Leveraging Identity-Based Cryptography for Node ID Assignment in Structured P2P Systems

被引:20
|
作者
Butler, Kevin R. B. [1 ]
Ryu, Sunam [2 ]
Traynor, Patrick [3 ]
McDaniel, Patrick D. [1 ]
机构
[1] Penn State Univ, Dept Comp Sci & Engn, University Pk, PA 16802 USA
[2] Def Secur Command, Gwacheon Si, Gyeonggi Do, South Korea
[3] Georgia Inst Technol, Sch Comp Sci, Atlanta, GA 30332 USA
关键词
Network protocols; peer-to-peer; distributed systems; cryptographic controls;
D O I
10.1109/TPDS.2008.249
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Structured peer-to-peer (P2P) systems have grown enormously because of their scalability, efficiency, and reliability. These systems assign a unique identifier to each user and object. However, current assignment schemes allow an adversary to carefully select user IDs and/or simultaneously obtain many pseudo-identities-ultimately leading to an ability to disrupt the P2P system in very targeted and dangerous ways. In this paper, we propose novel ID assignment protocols based on identity-based cryptography. This approach permits the acquisition of node IDs to be tightly regulated without many of the complexities and costs associated with traditional certificate solutions. We broadly consider the security requirements of ID assignment and present three protocols representing distinct threat and trust models. A detailed empirical study of the protocols is given. Our analysis shows that the cost of our identity-based protocols is nominal, and that the associated identity services can scale to millions of users using a limited number of servers.
引用
收藏
页码:1803 / 1815
页数:13
相关论文
共 50 条
  • [31] A novel state cache scheme in structured P2P systems
    Cai, HL
    Jun, W
    Dong, L
    Deogun, JS
    JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 2005, 65 (02) : 154 - 168
  • [32] Leveraging duplicates to improve file availability of P2P storage systems
    Qu, M
    Dai, YF
    Xiao, MZ
    GRID AND COOPERATIVE COMPUTING, PT 1, 2004, 3032 : 456 - 459
  • [33] A Clone Node Protocol for Reducing Maintenance Cost of Structured P2P System
    Zhang, Yu
    Cao, Yuanda
    Cheng, Baodong
    FIRST IITA INTERNATIONAL JOINT CONFERENCE ON ARTIFICIAL INTELLIGENCE, PROCEEDINGS, 2009, : 84 - 87
  • [34] ID mapping attacks in P2P networks
    Cerri, D
    Ghioni, A
    Paraboschi, S
    Tiraboschi, S
    GLOBECOM '05: IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, VOLS 1-6: DISCOVERY PAST AND FUTURE, 2005, : 1785 - 1790
  • [35] Efficient ID-based Threshold Signature in P2P and MANETs
    Liu Zhiyuan
    Feng Yunfang
    Li Jun
    2008 4TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-31, 2008, : 4884 - +
  • [36] A structured P2P network based on the small world phenomenon
    Jie Xu
    Hai Jin
    The Journal of Supercomputing, 2009, 48 : 264 - 285
  • [37] A structured P2P network based on the small world phenomenon
    Xu, Jie
    Jin, Hai
    JOURNAL OF SUPERCOMPUTING, 2009, 48 (03): : 264 - 285
  • [38] FCAN: A structured P2P system based on content query
    Wang, Jing
    Yang, Shoubao
    Gao, Ying
    Guo, Leitao
    GCC 2005: FIFTH INTERNATIONAL CONFERENCE ON GRID AND COOPERATIVE COMPUTING, PROCEEDINGS, 2006, : 113 - +
  • [39] A Framework for Mobile Applications based on a structured P2P Overlay
    Kolberg, Mario
    Wilson, Michael
    Blunn, Martin
    Magill, Evan
    Burtwistle, Peter
    2009 6TH IEEE CONSUMER COMMUNICATIONS AND NETWORKING CONFERENCE, VOLS 1 AND 2, 2009, : 46 - +
  • [40] HRing: A structured P2P overlay based on Harmonic Series
    Zhuge, Hai
    Chen, Xue
    Sun, Xiaoping
    Yao, Erlin
    IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2008, 19 (02) : 145 - 158