Abstract
Our goal in this paper is to provide authentication, encryption and non-repudiation services for nodes within Peer-to-Peer networks, in an efficient and scalable way. To accomplish this, we propose a distributed Public Key Infrastructure model, suitable for Peer-to-Peer networks and more particularly for the Chord protocol. Our solution integrates the PKI infrastructure within the Chord architecture. We use well known cryptographic techniques as building blocks, such as threshold cryptography and proactive updating.
Keywords
- Overlay Network
- Malicious Node
- Distribute Hash Table
- Threshold Cryptography
- Incoming Node
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
Research funded by the General Secretariat for Research and Technology (GSRT) of Greece under a PENED grant.
This is a preview of subscription content, access via your institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Stoica, I., Morris, R., Liben-Nowell, D., Karger, D., Dabek, F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on Networking 11(1), 17–32 (2003)
Ratnasamy, S., Francis, P., Handley, M., Karp, R., Schenker, S.: A scalable content-addressable network. In: SIGCOMM 2001: Proceedings of the 2001 conference on Applications, technologies, architectures, and protocols for computer communications, New York, NY, USA, pp. 161–172. ACM Press, New York (2001)
Rowstron, A.I.T., Druschel, P.: Pastry: Scalable, decentralized object location, and routing for large-scale peer-to-peer systems. In: Middleware 2001: Proceedings of the IFIP/ACM International Conference on Distributed Systems Platforms, pp. 329–350. Springer, Heidelberg (2001)
Risson, J., Moors, T.: Survey of research towards robust peer-to-peer networks: Search methods. Elsevier Computer Networks 50(17), 3495–3521 (2006)
Sit, E., Morris, R.: Security considerations for peer-to-peer distributed hash tables. In: Druschel, P., Kaashoek, M.F., Rowstron, A. (eds.) IPTPS 2002. LNCS, vol. 2429, pp. 261–269. Springer, Heidelberg (2002)
Castro, M., Druschel, P., Ganesh, A., Rowstron, A., Wallach, D.S.: Secure routing for structured peer-to-peer overlay networks. SIGOPS Oper. Syst. Rev. 36, 299–314 (2002)
Wallach, D.S.: A survey of peer-to-peer security issues. In: Okada, M., Pierce, B.C., Scedrov, A., Tokuda, H., Yonezawa, A. (eds.) ISSS 2002. LNCS, vol. 2609, pp. 42–57. Springer, Heidelberg (2003)
Desmedt, Y., Frankel, Y.: Threshold cryptosystems. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol. 435, Springer, Heidelberg (1990)
Herzberg, A., Jakobsson, M., Jarecki, S., Krawczyk, H., Yung, M.: Proactive public key and signature systems. In: CCS 1997: Proceedings of the 4th ACM conference on Computer and communications security, New York, NY, USA, pp. 100–110. ACM Press, New York (1997)
Wolfl, T.: Public-key-infrastructure based on a peer-to-peer network. In: In: HICSS 2005: Proceedings of the 38th Annual Hawaii International Conference on System Sciences, vol. 7, pp. 200–201. IEEE Computer Society, Washington, DC, USA (2005)
Brampton, A., MacQuire, A., Rai, I.A., Race, N.J.P., Mathy, L.: Stealth distributed hash table: unleashing the real potential of peer-to-peer. In: CoNEXT 2005: Proceedings of the 2005 ACM conference on Emerging network experiment and technology, pp. 230–231. ACM Press, New York (2005), doi:10.1145/1095921.1095955
Heinbockel, W., Kwon, M.: Phyllo: a peer-to-peer overlay security framework. In: NPSec 2005: 1st IEEE ICNP Workshop on Secure Network Protocols, November 2005, pp. 43–48 (2005)
Kamvar, S.D., Schlosser, M.T., Garcia-Molina, H.: The eigentrust algorithm for reputation management in p2p networks. In: WWW 2003: Proceedings of the 12th international conference on World Wide Web, New York, pp. 640–651. ACM Press, New York (2003), doi:10.1145/775152.775242
Yu, B., Singh, M., Sycara, K.: Developing trust in large-scale peer-to-peer systems. In: IEEE First Symposium on Multi-Agent Security and Survivability, 2004, August 2004, pp. 1–10 (2004)
Datta, A., Hauswirth, M., Aberer, K.: Beyond web of trust: enabling p2p e-commerce. In: CEC 2003. IEEE International Conference on E-Commerce, June 2003, pp. 303–312 (2003)
Desmedt, Y., Jajodia, S.: Redistributing secret shares to new access structures and its applications. Technical Report ISSE TR-97-01, George Mason University (July 1997)
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 2007 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Avramidis, A., Kotzanikolaou, P., Douligeris, C. (2007). Chord-PKI: Embedding a Public Key Infrastructure into the Chord Overlay Network. In: Lopez, J., Samarati, P., Ferrer, J.L. (eds) Public Key Infrastructure. EuroPKI 2007. Lecture Notes in Computer Science, vol 4582. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-73408-6_27
Download citation
DOI: https://doi.org/10.1007/978-3-540-73408-6_27
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-73407-9
Online ISBN: 978-3-540-73408-6
eBook Packages: Computer ScienceComputer Science (R0)
