Efficient Content Authentication over Distributed Hash Tables

نویسندگان

  • Roberto Tamassia
  • Nikos Triandopoulos
چکیده

We study a new model for data authentication over peer-to-peer storage networks, where data is stored, queried and authenticated in a totally distributed fashion. The model captures the security requirements of emerging distributed computing applications. We present an efficient implementation of a distributed Merkle tree, which realizes a Merkle tree over a peer-to-peer network, thus extending a fundamental cryptographic authentication technique to a peer-topeer distributed environment. We show how our distributed Merkle tree can be used to design an efficient authenticated distributed hash table. Our scheme is built on top of a broad class of existing distributed hash table implementations, is efficient, and achieves generality by only using the basic functionality of object location. We use this scheme to implement the first distributed authenticated dictionary.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Efficient Content Authentication in Peer-to-Peer Networks

We study a new model for data authentication over peer-topeer (p2p) storage networks, where data items are stored, queried and authenticated in a totally decentralized fashion. The model captures the security requirements of emerging distributed computing applications. We present an efficient construction of a distributed Merkle tree (DMT), which realizes an authentication tree over a p2p netwo...

متن کامل

Prefix Hash Tree An Indexing Data Structure over Distributed Hash Tables

Distributed Hash Tables are scalable, robust, and self-organizing peer-to-peer systems that support exact match lookups. This paper describes the design and implementation of a Prefix Hash Tree a distributed data structure that enables more sophisticated queries over a DHT. The Prefix Hash Tree uses the lookup interface of a DHT to construct a trie-based structure that is both efficient (update...

متن کامل

CHAP: Enabling Efficient Hardware-Based Multiple Hash Schemes for IP Lookup

Building a high performance IP lookup engine remains a challenge due to increasingly stringent throughput requirements and the growing size of IP tables. An emerging approach for IP lookup is the use of set associative memory architecture, which is basically a hardware implementation of an open addressing hash table with the property that each row of the hash table can be searched in one memory...

متن کامل

Hashing Spatial Content over Peer-to-Peer Networks

The Internet has become the common medium for content distribution. Searching content using keywords is well-known. But there are many shortcomings to it. Users cannot search within the content and on many of the attributes of the content, i.e., other than its name. Content is also becoming increasingly decentralized. New mechanisms allowing access to complex distributed content is needed. We i...

متن کامل

Distributed Lookup in Structured Peer-to-Peer Ad-Hoc Networks

Various peer-to-peer (P2P) architectures for ad-hoc networks have been proposed over the last few years. Most of them are unstructured and use some form of flooding to locate content, because the physical constraints of the underlying network make the construction of arbitrary application-layer overlays impractical. In this paper, we study the problem of applying distributed hash tables (DHT) t...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2005