An identity-based approach to secure P2P applications with Likir

被引:4
作者
Aiello, Luca Maria [1 ]
Milanesio, Marco [1 ]
Ruffo, Giancarlo [1 ]
Schifanella, Rossano [1 ]
机构
[1] Univ Turin, Dept Comp Sci, I-10149 Turin, Italy
关键词
DHT; Routing poisoning; Sybil attack; Storage attacks; Distributed social networking systems;
D O I
10.1007/s12083-010-0099-6
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Structured overlay networks are highly susceptible to attacks aimed at subverting their structure or functionalities. Although many secure architectural design proposals have been presented in the past, a widely accepted and comprehensive solution is lacking. Likir (Layered Identity-based Kademlia-like Infrastructure) is our solution for implementing a secure Peer-to-Peer network based on a Distributed Hash Table. Our purpose is to focus on three main goals: (1) providing security services and a secure overlay infrastructure against the vast majority of security threats on P2P systems, (2) dynamically creating a bridge between randomly generated peer identifiers and user identities, and (3) supplying the developer with a middleware API that can easily deal with peers' identities. Placing the emphasis on user identity results in a highly secure distributed framework which is very fitting for privacy-aware and efficient implementation of identity-based applications like social networking applications. Detailed security analysis and performance evaluation are provided. Moreover, an implementation of Likir is introduced and a case study is presented in order to show its practical use in a real-life example.
引用
收藏
页码:420 / 438
页数:19
相关论文
共 50 条
  • [1] ABBAS S, 2009, WETICE 09, P93
  • [2] AIELLO LM, 2010, SESOC 10, P594
  • [3] Tempering Kademlia with a Robust Identity Based System
    Aiello, Luca Maria
    Milanesio, Marco
    Ruffo, Giancarlo
    Schifanella, Rossano
    [J]. P2P'08: EIGHTH INTERNATIONAL CONFERENCE ON PEER-TO-PEER COMPUTING, PROCEEDINGS, 2008, : 30 - 39
  • [4] [Anonymous], 2005, IEEE INFOCOM MIN
  • [5] [Anonymous], 2002, P 1 INT WORKSH PEER
  • [6] BAUMGART I, 2007, P P2P NVE 2007 CONJ, V2, DOI DOI 10.1109/ICPADS.2007.4447808
  • [7] Bender A., 2009, INFOCOM
  • [8] BIRD R, 1992, SYSTEMATIC DESIGN FA
  • [9] Identity-based encryption from the Weil pairing
    Boneh, D
    Franklin, M
    [J]. SIAM JOURNAL ON COMPUTING, 2003, 32 (03) : 586 - 615
  • [10] BRUNNER R, 2006, THESIS I EURECOM