Centralized security labels in decentralized P2P networks

被引:1
|
作者
Tsybulnik, Nathalie [1 ]
Hamlen, Kevin W. [1 ]
Thuraisingharn, Bhavani [1 ]
机构
[1] Univ Texas Dallas, Dept Comp Sci, Richardson, TX 75080 USA
关键词
D O I
10.1109/ACSAC.2007.13
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper describes the design of a peer-to-peer network that supports integrity and confidentiality labeling of shared data. A notion of data ownership privacy is also enforced, whereby peers can share data without revealing which data they own. Security labels are global but the implementation does not require a centralized label server The network employs a reputation-based trust management system to assess and update data labels, and to store and retrieve labels safely in the presence of malicious peers. The security labeling scheme preserves the efficiency of network operations; lookup cost including label retrieval is O(log N), where N is the number of agents in the network.
引用
收藏
页码:315 / 324
页数:10
相关论文
共 50 条
  • [41] A P2P E-commerce Related Network Security Issue: P2P Worm
    Zhang, Yejiang
    Li, Zhitang
    Hu, Zhengbing
    Tu, Hao
    Lin, Huaiqing
    PROCEEDINGS OF THE INTERNATIONAL SYMPOSIUM ON ELECTRONIC COMMERCE AND SECURITY, 2008, : 114 - 117
  • [42] Design of security functionality in P2P applications
    Park, ZW
    Lee, JH
    Kim, MK
    KORUS 2004, VOL 1, PROCEEDINGS, 2004, : 132 - 136
  • [43] Security Analysis for P2P Routing Protocols
    Fujii, Tatsuro
    Ren, Yizhi
    Hori, Yoshiaki
    Sakurai, Kouichi
    2009 INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY, AND SECURITY (ARES), VOLS 1 AND 2, 2009, : 899 - +
  • [44] A paradigm solution to P2P security issues
    Robles, Rosslin John
    Choi, Min-kyu
    Cho, Eun-suk
    AST: 2009 INTERNATIONAL E-CONFERENCE ON ADVANCED SCIENCE AND TECHNOLOGY, PROCEEDINGS, 2009, : 3 - 7
  • [45] The Research of Worms in P2P Networks
    Xie Chunyan
    Yin Zhiyu
    PROCEEDINGS OF THE 2009 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND NATURAL COMPUTING, VOL II, 2009, : 389 - 392
  • [46] Trust Model for P2P Networks
    Ma, Yi
    Wang, Dongqi
    Chen, Dongming
    INTERNATIONAL CONFERENCE ON ELECTRONIC INFORMATION TECHNOLOGY AND INTELLECTUALIZATION (ICEITI 2016), 2016, : 562 - 568
  • [47] Neighbor definition in P2P networks
    Aliakbarian, Saeed
    Rahimabadi, Ali Movaghar
    Sadeghi, Fereshteh
    Haghani, Parisa
    Mirsatari, Negar Sadat
    2006 INTERNATIONAL CONFERENCE ON COMMUNICATIONS, CIRCUITS AND SYSTEMS PROCEEDINGS, VOLS 1-4: VOL 1: SIGNAL PROCESSING, 2006, : 1562 - +
  • [48] Distributed search in P2P networks
    Waterhouse, S
    Doolin, DM
    Kan, G
    Faybishenko, Y
    IEEE INTERNET COMPUTING, 2002, 6 (01) : 68 - 72
  • [49] Cooperativeness prediction in P2P networks
    Niu, Changyong
    Wang, Jian
    Shen, Ruimin
    Shen, Liping
    Luo, Heng
    EXPERT SYSTEMS WITH APPLICATIONS, 2008, 35 (03) : 1267 - 1274
  • [50] Talent scouting in P2P networks
    Koenigstein, N.
    Shavitt, Y.
    COMPUTER NETWORKS, 2012, 56 (03) : 970 - 982