Skip to main content

A Trustworthy ID Management Mechanism in Open Market

  • Conference paper
Information Security, Practice and Experience (ISPEC 2010)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 6047))

  • 658 Accesses

Abstract

The Peer-to-Peer(P2P) network has been growing dramatically in popularity over the last decade. In this paper we present the trustworthy Identity(ID) management method to provide reliable P2P open market service. In particular, we focus on the duplicated joining, privacy issues and non-repudiation problems in service. For safe usage of the P2P based e-commerce, the security issues about the identity management in P2P network which given the inherently untrustworthy nature, should be highlighted most of all, and this paper proposed the method for resolving the vulnerability in ID management of the P2P open market.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. eBay Inc. ebay (2003), http://www.ebay.com

  2. Datta, A., et al.: Beyond web of trust: Enabling P2P E-commerce. In: Proceedings of the IEEE International Conference on E-Commerce (CEC 2003), IEEE, Los Alamitos (2003)

    Google Scholar 

  3. Feldman, M., et al.: Free-Riding and White-washing in Peer-to-Peer Systems. In: The 3rd Annual Workshop on Economics and information Security, SEIS 2004 (2004)

    Google Scholar 

  4. Sur, S., Jung, J.W., et al.: A fair and reliable P2P E-commerce model based on collaboration with distributed peers. In: Pal, A., Kshemkalyani, A.D., Kumar, R., Gupta, A. (eds.) IWDC 2005. LNCS, vol. 3741, pp. 380–391. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  5. Auction Inc. emph (2009), http://www.auction.co.kr

  6. Kwok, S.H., et al.: A Server-mediated Peer-to-peer System. In: ACM SIGccom Exchanges (April 2005)

    Google Scholar 

  7. Housley, R., et al.: Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile. In: RFC3280, IETF (April 2002)

    Google Scholar 

  8. The Napster homepage (2009), http://www.hapster.com/

  9. Milojicic, D.S., Kalogeraki, V., et al.: Peer-to-Peer Computing, HPL-2002-57 (2002)

    Google Scholar 

  10. Mondal, A., Kitsuregawa, M.: Privacy, Security and Trust in P2P environment: A Perspective. In: Database and Expert Systems Applications, DEXA 2006 (2006)

    Google Scholar 

  11. Belenkiy, M., et al.: Making p2p accountable without losing privacy. In: Workshop on Privacy in the Electonic Society. ACM, New York (2007)

    Google Scholar 

  12. Choi, D., et al.: A Personal Information Leakage Prevention Method on the Internet. In: ISCE 2006 (2006)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2010 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Jeun, I., Won, D. (2010). A Trustworthy ID Management Mechanism in Open Market. In: Kwak, J., Deng, R.H., Won, Y., Wang, G. (eds) Information Security, Practice and Experience. ISPEC 2010. Lecture Notes in Computer Science, vol 6047. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-12827-1_17

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-12827-1_17

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-12826-4

  • Online ISBN: 978-3-642-12827-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics