SecureTorrent: A Security Framework for File Swarming

  • Kenneth Wilson
  • Philip Machanick
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 4186)


SecureTorrent is a secure file swarming system based on BitTorrent. It provides access control, end-to-end confidentiality, and auditability, while maintaining advantages of file swarming. This paper presents an initial performance evaluation. As compared with BitTorrent, the performance overhead of encryption in most cases is negligible, at worst 15%. In a real-world higher latency network, the extra overhead of encryption would be significantly lower.


Access Control Content Distribution Cache Proxy Security Framework Byzantine Agreement 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Cohen, B.: Incentives Build Robustness in BitTorrent. In: Proc. First Workshop on the Economics of Peer-to-Peer Systems, Berkley, CA (2003)Google Scholar
  2. 2.
    Rousskov, A., Solokiev, V.: On Performance of Caching Proxies (1998),
  3. 3.
    Colajanni, M., Yu, P.S.: Adaptive TTL schemes for load balancing of distributed web servers. SIGMETRICS Perform. Eval. Rev. 25, 36–42 (1997)CrossRefGoogle Scholar
  4. 4.
    Akamai: Internet bottlenecks: the case for edge delivery services (2000),
  5. 5.
    Thyagarajan, A.S., Casner, S.L., Deering, S.E.: Making the MBone real. In: Proc. INET 1995, Hawaii (1995)Google Scholar
  6. 6.
    Machanick, P., Andrew, B.: Latency improvement in virtual multicasting. In: Omondi, A.R., Sedukhin, S. (eds.) ACSAC 2003. LNCS, vol. 2823, pp. 380–394. Springer, Heidelberg (2003)CrossRefGoogle Scholar
  7. 7.
    Stoica, I., Morris, R., Karger, D., Kaashoek, F., Balakrishnan, H.: Chord: A scalable Peer-To-Peer lookup service for internet applications. In: Proc. 2001 ACM SIGCOMM Conference, San Diego, CA, pp. 149–160 (2001)Google Scholar
  8. 8.
    Ripeanu, M.: Peer-to-peer architecture case study: Gnutella network. In: Proc. Int. Conf. on Peer-to-peer Computing, pp. 99–100 (2001)Google Scholar
  9. 9.
    Clarke, I., Sandberg, O., Wiley, B., Hong, T.W.: Freenet: A distributed anonymous information storage and retrieval system. In: Federrath, H. (ed.) Designing Privacy Enhancing Technologies. LNCS, vol. 2009, pp. 46–66. Springer, Heidelberg (2001)CrossRefGoogle Scholar
  10. 10.
    Kohl, J., Neuman, B.: RFC1510 The Kerberos Network Authentication Service (1993),
  11. 11.
    Cachin, C.: Distributing trust on the Internet. In: Proc. Conf. on Dependable Systems and Networks (DSN 2001), Gothenborg, Sweden, pp. 183–192 (2001)Google Scholar
  12. 12.
    Androutsellis-Theotokis, S., Spinellis, D.: A survey of peer-to-peer content distribution technologies. ACM Comput. Surv. 36, 335–371 (2004)CrossRefGoogle Scholar
  13. 13.
    Izal, M., Urvoy-Keller, G., Biersack, E.W., Felber, P.A., Al Hamra, A., Garces-Erice, L.: Dissecting BitTorrent: Five Months in a Torrent’s Lifetime. In: Barakat, C., Pratt, I. (eds.) PAM 2004. LNCS, vol. 3015, pp. 1–11. Springer, Heidelberg (2004)CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2006

Authors and Affiliations

  • Kenneth Wilson
    • 1
  • Philip Machanick
    • 2
  1. 1.School of ITEEUniversity of QueenslandSt LuciaAustralia
  2. 2.National ICT Australia and School of ITEEUniversity of QueenslandSt LuciaAustralia

Personalised recommendations