International Conference on Security and Privacy in Communication Networks. 10th International ICST Conference, SecureComm 2014, Beijing, China, September 24-26, 2014, Revised Selected Papers, Part I

Research Article

Securing Resource Discovery in Content Hosting Networks

Download
297 downloads
  • @INPROCEEDINGS{10.1007/978-3-319-23829-6_12,
        author={Sushama Karumanchi and Jingwei Li and Anna Squicciarini},
        title={Securing Resource Discovery in Content Hosting Networks},
        proceedings={International Conference on Security and Privacy in Communication Networks. 10th International ICST Conference, SecureComm 2014, Beijing, China, September 24-26, 2014, Revised Selected Papers, Part I},
        proceedings_a={SECURECOMM},
        year={2015},
        month={11},
        keywords={Resource discovery Query routing Security Content dissemination networks Malicious forwarding},
        doi={10.1007/978-3-319-23829-6_12}
    }
    
  • Sushama Karumanchi
    Jingwei Li
    Anna Squicciarini
    Year: 2015
    Securing Resource Discovery in Content Hosting Networks
    SECURECOMM
    Springer
    DOI: 10.1007/978-3-319-23829-6_12
Sushama Karumanchi1,*, Jingwei Li2, Anna Squicciarini1
  • 1: Pennsylvania State University
  • 2: Nankai University
*Contact email: sik5273@psu.edu

Abstract

Secure search query routing is a long-standing problem in distributed networks, which has often been addressed using “all-or-nothing” approaches, that require either full anonymity and encrypted routing or full trust on the routing nodes. An important problem with secure routing is how to guarantee the search query is transmitted in an expected way. In this paper, we tackle the problem of secure routing by considering a generic policy-driven routing approach, and focus on the steps required to verify in a fully distributed manner that a search query is routed in accordance to a requester’s preferences and detect cheating nodes. We present an efficient and effective verification method for query routes, that is agnostic to the specific routing algorithm being used and achieves strong security guarantees. We cast our approach in the context of content dissemination networks (CDN) and show through experimental evaluations the performance of our approach.