Efficient content authentication in peer-to-peer networks

被引:0
|
作者
Tamassia, Roberto [1 ]
Triandopoulos, Nikos [2 ]
机构
[1] Brown Univ, Dept Comp Sci, Providence, RI 02912 USA
[2] Dartmouth Coll, Inst Security Technol Studies, Hanover, NH 03755 USA
基金
美国国家科学基金会;
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We study a new model for data authentication over peer-to-peer (p2p) storage networks, where data items are stored, queried and authenticated in a totally decentralized fashion. The model captures the security requirements of emerging distributed computing applications. We present an efficient construction of a distributed Merkle tree (DMT), which realizes an authentication tree over a p2p network, thus extending a fundamental cryptographic technique to distributed environments. We show how our DMT can be used to design an authenticated distributed hash table that is secure against replay attacks and consistent with the update history. Our scheme is built on top of a broad class of existing p2p overlay networks and achieves generality by using only the basic functionality of object location. We use this scheme to design the first efficient distributed authenticated dictionary.
引用
收藏
页码:354 / +
页数:3
相关论文
共 50 条
  • [1] Distributed authentication for peer-to-peer networks
    Gokhale, S
    Dasgupta, P
    2003 SYMPOSIUM ON APPLICATIONS AND THE INTERNET WORKSHOPS, PROCEEDINGS, 2003, : 347 - 353
  • [2] A multimedia-content authentication and recovery protocol in peer-to-peer networks
    Ababneh, Sufyan
    Khokhar, Ashfaq
    Ansari, Rashid
    2008 IEEE INTERNATIONAL CONFERENCE ON ELECTRO/INFORMATION TECHNOLOGY, 2008, : 90 - 95
  • [3] Efficient flooding in peer-to-peer networks
    Wu, Ai
    Liu, Xinsong
    Liu, Kejian
    7TH INTERNATIONAL CONFERENCE ON COMPUTER-AIDED INDUSTRIAL DESIGN & CONCEPTUAL DESIGN, 2006, : 61 - +
  • [4] Correlation Trust Authentication Model for Peer-to-Peer Networks
    Cheng, Wei
    Tan, Zhenhua
    PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION APPLICATIONS (ICCIA 2012), 2012, : 267 - 270
  • [5] Efficient content locating in peer-to-peer systems
    Chen, HT
    Huang, ZU
    Gong, ZH
    ICEBE 2005: IEEE INTERNATIONAL CONFERENCE ON E-BUSINESS ENGINEERING, PROCEEDINGS, 2005, : 253 - 256
  • [6] A harmful content protection in peer-to-peer networks
    Nam, T
    Lee, HG
    Jeong, CY
    Han, C
    ARTIFICIAL INTELLIGENCE AND SIMULATION, 2004, 3397 : 617 - 626
  • [7] A Case for Content Distribution in Peer-to-Peer Networks
    Analoui, Morteza
    Rezvani, Mohammad Hossein
    ACTIVE MEDIA TECHNOLOGY, 2010, 6335 : 6 - 17
  • [8] On Combating Content Poisoning in Peer-to-Peer Networks
    Hawa, Mohammed
    Al-Zubi, Raed
    Darabkh, Khalid A.
    Al-Sukkar, Ghazi
    WORLD CONGRESS ON ENGINEERING - WCE 2013, VOL II, 2013, : 1276 - +
  • [9] Peer-to-peer content sharing in wireless networks
    Marossy, K
    Csúcs, G
    Bakos, B
    Farkas, L
    Nurminen, JK
    2004 IEEE 15TH INTERNATIONAL SYMPOSIUM ON PERSONAL, INDOOR AND MOBILE RADIO COMMUNICATIONS, VOLS 1-4, PROCEEDINGS, 2004, : 109 - 114
  • [10] Efficient search in unstructured peer-to-peer networks
    Cholvi, V
    Felber, P
    Biersack, E
    EUROPEAN TRANSACTIONS ON TELECOMMUNICATIONS, 2004, 15 (06): : 535 - 548