Flexible Security Configuration & Deployment in Peer-to-Peer Applications

被引:2
|
作者
Detsch, Andre [1 ]
Gaspary, Luciano Paschoal [1 ]
Barcellos, Marinho Pilla [1 ]
Sanchez, Ricardo Nabinger [1 ]
机构
[1] Univ Vale Rio Sinos UNISINOS, PIPCA, Sao Leopoldo, Brazil
关键词
D O I
10.1109/NOMS.2006.1687552
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The widespread adoption or P2P applications fit environments beyond ordinary file sharing demands the fulfillment or several security requirements. Important steps have been taken towards security in P2P systems, with relevant mechanisms being proposed in the past to address specific vulnerabilities. However, existing approaches lack flexibility, since they do not (include enough mechanisms to) tackle it wide range of requirements ill all integrated fashion. In addition, they oblige the user/application to manipulate a complex programming Interface, as well its going through a cumbersome configuration process. To address these issues, we present P2PSL (P2P Security Layer), which allows gradual and flexible integration or security functionality into P2P applications. To show concept kind technical feasibility, we have implemented P2PSL, assessed the overhead it induces, and Incorporated the layer into a P2P-based grid computing infrastructure.
引用
收藏
页码:209 / 219
页数:11
相关论文
共 50 条
  • [21] A Lightweight Implementation of Security for Peer-to-Peer Networks
    Margariti, S. V.
    Meletiou, G.
    Stergiou, E.
    Vasiliadis, D. C.
    Rizos, G. E.
    INTERNATIONAL ELECTRONIC CONFERENCE ON COMPUTER SCIENCE, 2008, 1060 : 397 - 401
  • [22] Handfan: A flexible peer-to-peer service discovery system for internet of things applications
    Djellabi, Brahim
    Amad, Mourad
    Baadache, Abderrahmene
    JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES, 2022, 34 (09) : 7686 - 7698
  • [23] Peer-to-peer systems and applications - Introduction
    Steinmetz, R
    Wehrle, K
    PEER-TO-PEER SYSTEMS AND APPLICATIONS, 2005, 3485 : 1 - +
  • [24] On the (In)security of Peer-to-Peer Decentralized Machine Learning
    Pasquini, Dario
    Raynal, Mathilde
    Troncoso, Carmela
    2023 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, SP, 2023, : 418 - 436
  • [25] An evaluation of the security of the Bitcoin Peer-to-Peer Network
    Tapsell, James
    Akram, Raja Naeem
    Markantonakis, Konstantinos
    IEEE 2018 INTERNATIONAL CONGRESS ON CYBERMATICS / 2018 IEEE CONFERENCES ON INTERNET OF THINGS, GREEN COMPUTING AND COMMUNICATIONS, CYBER, PHYSICAL AND SOCIAL COMPUTING, SMART DATA, BLOCKCHAIN, COMPUTER AND INFORMATION TECHNOLOGY, 2018, : 1057 - 1062
  • [26] Grid security: Lessons for peer-to-peer systems
    Surridge, M
    Upstill, C
    THIRD INTERNATIONAL CONFERENCE ON PEER-TO-PEER COMPUTING (P2P2003), PROCEEDINGS, 2003, : 2 - 6
  • [27] On the security of polling protocols in peer-to-peer systems
    Sieka, B
    Kshemkalyani, AD
    Singhal, M
    FOURTH INTERNATIONAL CONFERENCE ON PEER-TO-PEER COMPUTING, PROCEEDINGS, 2004, : 36 - 44
  • [28] Security in a peer-to-peer distributed virtual environment
    Köhnlein, J
    PARALLEL COMPUTING: SOFTWARE TECHNOLOGY, ALGORITHMS, ARCHITECTURES AND APPLICATIONS, 2004, 13 : 587 - 597
  • [29] On NAT Traversal in Peer-to-Peer Applications
    Pussep, Konstantin
    Weinert, Matthias
    Kovacevic, Aleksandra
    Steinmetz, Ralf
    17TH IEEE INTERNATIONAL WORKSHOPS ON ENABLING TECHNOLOGIES: INFRASTRUCTURES FOR COLLABORATIVE ENTERPRISES, PROCEEDINGS, 2008, : 139 - 140
  • [30] Applications of an advanced peer-to-peer platform
    Sunaga, H
    Takemoto, M
    Nakata, T
    THIRD INTERNATIONAL CONFERENCE ON PEER-TO-PEER COMPUTING (P2P2003), PROCEEDINGS, 2003, : 210 - 211