Advertisement

SEPastry: Security Enhanced Pastry

  • Madhumita Mishra
  • Somanath Tripathy
  • Sathya Peri
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 176)

Abstract

Pastry is one of the most popular DHT overlay used in various distributed applications, because of its scalability, efficiency and reliability. On the other hand, Pastry is not resistant against the more generous attacks include Sybil attack, Eclipse attack etc. In this paper, we propose SEPastry (security enhanced pastry) to heighten the security features of Pastry without using any computational cryptographic primitives. SEPastry is found to be resistant against various forms of node-id attacks like Sybil attack, Eclipse attack, etc.

Keywords

Structured p2p Pastry Security node-id attack 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Rowstron, A., Druschel, P.: Pastry: Scalable, Decentralized Object Location, and Routing for Large-Scale Peer-to-Peer Systems. In: Guerraoui, R. (ed.) Middleware 2001. LNCS, vol. 2218, pp. 329–350. Springer, Heidelberg (2001)CrossRefGoogle Scholar
  2. 2.
    Rowstron, A., Kermarrec, A.-M., Druschel, P., Castro, M.: Scribe: The design of a large-scale event notification infrastructure. In: Intl. Workshop on Networked Group Communication (NGC 2001) (June 2001)Google Scholar
  3. 3.
    Cerri, D., Ghioni, A., Paraboschi, S., Tiraboschi, S.: ID mapping attacks in P2P networks. In: IEEE Global Telecommunications Conference, GLOBECOM 2005, December 3 (2005)Google Scholar
  4. 4.
    Rowaihy, H., William, E., Patrick, M., Porta, T.L.: Limiting sybil attacks in structured peer-to-peer networks. Technical Report NAS-TR-0017-2005, Network and Security Research Center, Department of Computer Science and Engineering, Pennsylvania State University, University Park, PA, USA (2005)Google Scholar
  5. 5.
    Dinger, J., Hartentstein: Defending the Sybil Attack in P2P Networks: Taxonomy, Challenges,and a Proposal for Self-Registration. In: Proc. 1st International Conference on Availability, Reliability and Security, Vienna, Austria, pp. 756–763. IEEE Computer Society Press, Los Alamitos (2006)Google Scholar
  6. 6.
    Douceur, J.R.: The Sybil Attack. In: Druschel, P., Kaashoek, M.F., Rowstron, A. (eds.) IPTPS 2002. LNCS, vol. 2429, pp. 251–260. Springer, Heidelberg (2002)CrossRefGoogle Scholar
  7. 7.
    Puttaswamy, K., Zheng, H., Zhao, B.: Securing structured overlays against identity attacks. IEEE Transactions on Paralleland Distributed Systems 2010, 1487–1498 (2009)CrossRefGoogle Scholar
  8. 8.
    Aiello, L.M., Milanesio, M., Ruffo, G., Schifanella, R.: Tampering Kadmelia with a Robust Identity Based System. Computer science Department - Universit‘a degli Studi di Torino, ItalyGoogle Scholar
  9. 9.
    Castro, M., Druschel, P., Ganesh, A., Rowstron, A., Wallach, D.S.: Secure routing for structured peer-to-peer overlay networks. In: Proc. of the 5th Usenix Symposium on Operating Systems Design and Implementation, Boston, MA (December 2002)Google Scholar
  10. 10.
    Margolin, N.B., Levine, B.N.: Informant: Detecting Sybils Using Incentives. In: Dietrich, S., Dhamija, R. (eds.) FC 2007 and USEC 2007. LNCS, vol. 4886, pp. 192–207. Springer, Heidelberg (2007)CrossRefGoogle Scholar
  11. 11.
    Druschel, P., Rowstron, A.: PAST: A large-scale, persistent peer-to-peer storage utility. In: Proc. HotOS VIII, Schloss Elmau, Germany (May 2001)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2012

Authors and Affiliations

  • Madhumita Mishra
    • 1
  • Somanath Tripathy
    • 1
  • Sathya Peri
    • 1
  1. 1.Indian Institute of Technology PatnaPatnaIndia

Personalised recommendations