Abstract
Chapter 6 addresses security, privacy and anonymity issues. We begin this chapter with a discussion about techniques designed to secure data as well as the overall P2P environment from different types of attacks, including routing attacks, storage and retrieval attacks, and denial-of-service attacks. We then introduce solutions to guarantee integrity of data as well as computation over P2P systems. After that, we present methods that prevent users from taking advantage of the system by freeloading off the resources contributed by others. These methods are important because guaranteeing the fairness among participants and encouraging them to contribute sharing resources represent the central strength of P2P systems. Finally, we look at techniques that are designed to support anonymity and privacy, to protect both the users that disseminate the data, as well as the nodes that store the data. We also examine techniques that authenticate third-party data publication.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
Copyright information
© 2010 Springer-Verlag Berlin Heidelberg
About this chapter
Cite this chapter
Vu, Q.H., Lupu, M., Ooi, B.C. (2010). Security in Peer-to-Peer Networks. In: Peer-to-Peer Computing. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-03514-2_6
Download citation
DOI: https://doi.org/10.1007/978-3-642-03514-2_6
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-03513-5
Online ISBN: 978-3-642-03514-2
eBook Packages: Computer ScienceComputer Science (R0)