Pair-wise Cryptographic Models for Secure Data Exchange in P2P Database Management Systems
نویسندگان
چکیده
A peer-to-peer database management system(P2PDBMS) is a collection of autonomous data sources, called peers. In this system each peer augments a conventional database management system with an inter-operability layer (i.e. mappings/policies) for sharing data and services. Peers exchange data in a pair-wise fashion on-the-fly in response to a query without any centralized control. Generally, the communication link between two peers is insecure and peers create a temporary session while exchanging data. When peers exchange highly confidential data between them over an insecure communication network, such as the Internet, the data might be trapped and disclosed by the intruders. In a P2PDBMS there is no centralized control for data exchange, hence we cannot assume any central third party security infrastructure (e.g. PKI) to protect confidential data. So far, there is currently no available/existing security protocol for secured data exchange in P2PDBMS. In this paper we propose three models for secure data exchange in P2PDBMSs and the corresponding security protocols. The proposed protocol allows the peers to compute their secret session keys dynamically during data exchange based on the policies between them. Our proposed protocol is robust against the man-in-the middle attack, the masquerade attack, and the reply attack.
منابع مشابه
Secure and Effective P2P Reputation System using Trust Management and Self Certified Cryptographic Exchanges
The main reason behind the success of Peer-to-Peer (P2P) networks is the anonymity and the utility offered by them to the users. The Client-server security policies implemented in centralized distributed systems do not provide a desirable solution for P2P networks to store peer reputation information. Though a centralized system does exist, it is prone to Sybil attack that can significantly red...
متن کاملMédiation de données sémantique dans SenPeer, un système pair-à-pair de gestion de données
The so-called information society needs an efficient access to the available information which is oftenheterogeneous and distributed. In order to make information sharing efficient, some technical solutionshave been proposed. The concept of distributed database has been introduced in order to organize acollection of multiple and logically bound databases spread across a computer net...
متن کاملPublic Key Cryptography by Centralized offline Server in Mission-Critical Networks
–Mission-Critical networks show great potential in assisted living system, automotive networks, emergency rescue and disaster recovery system, military applications, critical infrastructure monitoring system. To build a secure communication system in that network, usually the first attempt is to employ cryptographic keys. Cryptographic key management is challenging due to the things like unreli...
متن کاملPattern Language for Cryptographic Key Management
Many services in a distributed public network like the Internet require secure communications. Security in communications consists of confidentiality, integrity, authenticity, and non-repudiability. These aims can be achieved with cryptography. Key management plays a fundamental role in secure communications, as it is the basis of all cryptographic functions. This paper describes a pattern lang...
متن کاملBuilding database coordination in P2P systems using ECA rules
Recently, data integration systems and peer database management systems that attempt to model and integrate data in a peer-to-peer (p2p) environment have attracted the attention of researches. Such systems give opportunities to the local relational database management system to exchange data with other nodes in a p2p environment. The databases systems in p2p are completely autonomous, heterogen...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- IACR Cryptology ePrint Archive
دوره 2010 شماره
صفحات -
تاریخ انتشار 2010