DocumentCode
1018510
Title
Leveraging Identity-Based Cryptography for Node ID Assignment in Structured P2P Systems
Author
Butler, Kevin R B ; Ryu, Sunam ; Traynor, Patrick ; McDaniel, Patrick D.
Author_Institution
Dept. of Comput. Sci. & Eng., Pennsylvania State Univ., University Park, PA, USA
Volume
20
Issue
12
fYear
2009
Firstpage
1803
Lastpage
1815
Abstract
Structured peer-to-peer (P2P) systems have grown enormously because of their scalability, efficiency, and reliability. These systems assign a unique identifier to each user and object. However, current assignment schemes allow an adversary to carefully select user IDs and/or simultaneously obtain many pseudo-identities-ultimately leading to an ability to disrupt the P2P system in very targeted and dangerous ways. In this paper, we propose novel ID assignment protocols based on identity-based cryptography. This approach permits the acquisition of node IDs to be tightly regulated without many of the complexities and costs associated with traditional certificate solutions. We broadly consider the security requirements of ID assignment and present three protocols representing distinct threat and trust models. A detailed empirical study of the protocols is given. Our analysis shows that the cost of our identity-based protocols is nominal, and that the associated identity services can scale to millions of users using a limited number of servers.
Keywords
cryptographic protocols; peer-to-peer computing; ubiquitous computing; ID assignment protocols; leveraging identity-based cryptography; node ID assignment; structured P2P systems; trust models; Cryptographic controls; Distributed applications; Network Protocols; Network protocols; cryptographic controls.; distributed systems; peer-to-peer;
fLanguage
English
Journal_Title
Parallel and Distributed Systems, IEEE Transactions on
Publisher
ieee
ISSN
1045-9219
Type
jour
DOI
10.1109/TPDS.2008.249
Filename
4695827
Link To Document