Abstract
The Peer-to-Peer(P2P) network has been growing dramatically in popularity over the last decade. In this paper we present the trustworthy Identity(ID) management method to provide reliable P2P open market service. In particular, we focus on the duplicated joining, privacy issues and non-repudiation problems in service. For safe usage of the P2P based e-commerce, the security issues about the identity management in P2P network which given the inherently untrustworthy nature, should be highlighted most of all, and this paper proposed the method for resolving the vulnerability in ID management of the P2P open market.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
eBay Inc. ebay (2003), http://www.ebay.com
Datta, A., et al.: Beyond web of trust: Enabling P2P E-commerce. In: Proceedings of the IEEE International Conference on E-Commerce (CEC 2003), IEEE, Los Alamitos (2003)
Feldman, M., et al.: Free-Riding and White-washing in Peer-to-Peer Systems. In: The 3rd Annual Workshop on Economics and information Security, SEIS 2004 (2004)
Sur, S., Jung, J.W., et al.: A fair and reliable P2P E-commerce model based on collaboration with distributed peers. In: Pal, A., Kshemkalyani, A.D., Kumar, R., Gupta, A. (eds.) IWDC 2005. LNCS, vol. 3741, pp. 380–391. Springer, Heidelberg (2005)
Auction Inc. emph (2009), http://www.auction.co.kr
Kwok, S.H., et al.: A Server-mediated Peer-to-peer System. In: ACM SIGccom Exchanges (April 2005)
Housley, R., et al.: Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile. In: RFC3280, IETF (April 2002)
The Napster homepage (2009), http://www.hapster.com/
Milojicic, D.S., Kalogeraki, V., et al.: Peer-to-Peer Computing, HPL-2002-57 (2002)
Mondal, A., Kitsuregawa, M.: Privacy, Security and Trust in P2P environment: A Perspective. In: Database and Expert Systems Applications, DEXA 2006 (2006)
Belenkiy, M., et al.: Making p2p accountable without losing privacy. In: Workshop on Privacy in the Electonic Society. ACM, New York (2007)
Choi, D., et al.: A Personal Information Leakage Prevention Method on the Internet. In: ISCE 2006 (2006)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2010 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Jeun, I., Won, D. (2010). A Trustworthy ID Management Mechanism in Open Market. In: Kwak, J., Deng, R.H., Won, Y., Wang, G. (eds) Information Security, Practice and Experience. ISPEC 2010. Lecture Notes in Computer Science, vol 6047. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-12827-1_17
Download citation
DOI: https://doi.org/10.1007/978-3-642-12827-1_17
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-12826-4
Online ISBN: 978-3-642-12827-1
eBook Packages: Computer ScienceComputer Science (R0)