Skip to main content

Chord-PKI: Embedding a Public Key Infrastructure into the Chord Overlay Network

  • Conference paper

Part of the Lecture Notes in Computer Science book series (LNSC,volume 4582)

Abstract

Our goal in this paper is to provide authentication, encryption and non-repudiation services for nodes within Peer-to-Peer networks, in an efficient and scalable way. To accomplish this, we propose a distributed Public Key Infrastructure model, suitable for Peer-to-Peer networks and more particularly for the Chord protocol. Our solution integrates the PKI infrastructure within the Chord architecture. We use well known cryptographic techniques as building blocks, such as threshold cryptography and proactive updating.

Keywords

  • Overlay Network
  • Malicious Node
  • Distribute Hash Table
  • Threshold Cryptography
  • Incoming Node

These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Research funded by the General Secretariat for Research and Technology (GSRT) of Greece under a PENED grant.

This is a preview of subscription content, access via your institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (Canada)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (Canada)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (Canada)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Stoica, I., Morris, R., Liben-Nowell, D., Karger, D., Dabek, F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on Networking 11(1), 17–32 (2003)

    CrossRef  Google Scholar 

  2. Ratnasamy, S., Francis, P., Handley, M., Karp, R., Schenker, S.: A scalable content-addressable network. In: SIGCOMM 2001: Proceedings of the 2001 conference on Applications, technologies, architectures, and protocols for computer communications, New York, NY, USA, pp. 161–172. ACM Press, New York (2001)

    CrossRef  Google Scholar 

  3. Rowstron, A.I.T., Druschel, P.: Pastry: Scalable, decentralized object location, and routing for large-scale peer-to-peer systems. In: Middleware 2001: Proceedings of the IFIP/ACM International Conference on Distributed Systems Platforms, pp. 329–350. Springer, Heidelberg (2001)

    Google Scholar 

  4. Risson, J., Moors, T.: Survey of research towards robust peer-to-peer networks: Search methods. Elsevier Computer Networks 50(17), 3495–3521 (2006)

    CrossRef  Google Scholar 

  5. Sit, E., Morris, R.: Security considerations for peer-to-peer distributed hash tables. In: Druschel, P., Kaashoek, M.F., Rowstron, A. (eds.) IPTPS 2002. LNCS, vol. 2429, pp. 261–269. Springer, Heidelberg (2002)

    CrossRef  Google Scholar 

  6. Castro, M., Druschel, P., Ganesh, A., Rowstron, A., Wallach, D.S.: Secure routing for structured peer-to-peer overlay networks. SIGOPS Oper. Syst. Rev. 36, 299–314 (2002)

    CrossRef  Google Scholar 

  7. Wallach, D.S.: A survey of peer-to-peer security issues. In: Okada, M., Pierce, B.C., Scedrov, A., Tokuda, H., Yonezawa, A. (eds.) ISSS 2002. LNCS, vol. 2609, pp. 42–57. Springer, Heidelberg (2003)

    CrossRef  Google Scholar 

  8. Desmedt, Y., Frankel, Y.: Threshold cryptosystems. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol. 435, Springer, Heidelberg (1990)

    Google Scholar 

  9. Herzberg, A., Jakobsson, M., Jarecki, S., Krawczyk, H., Yung, M.: Proactive public key and signature systems. In: CCS 1997: Proceedings of the 4th ACM conference on Computer and communications security, New York, NY, USA, pp. 100–110. ACM Press, New York (1997)

    CrossRef  Google Scholar 

  10. Wolfl, T.: Public-key-infrastructure based on a peer-to-peer network. In: In: HICSS 2005: Proceedings of the 38th Annual Hawaii International Conference on System Sciences, vol. 7, pp. 200–201. IEEE Computer Society, Washington, DC, USA (2005)

    Google Scholar 

  11. Brampton, A., MacQuire, A., Rai, I.A., Race, N.J.P., Mathy, L.: Stealth distributed hash table: unleashing the real potential of peer-to-peer. In: CoNEXT 2005: Proceedings of the 2005 ACM conference on Emerging network experiment and technology, pp. 230–231. ACM Press, New York (2005), doi:10.1145/1095921.1095955

    CrossRef  Google Scholar 

  12. Heinbockel, W., Kwon, M.: Phyllo: a peer-to-peer overlay security framework. In: NPSec 2005: 1st IEEE ICNP Workshop on Secure Network Protocols, November 2005, pp. 43–48 (2005)

    Google Scholar 

  13. Kamvar, S.D., Schlosser, M.T., Garcia-Molina, H.: The eigentrust algorithm for reputation management in p2p networks. In: WWW 2003: Proceedings of the 12th international conference on World Wide Web, New York, pp. 640–651. ACM Press, New York (2003), doi:10.1145/775152.775242

    Google Scholar 

  14. Yu, B., Singh, M., Sycara, K.: Developing trust in large-scale peer-to-peer systems. In: IEEE First Symposium on Multi-Agent Security and Survivability, 2004, August 2004, pp. 1–10 (2004)

    Google Scholar 

  15. Datta, A., Hauswirth, M., Aberer, K.: Beyond web of trust: enabling p2p e-commerce. In: CEC 2003. IEEE International Conference on E-Commerce, June 2003, pp. 303–312 (2003)

    Google Scholar 

  16. Desmedt, Y., Jajodia, S.: Redistributing secret shares to new access structures and its applications. Technical Report ISSE TR-97-01, George Mason University (July 1997)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Javier Lopez Pierangela Samarati Josep L. Ferrer

Rights and permissions

Reprints and Permissions

Copyright information

© 2007 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Avramidis, A., Kotzanikolaou, P., Douligeris, C. (2007). Chord-PKI: Embedding a Public Key Infrastructure into the Chord Overlay Network. In: Lopez, J., Samarati, P., Ferrer, J.L. (eds) Public Key Infrastructure. EuroPKI 2007. Lecture Notes in Computer Science, vol 4582. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-73408-6_27

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-73408-6_27

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-73407-9

  • Online ISBN: 978-3-540-73408-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics