Affordable Access

Authentication in stealth distributed hash tables

Authors
Publication Date
Keywords
  • Engineering
  • Computing & Technology :: Computer Science [C05]
  • Ing√©nierie
  • Informatique & Technologie :: Sciences Informatiques [C05]
Disciplines
  • Computer Science

Abstract

Elsevier Editorial System(tm) for Journal of Systems Architecture Manuscript Draft Manuscript Number: Title: Authentication in Stealth Distributed Hash Tables Article Type: Special Issue: Euromicro SEAA 2006 Keywords: Distributed Hash Table; Peer-to-Peer; Security; Public Key Infrastructure; Stealth DHT Corresponding Author: Mr Andrew MacQuire, B.Sc (Hons.) Corresponding Author's Institution: Lancaster University First Author: Andrew MacQuire, B.Sc (Hons.) Order of Authors: Andrew MacQuire, B.Sc (Hons.); Andrew Brampton, B.Sc (Hons.); Idris A Rai, Ph. D; Nicholas J Race, Ph. D; Laurent Mathy, Ph. D Abstract: Most existing DHT algorithms assume that all nodes have equal capabilities. This assumption has previously been shown to be untrue in real deployments, where the heterogeneity of nodes can actually have a detrimental effect upon performance. We now acknowledge that nodes on the same overlay may also differ in terms of their trustworthiness. However, implementing and enforcing security policies in a network where all nodes are treated equally is a non-trivial task. We therefore extend our previous work on Stealth DHTs to consider the differentiation of nodes based on their trustworthiness rather than their capabilities alone. Authentication in Stealth Distributed Hash Tables Andrew MacQuire Andrew Brampton Idris A. Rai Nicholas J. P. Race Laurent Mathy Computing Department Lancaster University {macquire,brampton,rai,race,[email protected] Abstract Most existing DHT algorithms assume that all nodes have equal capabilities. This assumption has previously been shown to be untrue in real deployments, where the heterogeneity of nodes can actually have a detrimental effect upon performance. We now acknowledge that nodes on the same overlay may also differ in terms of their trustworthiness. However, implementing and enforcing security policies in a network where all nodes are treated equall

There are no comments yet on this publication. Be the first to share your thoughts.