A Secure Peer-to-Peer Application Framework

نویسندگان

  • Joakim Koskela
  • Jukka K. Nurminen
چکیده

Aalto University, P.O. Box 11000, FI-00076 Aalto www.aalto.fi Author Joakim Koskela Name of the doctoral dissertation A Secure Peer-to-Peer Application Framework Publisher School of Science Unit Department of Computer Science Series Aalto University publication series DOCTORAL DISSERTATIONS 14/2015 Field of research Network architectures and security Manuscript submitted 25 February 2011 Date of the defence 2 February 2015 Permission to publish granted (date) 18 November 2014 Language English Monograph Article dissertation (summary + original articles) Abstract The nature of the Internet has changed dramatically. From a modest research network, it has evolved into one of the most important fabrics of our modern society, affecting the lives of billions each day. We rely on it for everything from performing our daily chores to accessing rich media and keeping in touch with our friends. Despite this change, service provisioning has largely remained intact. Services are provided in a centralized manner, resulting in bottlenecks and vulnerable collections of, often unwittingly, submitted sensitive information. Peer-to-peer (P2P) technologies have the potential to provide a better alternative for future networking. P2P services distribute the load from a single node to a network of peers, relying on the resources of the end-users themselves. Not only does it remove the bottlenecks, it has the potential to provide a more personal and safe networking environment. In this dissertation, we inspect the feasibility and implications of a generic, cross-application, P2P framework. We present the design and implementation of a framework that uses existing infrastructure and advanced networking protocols to create a secure environment. Using this framework, applications are able to benefit from P2P networking without having to deploy new infrastructure or implement complex connectionand identity management. Users benefit from using a single, strong, cross-application identity management and having better control over their data. This improves the trust within the system and enables new ways of dealing with security threats. We demonstrate the feasibility of the framework by evaluating the performance and usability of the prototype implementation. This provides a model for future networking applications and insight into the security and usability issues these will face.The nature of the Internet has changed dramatically. From a modest research network, it has evolved into one of the most important fabrics of our modern society, affecting the lives of billions each day. We rely on it for everything from performing our daily chores to accessing rich media and keeping in touch with our friends. Despite this change, service provisioning has largely remained intact. Services are provided in a centralized manner, resulting in bottlenecks and vulnerable collections of, often unwittingly, submitted sensitive information. Peer-to-peer (P2P) technologies have the potential to provide a better alternative for future networking. P2P services distribute the load from a single node to a network of peers, relying on the resources of the end-users themselves. Not only does it remove the bottlenecks, it has the potential to provide a more personal and safe networking environment. In this dissertation, we inspect the feasibility and implications of a generic, cross-application, P2P framework. We present the design and implementation of a framework that uses existing infrastructure and advanced networking protocols to create a secure environment. Using this framework, applications are able to benefit from P2P networking without having to deploy new infrastructure or implement complex connectionand identity management. Users benefit from using a single, strong, cross-application identity management and having better control over their data. This improves the trust within the system and enables new ways of dealing with security threats. We demonstrate the feasibility of the framework by evaluating the performance and usability of the prototype implementation. This provides a model for future networking applications and insight into the security and usability issues these will face.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Medusa- Framework for Secure Peer-to-peer Sharing of Topic-map Based Knowledge

In this paper we introduce a framework for the secure sharing of digital information in a natural and flexible way, following well established work processes. Topic maps are used as a generic data model to organize and exchange domain knowledge. The framework packages information in a way so that it can be delivered securely, for communication and data exchange it implements a peer-to-peer appr...

متن کامل

Cooperative Policy Control for Peer-to-Peer Data Distribution

Many network applications (such as swarming downloads, peer-to-peer video streaming and file sharing) are made possible by using large groups of peers to distribute and process data. Securing data in such a system requires not just data originators, but also those “distributors,” to enforce access control, verify integrity, or make other content-specific security decisions for the replicated or...

متن کامل

Facilitators and Barriers in Application of Peer Learning in Clinical Education according to Nursing Students

Introduction: Peer teaching/learning is an effective educational intervention for students of health sciences in clinical settings. This study explores facilitators and barriers in application of this method in clinical settings. Methods: It is a content analysis qualitative study in which the focus group discussion is used for data gathering. Two groups of nursing students (n=15) of Bushehr U...

متن کامل

An identity-based approach to secure P2P applications with Likir

Structured overlay networks are highly susceptible to attacks aimed at subverting their structure or functionalities. Although many secure architectural design proposals have been presented in the past, a widely accepted and comprehensive solution is lacking. Likir (Layered Identity-based Kademlia-like Infrastructure) is our solution for implementing a secure Peerto-Peer network based on a Dist...

متن کامل

Application of a Heuristic Cybernetic Model in Peer-reviewing Process of Scholarly Papers

Background and Aim: This study attempts to show the cybernetics approach on peer reviewing articles to recommend an appropriate solution for increasing the qualitative level of published articles in scientific journals. Method: Heuristic Cybernetics method is suggested, based on the scientific experiences of related researches and also the mathematical principles that is an appropriate formed s...

متن کامل

Integrated Framework for Authentication and Access Control in Peer to Peer Groups

Collaborative applications like video/audio conferencing, IP telephony, file sharing, collaborative work spaces, and multi-user games, having varied security requirements, require a secure and reliable group communication system to provide co-ordination among the processes. Peer to peer computing allows users to interact with each other and find and share resources without requiring a centraliz...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2015