Trusted computing: Providing security for Peer-to-Peer networks

被引:30
作者
Balfe, S [1 ]
Lakhani, AD [1 ]
Paterson, KG [1 ]
机构
[1] Univ London Royal Holloway & Bedford New Coll, Informat Secur Grp, Egham TW20 0EX, Surrey, England
来源
FIFTH IEEE INTERNATIONAL CONFERENCE ON PEER-TO-PEER COMPUTING, PROCEEDINGS | 2005年
关键词
D O I
10.1109/P2P.2005.40
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In this paper, we demonstrate the application of Trusted Computing to securing Peer-to-Peer (P2P) networks. We identify a central challenge in providing many of the security services within these networks, namely the absence of stable verifiable peer identities. We employ the functionalities provided by Trusted Computing technology to establish a pseudonymous authentication scheme for peers and extend this scheme to build secure channels between peers for future communications. In support of our work, we illustrate how commands from the Trusted Computing Croup (TCG) specifications can be used to implement our approach in P2P networks.
引用
收藏
页码:117 / 124
页数:8
相关论文
共 15 条
  • [1] Camenisch J, 2003, LECT NOTES COMPUT SC, V2576, P268
  • [2] CEHN L, 2004, P 11 ACM C COMP COMM
  • [3] CHECHTER SE, 2003, 2 WORKSH EC INF SEC
  • [4] DAMIANI E, 2002, P 9 ACM C COMP COMM, P207
  • [5] Daswani N, 2003, LECT NOTES COMPUT SC, V2572, P1
  • [6] DETWEILER L, 1993, SNAKES MEDUSA INTERN
  • [7] The Sybil attack
    Douceur, JR
    [J]. PEER-TO-PEER SYSTEMS, 2002, 2429 : 251 - 260
  • [8] GARFINKEL T, FLEXIBLE OS SUPPORT
  • [9] *ISO, 1989, 74982 ISOITU
  • [10] RIVEST RL, 1996, CRYPTO 96 RUMPS