Securing identity assignment using implicit certificates in P2P overlays
View/Open
Securing Identity Assignment using Implicit Certificates in P2P Overlays (450,1Kb) (Restricted access)
Request copy
Què és aquest botó?
Aquest botó permet demanar una còpia d'un document restringit a l'autor. Es mostra quan:
- Disposem del correu electrònic de l'autor
- El document té una mida inferior a 20 Mb
- Es tracta d'un document d'accés restringit per decisió de l'autor o d'un document d'accés restringit per política de l'editorial
Cita com:
hdl:2117/22604
Document typeConference report
Defense date2013
PublisherSpringer International Publishing
Rights accessRestricted access - publisher's policy
Except where otherwise noted, content on this work
is licensed under a Creative Commons license
:
Attribution-NonCommercial-NoDerivs 3.0 Spain
Abstract
The security of the Peer-to-Peer (P2P) overlays networks has been questioned for years. Many works have been proposed to provide secure routing, anonymity, reputation systems, confidentiality, etc. However, the identity assignment has been less considered. These networks are designed so that each user has a unique identifier (nodeID), but the most of identity assignment systems allow malicious users to obtain a set of nodeIDs or even select certain identifiers. Thus, these users can disrupt the proper operation of a P2P overlay. In this paper, we propose a nodeID assignment protocol based on the issue of implicit certificates. Our purpose is to provide security services to struggle against the most of security threats in these networks with special attention to the identity assignment. This approach is based on the use of certificates and the joint generation of nodeIDs between a Certification Authority (CA) and the user. In addition, the use of implicit certificates presents certain advantages over the use of traditional certificates (explicit certificates).
CitationCaubet, J. [et al.]. Securing identity assignment using implicit certificates in P2P overlays. A: International Conference on Trust Management. "Trust management VII: 7th IFIP WG 11.11 International Conference, IFIPTM 2013: Malaga, Spain: June 3-5, 2013: proceedings". Granada: Springer International Publishing, 2013, p. 151-165.
ISBN978-3-642-38322-9
Publisher versionhttp://link.springer.com/chapter/10.1007%2F978-3-642-38323-6_11
Files | Description | Size | Format | View |
---|---|---|---|---|
Securing Identi ... icates in P2P Overlays.pdf![]() | Securing Identity Assignment using Implicit Certificates in P2P Overlays | 450,1Kb | Restricted access |