Flexible Security Configuration & Deployment in Peer-to-Peer Applications

被引:2
|
作者
Detsch, Andre [1 ]
Gaspary, Luciano Paschoal [1 ]
Barcellos, Marinho Pilla [1 ]
Sanchez, Ricardo Nabinger [1 ]
机构
[1] Univ Vale Rio Sinos UNISINOS, PIPCA, Sao Leopoldo, Brazil
关键词
D O I
10.1109/NOMS.2006.1687552
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The widespread adoption or P2P applications fit environments beyond ordinary file sharing demands the fulfillment or several security requirements. Important steps have been taken towards security in P2P systems, with relevant mechanisms being proposed in the past to address specific vulnerabilities. However, existing approaches lack flexibility, since they do not (include enough mechanisms to) tackle it wide range of requirements ill all integrated fashion. In addition, they oblige the user/application to manipulate a complex programming Interface, as well its going through a cumbersome configuration process. To address these issues, we present P2PSL (P2P Security Layer), which allows gradual and flexible integration or security functionality into P2P applications. To show concept kind technical feasibility, we have implemented P2PSL, assessed the overhead it induces, and Incorporated the layer into a P2P-based grid computing infrastructure.
引用
收藏
页码:209 / 219
页数:11
相关论文
共 50 条
  • [41] A Novel Massive Deployment Solution Based on the Peer-to-Peer Protocol
    Shiau, Steven J. H.
    Huang, Yu-Chiang
    Yen, Ching-Hsuan
    Tsai, Yu-Chin
    Sun, Chen-Kai
    Juang, Jer-Nan
    Huang, Chi-Yo
    Huang, Ching-Chun
    Huang, Shih-Kun
    APPLIED SCIENCES-BASEL, 2019, 9 (02):
  • [42] Deployment Issues in Scalable Island Multicast for Peer-to-Peer Streaming
    Jin, Xing
    Tang, Ho-Shing
    Chan, S. -H. Gary
    Cheng, Kan-Leung
    IEEE MULTIMEDIA, 2009, 16 (01) : 72 - 80
  • [43] Management in peer-to-peer systems: Trust, reputation and security
    Boutaba, R
    Marshall, A
    COMPUTER NETWORKS, 2006, 50 (04) : 469 - 471
  • [44] Peer-to-Peer Network Security Issues and Analysis: Review
    Alharbi, Adel R.
    Aljaedi, Amer
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2020, 20 (11): : 74 - 88
  • [45] Security-related issues in peer-to-peer networks
    Divac-Krnic, L
    Ackermann, R
    PEER-TO-PEER SYSTEMS AND APPLICATIONS, 2005, 3485 : 529 - 545
  • [46] Legitimate applications of peer-to-peer networks.
    Soares, A
    JOURNAL OF THE AMERICAN SOCIETY FOR INFORMATION SCIENCE AND TECHNOLOGY, 2006, 57 (02): : 293 - 294
  • [47] An Investigation into Peer-to-Peer Network Security Using Wireshark
    Musa, Ahmad
    Abubakar, Aliyu
    Gimba, Usman Abdul
    Rasheed, Rasheed Abubakar
    2019 15TH INTERNATIONAL CONFERENCE ON ELECTRONICS, COMPUTER AND COMPUTATION (ICECCO), 2019,
  • [48] Trusted computing: Providing security for Peer-to-Peer networks
    Balfe, S
    Lakhani, AD
    Paterson, KG
    FIFTH IEEE INTERNATIONAL CONFERENCE ON PEER-TO-PEER COMPUTING, PROCEEDINGS, 2005, : 117 - 124
  • [49] Enhancement for security of peer-to-peer by expanding CGA mechanism
    Ryu, Seonggeun
    Mun, Youngsong
    COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2007, PT 2, PROCEEDINGS, 2007, 4706 : 1062 - 1071
  • [50] Security and Performance Evaluation in Peer-To-Peer VoIP Communication
    Sanlioz, Gani
    Kara, Mustafa
    Aydin, Muhammed Ali
    2024 IEEE INTERNATIONAL BLACK SEA CONFERENCE ON COMMUNICATIONS AND NETWORKING, BLACKSEACOM 2024, 2024, : 340 - 343