A P2P content authentication protocol based on Byzantine agreement

被引:0
|
作者
Palomar, Esther [1 ]
Estevez-Tapiador, Juan M. [1 ]
Hernandez-Castro, Julio C. [1 ]
Ribagorda, Arturo [1 ]
机构
[1] Univ Carlos III Madrid, Dept Comp Sci, Madrid 28911, Spain
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
One of the main advantages of peer-to-peer (P2P) systems is their capability to offer replicas of the same content at various locations. This allows to access contents even when some nodes are disconnected. However, this high degree of redundancy implies that it is necessary to apply some security mechanisms in order to avoid attacks based on non-authorized content modification. In this paper, we propose a content authentication protocol for pure P2P systems. Under certain restrictions, our scheme provides guarantees that a content is authentic, i.e. it has not been altered, even if it is a replica of the original and the source has lost control over it. Our proposal relies on a set of peers playing the role of a certification authority, for it is unrealistic to assume that appropriate trusted third parties can be deployed in such environments. Finally, we discuss some of its security properties through several attack scenarios.
引用
收藏
页码:60 / 72
页数:13
相关论文
共 50 条
  • [21] Byzantine generals problem in the light of P2P computing
    Fedotova, Natalya
    Veltri, Luca
    2006 THIRD ANNUAL INTERNATIONAL CONFERENCE ON MOBILE AND UBIQUITOUS SYSTEMS: NETWORKING & SERVICES, 2006, : 312 - +
  • [22] Survey of anonymity and authentication in P2P networks
    Wang X.
    Yang L.
    Sun X.
    Han J.
    Liang W.
    Huang L.
    Information Technology Journal, 2010, 9 (06) : 1165 - 1171
  • [23] Authentication and access control in P2P network
    Zhang, YQ
    Zhang, DH
    GRID AND COOPERATIVE COMPUTING, PT 1, 2004, 3032 : 468 - 470
  • [24] Byzantine generals problem in the light of P2P computing
    Fedotova, Natalya
    Veltri, Luca
    2006 3RD ANNUAL INTERNATIONAL CONFERENCE ON MOBILE AND UBIQUITOUS SYSTEMS - WORKSHOPS, 2006, : 323 - +
  • [25] P2P email encryption by an identity-based one-way group key agreement protocol
    Yeh, Jyh-Haw
    Zeng, Fiona
    Long, Thomas
    2014 20TH IEEE INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED SYSTEMS (ICPADS), 2014, : 760 - 767
  • [26] Arm movement activity based user authentication in P2P systems
    Shin, Jungpil
    Islam, Md Rashedul
    Rahim, Md Abdur
    Mun, Hyung-Jin
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2020, 13 (02) : 635 - 646
  • [27] Arm movement activity based user authentication in P2P systems
    Jungpil Shin
    Md Rashedul Islam
    Md Abdur Rahim
    Hyung-Jin Mun
    Peer-to-Peer Networking and Applications, 2020, 13 : 635 - 646
  • [28] P systems and the Byzantine agreement
    Dinneen, Michael J.
    Kim, Yun-Bum
    Nicolescu, Radu
    JOURNAL OF LOGIC AND ALGEBRAIC PROGRAMMING, 2010, 79 (06): : 334 - 349
  • [29] Storage and retrieval on P2P networks: A DHT based protocol
    Bessa, Sergio
    Correia, Manuel E.
    Brandao, Pedro
    2007 IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS, VOLS 1-3, 2007, : 829 - 835
  • [30] Adaptive expression based routing protocol for P2P systems
    Rao, Imran
    Harwood, Aaron
    Karunasekera, Shanika
    ON THE MOVE TO MEANINGFUL INTERNET SYSTEMS 2007: OTM 2007 WORKSHOPS, PT 2, PROCEEDINGS, 2007, 4806 : 941 - +