Decentralized certification scheme for secure admission in on-the-fly peer-to-peer systems
Rights accessRestricted access - publisher's policy
Several alternative schemes have been presented in the literature to try to solve the users’ admission problem in P2P systems when it is not possible to include a logically centralized authority (either online or offline) in the system. However,most of them are not suitable for on-the-fly P2P systems and the most typical ones (IP based, shared secret and threshold cryptography) have several security and performance drawbacks. From the deficiencies of the existing schemes, in this paper we present a new decentralized certification scheme for on-the-fly P2P systems which is based on the recently published Internet Attribute Certificate Profile for Authorization. Our proposal greatly improves the security and flexibility of IP based and shared secret D. Suárez Touceda (B) Evalues - IT Security Evaluation, Parque Leganés Tecnológico, Avda. Gregorio Peces Barba 1, 28918 Leganés (Madrid), Spain e-mail: email@example.com J. M. Sierra Cámara Computer Science Department, Universidad Carlos III de Madrid, Avda. de la Universidad 30, 28911 Leganés (Madrid), Spain e-mail: firstname.lastname@example.org M. Soriano Department of Telematics Engineering, Universitat Politècnica de Catalunya (UPC), 08034 Barcelona, Spain e-mail: email@example.com M. Soriano Centre Tecnolgic de Telecomunicacions de Catalunya (CTTC), 08860 Castelldefels (Barcelona), Spain schemes with no infrastructure cost and with a minimal performance charge. Also, it achieves a similar level of security than threshold cryptography while highly reducing its computational and communicational cost. All these facts position our certification proposal as a users’ admission alternative for on-the-fly P2P systems in non very hostile environments where performance and security are key factors.
CitationTouceda, D.; Cámara, J.; Soriano, M. Decentralized certification scheme for secure admission in on-the-fly peer-to-peer systems. "Peer-to-peer networking and applications", Juny 2012, vol. 5, núm. 2, p. 105-124.
Showing items related by title, author, creator and subject.
Neagu, Madalin; Miclea, Liviu; Manich Bou, Salvador (2015-04-08)
Restricted access - publisher's policyThe last decade has recorded an increase in security protocols for integrated circuits and memory systems, because of device specific attacks such as side-channel monitoring and cold boot and also because sensitive information ...
Estrada, Jose Antonio; Rodríguez, Ana Fernanda; Parra-Arnau, Javier; Forné Muñoz, Jorge (2014-06-30)
Open AccessTraces related to our identity are left every day while we browse the Internet. Being the user’s information a very valued asset for most of the companies, user activities on Internet are permanently monitored, and the ...
Caubet Fernández, Juan; Esparza Martín, Óscar; Muñoz Tapia, José Luis; Alins Delgado, Juan José; Mata Diaz, Jorge (2014-12-01)
Restricted access - publisher's policyPeer-to-peer (P2P) overlay networks have been proposed to solve routing problems of big distributed infrastructures, even for Internet scale. But the research community has been questioning the security of these networks ...