Flexible Security Configuration & Deployment in Peer-to-Peer Applications

被引:2
|
作者
Detsch, Andre [1 ]
Gaspary, Luciano Paschoal [1 ]
Barcellos, Marinho Pilla [1 ]
Sanchez, Ricardo Nabinger [1 ]
机构
[1] Univ Vale Rio Sinos UNISINOS, PIPCA, Sao Leopoldo, Brazil
关键词
D O I
10.1109/NOMS.2006.1687552
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The widespread adoption or P2P applications fit environments beyond ordinary file sharing demands the fulfillment or several security requirements. Important steps have been taken towards security in P2P systems, with relevant mechanisms being proposed in the past to address specific vulnerabilities. However, existing approaches lack flexibility, since they do not (include enough mechanisms to) tackle it wide range of requirements ill all integrated fashion. In addition, they oblige the user/application to manipulate a complex programming Interface, as well its going through a cumbersome configuration process. To address these issues, we present P2PSL (P2P Security Layer), which allows gradual and flexible integration or security functionality into P2P applications. To show concept kind technical feasibility, we have implemented P2PSL, assessed the overhead it induces, and Incorporated the layer into a P2P-based grid computing infrastructure.
引用
收藏
页码:209 / 219
页数:11
相关论文
共 50 条
  • [1] Versatile Configuration and Deployment of Realistic Peer-to-Peer Scenarios
    Milescu, George
    Deaconescu, Razvan
    Tapus, Nicolae
    PROCEEDINGS OF ICNS 2011: THE SEVENTH INTERNATIONAL CONFERENCE ON NETWORKING AND SERVICES, 2011, : 262 - 267
  • [2] Security applications of peer-to-peer networks
    Vlachos, V
    Androutsellis-Theotokis, S
    Spinellis, D
    COMPUTER NETWORKS, 2004, 45 (02) : 195 - 205
  • [3] Flexible security in peer-to-peer applications: Enabling new opportunities beyond file sharing
    Gaspary, Luciano Paschoal
    Barcellos, Marinho P.
    Detsch, Andre
    Antunes, Rodolfo S.
    COMPUTER NETWORKS, 2007, 51 (17) : 4797 - 4815
  • [4] Component deployment using a peer-to-peer overlay
    Frénot, S
    Royon, Y
    COMPONENT DEPLOYMENT, PROCEEDINGS, 2005, 3798 : 33 - 36
  • [5] Modeling of peer-to-peer traffic caching deployment
    Ye, Mingjiang
    Wu, Jianping
    Xu, Ke
    Qinghua Daxue Xuebao/Journal of Tsinghua University, 2009, 49 (01): : 110 - 113
  • [6] A definition of Peer-to-Peer networking for the classification of Peer-to-Peer architectures and applications
    Schollmeier, R
    FIRST INTERNATIONAL CONFERENCE ON PEER-TO-PEER COMPUTING, 2002, : 101 - 102
  • [7] Peer-to-peer for collaborative applications
    Cugola, G
    Picco, GP
    22ND INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS WORKSHOP, PROCEEDINGS, 2002, : 359 - 364
  • [8] Mobility helps peer-to-peer security
    Capkun, S
    Hubaux, JP
    Buttyán, L
    IEEE TRANSACTIONS ON MOBILE COMPUTING, 2006, 5 (01) : 43 - 51
  • [9] Security issues in peer-to-peer systems
    Thatipelli, S
    Moharrum, M
    Mukkamala, R
    7TH WORLD MULTICONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL XVI, PROCEEDINGS: SYSTEMICS AND INFORMATION SYSTEMS, TECHNOLOGIES AND APPLICATION, 2003, : 114 - 119
  • [10] A survey of peer-to-peer security issues
    Wallach, DS
    SOFTWARE SECURITY - THEORIES AND SYSTEMS, 2003, 2609 : 42 - 57