, VOL 1, 2008, : 632 - +
  • [27] Decreasing System Load by Caching in Structured P2P Systems
    Xiong, Wei
    Xie, Dong-Qing
    Zhou, Zai-Hong
    Liu, Jie
    HPCC 2008: 10TH IEEE INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPUTING AND COMMUNICATIONS, PROCEEDINGS, 2008, : 234 - +
  • [28] The exclusion of malicious routing peers in structured P2P systems
    Rob, Bong-Soo
    Kwon, O-Hoon
    Flong, Sung Je
    Kim, Jong
    AGENTS AND PEER-TO-PEER COMPUTING, 2008, 4461 : 43 - 50
  • [29] A Balanced Consistency Maintenance Protocol for Structured P2P Systems
    Hu, Yi
    Feng, Min
    Bhuyan, Laxmi N.
    2010 PROCEEDINGS IEEE INFOCOM, 2010,
  • [30] SCOPE: Scalable consistency maintenance in structured P2P systems
    Chen, X
    Ren, SS
    Wang, HN
    Zhang, XD
    IEEE INFOCOM 2005: THE CONFERENCE ON COMPUTER COMMUNICATIONS, VOLS 1-4, PROCEEDINGS, 2005, : 1502 - 1513