Certificate Revocation List Distribution System for the KAD Network

被引:2
作者
Caubet, Juan [1 ]
Ganan, Carlos [1 ]
Esparza, Oscar [1 ]
Munoz, Jose L. [1 ]
Mata-Diaz, Jorge [1 ]
Alins, Juanjo [1 ]
机构
[1] UPC, Dept Telemat Engn ENTEL, Barcelona, Spain
关键词
Certificate Revocation List (CRL); structured peer-to-peer (P2P) overlay; KAD network; CHORD;
D O I
10.1093/comjnl/bxt037
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Many peer-to-peer (p2p) overlays require certain security services which could be provided through a Public Key Infrastructure. However, these infrastructures are bound up with a revocation system, such as Certificate Revocation Lists (CRLs). A system with a client/server structure, where a Certificate Authority plays a role of a central server, is prone to suffer from common problems of a single point of failure. If only one Authority has to distribute the whole CRL to all users, perhaps several millions in a structured p2p overlay, a bottleneck problem appears. Moreover, in these networks, users often have a set of pseudonyms that are bound to a certificate, which gives rise to two additional issues: issuing the CRL and assuring its freshness. On the one hand, the list size grows exponentially with the number of network users. On the other hand, these lists must be updated more frequently; otherwise the revocation data will not be fresh enough. To solve these problems, we propose a new distributed revocation system for the Kademlia network. Our system distributes CRLs using the overlay itself and, to not compromise the storage of nodes, lists are divided into segments. This mechanism improves the accessibility, increases the availability and guarantees the freshness of the revocation data.
引用
收藏
页码:273 / 280
页数:8
相关论文
共 15 条
  • [1] Trustworthy Group Making Algorithm in Distributed Systems
    Aikebaier, Ailixier
    Enokido, Tomoya
    Takizawa, Makoto
    [J]. HUMAN-CENTRIC COMPUTING AND INFORMATION SCIENCES, 2011, 1 : 1 - 15
  • [2] [Anonymous], 1999, RFC 2560
  • [3] Chord-PKI: A distributed trust infrastructure based on P2P networks
    Avramidis, Agapios
    Kotzanikolaou, Panayiotis
    Douligeris, Christos
    Burmester, Mike
    [J]. COMPUTER NETWORKS, 2012, 56 (01) : 378 - 398
  • [4] Beth T., 1994, Computer Security - ESORICS 94. Third European Symposium on Research in Computer Security. Proceedings, P3
  • [5] Chen R., 2002, POBLANO DISTRIBUTED
  • [6] Cooper D., 2008, Technical report, DOI 10.17487/rfc5280
  • [7] Elmisery AM, 2011, J CONVERGENCE, V2, P33
  • [8] Gao Ying, 2009, 2009 2nd IEEE International Conference on Computer Science and Information Technology (ICCSIT 2009), P574, DOI 10.1109/ICCSIT.2009.5234627
  • [9] Modeling group trust for peer-to-peer access control
    Gummadi, A
    Yoon, JP
    [J]. 15TH INTERNATIONAL WORKSHOP ON DATABASE AND EXPERT SYSTEMS APPLICATIONS, PROCEEDINGS, 2004, : 971 - 978
  • [10] Theoretical Analysis of Issuing Mechanism in Distributive Digital Certificate Revocation List
    Huang, Jun
    Wang, Zhao
    Qiu, Zhao
    Chen, Mingrui
    [J]. ICCEE 2008: PROCEEDINGS OF THE 2008 INTERNATIONAL CONFERENCE ON COMPUTER AND ELECTRICAL ENGINEERING, 2008, : 199 - +