Security and Privacy in Communication Networks. 5th International ICST Conference, SecureComm 2009, Athens, Greece, September 14-18, 2009, Revised Selected Papers

Research Article

Reliable Resource Searching in P2P Networks

Download179 downloads
  • @INPROCEEDINGS{10.1007/978-3-642-05284-2_25,
        author={Michael Goodrich and Jonathan Sun and Roberto Tamassia and Nikos Triandopoulos},
        title={Reliable Resource Searching in P2P Networks},
        proceedings={Security and Privacy in Communication Networks. 5th International ICST Conference, SecureComm 2009, Athens, Greece, September 14-18, 2009, Revised Selected Papers},
        proceedings_a={SECURECOMM},
        year={2012},
        month={5},
        keywords={peer-to-peer overlay networks distributed hash tables one-way hash functions digital signatures},
        doi={10.1007/978-3-642-05284-2_25}
    }
    
  • Michael Goodrich
    Jonathan Sun
    Roberto Tamassia
    Nikos Triandopoulos
    Year: 2012
    Reliable Resource Searching in P2P Networks
    SECURECOMM
    Springer
    DOI: 10.1007/978-3-642-05284-2_25
Michael Goodrich1, Jonathan Sun2, Roberto Tamassia3, Nikos Triandopoulos
  • 1: U. California
  • 2: Univ. of Southern Mississippi
  • 3: Brown University

Abstract

We study the problem of securely searching for resources in p2p networks where a constant fraction of the peers may act maliciously. We present two novel hashing-based schemes that can be employed to reliably support and queries, limiting the ability of adversarial nodes to carry out attacks. Our schemes achieve scalability and load balancing and have small authentication overhead. In particular, for a network with peers, resources are securely located with (log ) messages and content from a collection of data items is securely retrieved with (log log) messages.