Efficient content authentication in peer-to-peer networks

被引:0
|
作者
Tamassia, Roberto [1 ]
Triandopoulos, Nikos [2 ]
机构
[1] Brown Univ, Dept Comp Sci, Providence, RI 02912 USA
[2] Dartmouth Coll, Inst Security Technol Studies, Hanover, NH 03755 USA
来源
APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, PROCEEDINGS | 2007年 / 4521卷
基金
美国国家科学基金会;
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We study a new model for data authentication over peer-to-peer (p2p) storage networks, where data items are stored, queried and authenticated in a totally decentralized fashion. The model captures the security requirements of emerging distributed computing applications. We present an efficient construction of a distributed Merkle tree (DMT), which realizes an authentication tree over a p2p network, thus extending a fundamental cryptographic technique to distributed environments. We show how our DMT can be used to design an authenticated distributed hash table that is secure against replay attacks and consistent with the update history. Our scheme is built on top of a broad class of existing p2p overlay networks and achieves generality by using only the basic functionality of object location. We use this scheme to design the first efficient distributed authenticated dictionary.
引用
收藏
页码:354 / +
页数:3
相关论文
共 50 条
  • [21] Optimization of a peer-to-peer system for efficient content replication
    Cervellera, Cristiano
    Caviglione, Luca
    EUROPEAN JOURNAL OF OPERATIONAL RESEARCH, 2009, 196 (02) : 423 - 433
  • [22] Preventing Piracy Content Propagation in Peer-to-Peer Networks
    Zhang, Hongli
    Ye, Lin
    Shi, Jiantao
    Du, Xiaojiang
    Chen, Hsiao-Hwa
    IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2013, 31 (09) : 105 - 114
  • [23] Hybrid peer-to-peer content sharing in mobile networks
    Ekler, Péter
    Kelényi, Imre
    Dévai, István
    Bakos, Balázs
    Kiss, Attila
    Journal of Networks, 2009, 4 (02) : 119 - 132
  • [24] A Measurement Study of Shared Content on Peer-to-Peer Networks
    Hawa, Mohammed
    PROCEEDINGS OF THE 2008 INTERNATIONAL SYMPOSIUM ON PERFORMANCE EVALUATION OF COMPUTER AND TELECOMMUNICATION SYSTEMS, 2008, : 277 - 284
  • [25] A Routing Scheme for Content Localization in Peer-to-Peer Networks
    de Asis Lopez-Fuentes, Francisco
    2010 IEEE ELECTRONICS, ROBOTICS AND AUTOMOTIVE MECHANICS CONFERENCE (CERMA 2010), 2010, : 249 - 254
  • [26] Censorship resistant peer-to-peer content addressable networks
    Fiat, A
    Saia, J
    PROCEEDINGS OF THE THIRTEENTH ANNUAL ACM-SIAM SYMPOSIUM ON DISCRETE ALGORITHMS, 2002, : 94 - 103
  • [27] PathFinder: Efficient Lookups and Efficient Search in Peer-to-Peer Networks
    Bradler, Dirk
    Krumov, Lachezar
    Muhlhauser, Max
    Kangasharju, Jussi
    DISTRIBUTED COMPUTING AND NETWORKING, 2011, 6522 : 77 - +
  • [28] Efficient Content-Based Publish/Subscribe Systems over Peer-to-Peer Networks
    Lo, Shou-Chih
    JOURNAL OF INTERNET TECHNOLOGY, 2012, 13 (05): : 713 - 724
  • [29] PPAA: peer-to-peer anonymous authentication
    Tsang, Patrick P.
    Smith, Sean W.
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, PROCEEDINGS, 2008, 5037 : 55 - 74
  • [30] Characterisation, design and simulation of an efficient peer-to-peer content distribution system for enterprise networks
    Aguilar-Gonzalez, Alberto
    Nolazco-Flores, Juan A.
    Vargas-Rosales, Cesar
    Bustos, Raime
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2017, 10 (01) : 122 - 137