Filters








9,681 Hits in 3.9 sec

Security Considerations for Peer-to-Peer Distributed Hash Tables [chapter]

Emil Sit, Robert Morris
2002 Lecture Notes in Computer Science  
This paper looks at what sorts of security problems are inherent in large peer-to-peer systems based on distributed hash lookup systems.  ...  Recent peer-to-peer research has focused on providing efficient hash lookup systems that can be used to build more complex systems.  ...  In this paper, we will examine security concerns that are particular to distributed hash tables.  ... 
doi:10.1007/3-540-45748-8_25 fatcat:7g4qbkdipzdxdpkgcvwfwzkbqu

Secure Communication in Unstructured P2P Networks based on Reputation Management and Self Certification

C. V.Arulkumar, K. Jeyakumar, M. Malarmathi, T. Shanmugapriya
2012 International Journal of Computer Applications  
The self certification (RSA ALGORITHM and MD5) is used for ensuring secure and timely availability of the reputation data of a peer to other peers.  ...  to the peer.  ...  The authors would like to thank the faculty Members of Department of Information Technology for the critical review of the manuscript and for their valuable input and fruitful discussions.  ... 
doi:10.5120/6336-8239 fatcat:h6icjagvwrc6pjrb3pooovqc2m

Resilient and Secure File Dispersal in a Mobile P2P System

Khalid Ashraf, Rachid Anane, Nick Blundell
2011 2011 IEEE Workshops of International Conference on Advanced Information Networking and Applications  
This paper presents an approach to resilient file management and network storage through the design and implementation of a file dispersal system for a mobile P2P network, based on distributed hash tables  ...  The convergence of mobile networks and P2P systems has led to the deployment of a range of schemes for file storage over a network.  ...  Hash key distribution The hashing function has to be consistent and the hash key space generation should be equally distributed so that the keys do not map onto only one subset of the peers.  ... 
doi:10.1109/waina.2011.149 dblp:conf/aina/AshrafAB11 fatcat:aty52s75ufcandwgibyn4z33v4

Dependability in peer-to-peer systems

F. DePaoli, L. Mariani
2004 IEEE Internet Computing  
To perform in Internetscale applications, P2P systems must address the four major properties of dependable systems: scalability, fault-tolerance, security, and anonymity.  ...  Editor : Siobhán Clarke • siobhan.c Dependability in Peer-to-Peer Systems Napster's centralized nature makes it fragile with respect to faults: if the central server stops working, all services become  ...  More recently, they have used it to implement hash-map-like functionalities (the ability to map a key to a location) in distributed settings.  ... 
doi:10.1109/mic.2004.9 fatcat:a6x4kl44zfekhouae5c5u7f63e

Bitcoin Cryptocurrency: A Review

2018 American Research Journal of Computer Science and Information Technology  
The technology is relatively new and complex for a layman to understand.  ...  Since its release in 2009, there has been tremendous growth in market value of Bitcoin, with anonymity and distributed nature removing the need for any central authority being the driving force for its  ...  Due to increasing faith and recognition of the system, it has the potential to be future of currency as long as security concerns are taken into consideration.  ... 
doi:10.21694/2572-2921.18002 fatcat:24ylovb7yjc5nbcwm37vkno5nu

Content Addressed P2P File System for the Web with Blockchain-Based Meta-Data Integrity [article]

Chaitanya Rahalkar, Dhaval Gujar
2020 arXiv   pre-print
This timestamps and secures the data, instead of having to put it on the chain itself.  ...  Our paper proposes a model that uses the decentralized file storage system of IPFS, and the integrity preservation properties of the Blockchain, to store and distribute data on the Web.  ...  [10] The entire model is composed of four essential terminologies: 1) Distributed Hash Tables: A distributed hash table (DHT) is a type of a decentralized distributed system that works on the lookup  ... 
arXiv:1912.10298v2 fatcat:7issxxfnrzfrfavbnz5c4a2xc4

Security Consideration in Peer-to-peer Networks with A Case Study Application

Nick Rahimi
2020 International journal of network security and its applications  
Peer-to-Peer (P2P) overlay networks wide adoption has also created vast dangers due to the millions of users who are not conversant with the potential security risks.  ...  Lack of centralized control creates great risks to the P2P systems. This is mainly due to the inability to implement proper authentication approaches for threat management.  ...  We have presented efficient LDE-based algorithms that provide secure data communications from the perspectives of confidentiality, authentication, and integrity.  ... 
doi:10.5121/ijnsa.2020.12201 fatcat:jdkqt3tgqfd23m6rfwqwa3a5xu

SECURITY CONSIDERATION IN PEER-TO-PEER NETWORKS WITH A CASE STUDY APPLICATION

Nick Rahimi
2020 Zenodo  
Peer-to-Peer (P2P) overlay networks wide adoption has also created vast dangers due to the millions of users who are not conversant with the potential security risks.  ...  Lack of centralized control creates great risks to the P2P systems. This is mainly due to the inability to implement proper authentication approaches for threat management.  ...  The distributed hash table is a decentralized system of hash tables. DHTs are utilized to map resources to an identifier.  ... 
doi:10.5281/zenodo.3737915 fatcat:djvtn6t34fbxfi3d5txwqk7rxi

Secure and Trustable Distributed Aggregation Based on Kademlia [chapter]

Stéphane Grumbach, Robert Riemann
2017 IFIP Advances in Information and Communication Technology  
It relies on the distributed hash table Kademlia, used in BitTorrent, for pseudonymous communication between randomly predetermined peers to ensure a high degree of confidentiality which does not solely  ...  Experimental results confirm the complexity of O(n) for n peers allowing for large-scale applications.  ...  Acknowledgments The authors thank Stéphane Frénot, Damien Reimert, Aurélien Faravelon, Pascal Lafourcade and Matthieu Giraud for fruitful discussions on distributed voting protocols and attack vectors.  ... 
doi:10.1007/978-3-319-58469-0_12 fatcat:zaxn5pb7zfhzhe23lhvuxffw6i

Virtual network routing in cloud computing environment

P. Priya Ponnusamy, S. Abinaya
2016 2016 International Conference on Computer Communication and Informatics (ICCCI)  
.  RTT-weighted routing D) Tapestry: Tapestry [3][6] is a peer to peer overlay routing infrastructure, helps in offering location-Independent, scalable and efficient routing of messages using only local  ...  Each node maintains its routing table which consists of set of neighbouring nodes.  ...  search(range query)and based on AVL tree Consistent hashing, use finger table to avoid caching problem in routing Application Bayeux, Multicasting ,DHT, routing Past, Scribe Peer to peer  ... 
doi:10.1109/iccci.2016.7479968 fatcat:daq2y4d5lze2vp45m3sc52vnh4

Towards secure mobile P2P applications using JXME

Marc Domingo-Prieto, Joan Arnedo-Moreno, Jordi Herrera-Joancomartí, Josep Prieto-Blázquez
2012 Journal of Internet Services and Information Security  
JXME is the JXTA implementation for mobile devices using J2ME, its main value being its simplicity when creating peer-to-peer (P2P) applications on limited devices.  ...  On that regard, an issue that is becoming very important in the recent times is being able to provide a security baseline to such applications.  ...  of HC size Poll interval (s) 50 250 500 1 × × 5 × 10 Table 3 : Combination of values of time between poll intervals and size of hash-chain used for the tests Towards secure mobile P2P applications using  ... 
doi:10.22667/jisis.2012.02.31.001 dblp:journals/jisis/Domingo-PrietoA12 fatcat:tkc3lqo4mfenlkzwgj7u4qx2te

A Service-Oriented Fuzzy Reputation System to Increase the Security of a Broadband Wireless Metropolitan Network

Alexandre Lages, Flavia Delicato, Gizelle Vianna, Luci Pirmez
2006 2006 14th IEEE International Conference on Networks  
Schemes to assure the safety of services should preferably adopt a distributed architecture, such as the Reputation Systems architectures, commonly used in Peer-to-Peer, in order to keep the network scalability  ...  We propose the use of a service oriented Reputation System based on Fuzzy Logic, as a solution for increasing the safety level of a Wireless MAN.  ...  The use of a distributed approach, such as the Reputation Systems (RS) [1] , to increase the security of a peer in a Peer-to-Peer (P2P) Network is an afforded choice against the mechanism of Public Keys  ... 
doi:10.1109/icon.2006.302642 dblp:conf/icon/LagesDVP06 fatcat:hn5xvjvyj5esvjnsp7gkjncls4

Decentralized Digital Currency System using Merkle Hash Trees [article]

Shreekanth M Prabhu, Natarajan Subramanyam, Ms. Shreya P Krishnan, Ms. Brindavana Sachidananda
2022 arXiv   pre-print
DDCS uses a Ledger-less, distributed, peer-to-peer architecture.  ...  We name the proposed currency δ-Money. δ-Money is intended as a replacement for physical currency and has in-built security features that rival crypto-currencies.  ...  Acknowledgements Authors acknowledge the affiliating institutions for the support extended to pursue this research.  ... 
arXiv:2205.03259v1 fatcat:nn652jnpgbaz5bslvfkjwooxji

Enhanced CRA protocol for seamless connectivity in wireless networks

Elankayer Sithirasenan, Khosrow Ramezani, Vallipuram Muthukkumarasamy
2012 2012 International Symposium on Communications and Information Technologies (ISCIT)  
We also present a security and cost evaluation on the proposed enhanced protocol.  ...  The "post-PC" era is longing for the convergence of heterogeneous wireless communication technologies to enable seamless data connectivity.  ...  Security Consideration RFC-3748 [17] indicates mandatory properties and security constraints of an EAP method.  ... 
doi:10.1109/iscit.2012.6380852 dblp:conf/iscit/SithirasenanRM12 fatcat:l7df7nf5pnef5hzpkichjgmvva

Our Brothers' Keepers: Secure Routing with High Performance [article]

Alex Brodsky, Scott Lindenberg
2008 arXiv   pre-print
., 2007) spam classification system is based on a distributed hash table that is implemented using a structured peer-to-peer overlay.  ...  Fourth, each peer's identifier links the peer to its network address, and at the same time uniformly distributes the peers in the key-space.  ...  Introduction Systems such as Trinity [BB07] , LOCKSS [MRR + 03], and others are based on distributed hash tables that are implemented on top of peer-to-peer structured overlays.  ... 
arXiv:0808.1744v1 fatcat:elrrqmwjd5akzdwhbh3m4jb4ma
« Previous Showing results 1 — 15 out of 9,681 results