Flexible Security Configuration & Deployment in Peer-to-Peer Applications

被引:2
|
作者
Detsch, Andre [1 ]
Gaspary, Luciano Paschoal [1 ]
Barcellos, Marinho Pilla [1 ]
Sanchez, Ricardo Nabinger [1 ]
机构
[1] Univ Vale Rio Sinos UNISINOS, PIPCA, Sao Leopoldo, Brazil
关键词
D O I
10.1109/NOMS.2006.1687552
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The widespread adoption or P2P applications fit environments beyond ordinary file sharing demands the fulfillment or several security requirements. Important steps have been taken towards security in P2P systems, with relevant mechanisms being proposed in the past to address specific vulnerabilities. However, existing approaches lack flexibility, since they do not (include enough mechanisms to) tackle it wide range of requirements ill all integrated fashion. In addition, they oblige the user/application to manipulate a complex programming Interface, as well its going through a cumbersome configuration process. To address these issues, we present P2PSL (P2P Security Layer), which allows gradual and flexible integration or security functionality into P2P applications. To show concept kind technical feasibility, we have implemented P2PSL, assessed the overhead it induces, and Incorporated the layer into a P2P-based grid computing infrastructure.
引用
收藏
页码:209 / 219
页数:11
相关论文
共 50 条
  • [31] Developing peer-to-peer applications for the Internet
    Thomas, L
    Suchter, S
    Rifkin, A
    DR DOBBS JOURNAL, 1998, 23 (01): : 76 - &
  • [32] RMrun: peer-to-peer sharing of applications
    Pinto, Luis
    Santos, Tiago
    Araujo, Filipe
    IBERGRID: 2ND IBERIAN GRID INFRASTRUCTURE CONFERENCE PROCEEDINGS, 2008, : 397 - 406
  • [33] A measurement study of peer-to-peer applications
    Bin, Liu
    Li Zhitang
    Hao, Tu
    SECOND INTERNATIONAL CONFERENCE ON SPACE INFORMATION TECHNOLOGY, PTS 1-3, 2007, 6795
  • [34] Peer-to-peer - Technologies, architectures and applications
    Schoder, D
    Weinhardt, C
    WIRTSCHAFTSINFORMATIK, 2003, 45 (03): : 257 - 257
  • [35] Experimental evaluation of peer-to-peer applications
    Roberto Canonico
    Claudia Canali
    Walid Dabbous
    Peer-to-Peer Networking and Applications, 2013, 6 : 115 - 117
  • [36] Experimental evaluation of peer-to-peer applications
    Canonico, Roberto
    Canali, Claudia
    Dabbous, Walid
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2013, 6 (02) : 115 - 117
  • [37] Developing peer-to-peer applications for the Internet
    Thomas, Louis
    Suchter, Sean
    Rifkin, Adam
    Dr. Dobb's Journal of Software Tools for Professional Programmer, 1998, 23 (01):
  • [38] Scalable retrieval and mining with optimal peer-to-peer configuration
    Chen, Jiann-Jone
    Hu, Chia-Jung
    Su, Chun-Rong
    IEEE TRANSACTIONS ON MULTIMEDIA, 2008, 10 (02) : 209 - 220
  • [39] A generic, peer-to-peer repository for distributed configuration management
    vanderHoek, A
    Heimbigner, D
    Wolf, AL
    PROCEEDINGS OF THE 18TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, 1996, : 308 - 317
  • [40] PeerNet: a peer-to-peer framework for service and application deployment in MANETs
    Gopalan, Anandha
    Znati, Taieb
    INTERNATIONAL SYMPOSIUM ON WIRELESS PERVASIVE COMPUTING 2006, CONFERENCE PROGRAM, 2006, : 171 - +