A P2P content authentication protocol based on Byzantine agreement

被引:0
|
作者
Palomar, Esther [1 ]
Estevez-Tapiador, Juan M. [1 ]
Hernandez-Castro, Julio C. [1 ]
Ribagorda, Arturo [1 ]
机构
[1] Univ Carlos III Madrid, Dept Comp Sci, Madrid 28911, Spain
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
One of the main advantages of peer-to-peer (P2P) systems is their capability to offer replicas of the same content at various locations. This allows to access contents even when some nodes are disconnected. However, this high degree of redundancy implies that it is necessary to apply some security mechanisms in order to avoid attacks based on non-authorized content modification. In this paper, we propose a content authentication protocol for pure P2P systems. Under certain restrictions, our scheme provides guarantees that a content is authentic, i.e. it has not been altered, even if it is a replica of the original and the source has lost control over it. Our proposal relies on a set of peers playing the role of a certification authority, for it is unrealistic to assume that appropriate trusted third parties can be deployed in such environments. Finally, we discuss some of its security properties through several attack scenarios.
引用
收藏
页码:60 / 72
页数:13
相关论文
共 50 条
  • [1] Online Game Protocol for P2P Using Byzantine Agreement
    Wada, Daisuke
    Kitagawa, Junichiro
    Kobayashi, Hiromi
    [J]. 2009 SECOND INTERNATIONAL CONFERENCE ON THE APPLICATIONS OF DIGITAL INFORMATION AND WEB TECHNOLOGIES (ICADIWT 2009), 2009, : 753 - 758
  • [2] Formal Proof of Cooperativeness in a Multi-Party P2P Content Authentication Protocol
    Alcaide, Almudena
    Palomar, Esther
    Gonzalez-Tablas, Ana I.
    Ribagorda, Arturo
    [J]. TRUST, PRIVACY AND SECURITY IN DIGITAL BUSINESS, 2010, 6264 : 141 - 152
  • [3] A Key Agreement Protocol for P2P VoIP Applications
    Pecori, Riccardo
    Veltri, Luca
    [J]. 2009 INTERNATIONAL CONFERENCE ON SOFTWARE, TELECOMMUNICATIONS AND COMPUTER NETWORKS, 2009, : 276 - 280
  • [4] Robustness Improvement for Mobile P2P Network by the Byzantine Agreement Problem
    Hsieh, Hui-Ching
    Chiang, Mao-Lun
    [J]. 2013 10TH ANNUAL CONFERENCE ON WIRELESS ON-DEMAND NETWORK SYSTEMS AND SERVICES (WONS), 2013, : 104 - 106
  • [5] Improvement of the Byzantine Agreement Problem under Mobile P2P Network
    Hsieh, Hui-Ching
    Chiang, Mao-Lun
    [J]. INTERNATIONAL CONFERENCE ON FUTURE INFORMATION ENGINEERING (FIE 2014), 2014, 10 : 45 - 50
  • [6] P2P authentication based on durable P2P storage technique
    Wen, Tao
    Zhang, Yong
    Guo, Quan
    Li, Ying-Qiu
    [J]. Dongbei Daxue Xuebao/Journal of Northeastern University, 2010, 31 (10): : 1381 - 1384
  • [7] A Content Authentication Scheme in Hybrid P2P Network
    Shi, Liang
    Li, Zhongwen
    [J]. MINES 2009: FIRST INTERNATIONAL CONFERENCE ON MULTIMEDIA INFORMATION NETWORKING AND SECURITY, VOL 2, PROCEEDINGS, 2009, : 486 - +
  • [8] Authentication with P2P agents
    Ghanea-Hercock, R
    [J]. BT TECHNOLOGY JOURNAL, 2003, 21 (04) : 146 - 152
  • [9] A PROTOCOL FOR MAKING AN AGREEMENT IN A PEER-TO-PEER (P2P) SOCIETY
    Aikebaier, Ailixier
    Barolli, Valbona
    Enokido, Tomoya
    Takizawa, Makoto
    [J]. JOURNAL OF INTERCONNECTION NETWORKS, 2008, 9 (04) : 317 - 335
  • [10] An efficient group key agreement protocol for secure P2P communication
    Vijayakumar, Pandi
    Naresh, Ramu
    Deborah, Lazarus Jegatha
    Islam, Sk Hafizul
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (17) : 3952 - 3965