Research Article
Reliable Resource Searching in P2P Networks
497 downloads
@INPROCEEDINGS{10.1007/978-3-642-05284-2_25, author={Michael Goodrich and Jonathan Sun and Roberto Tamassia and Nikos Triandopoulos}, title={Reliable Resource Searching in P2P Networks}, proceedings={Security and Privacy in Communication Networks. 5th International ICST Conference, SecureComm 2009, Athens, Greece, September 14-18, 2009, Revised Selected Papers}, proceedings_a={SECURECOMM}, year={2012}, month={5}, keywords={peer-to-peer overlay networks distributed hash tables one-way hash functions digital signatures}, doi={10.1007/978-3-642-05284-2_25} }
- Michael Goodrich
Jonathan Sun
Roberto Tamassia
Nikos Triandopoulos
Year: 2012
Reliable Resource Searching in P2P Networks
SECURECOMM
Springer
DOI: 10.1007/978-3-642-05284-2_25
Abstract
We study the problem of securely searching for resources in p2p networks where a constant fraction of the peers may act maliciously. We present two novel hashing-based schemes that can be employed to reliably support and queries, limiting the ability of adversarial nodes to carry out attacks. Our schemes achieve scalability and load balancing and have small authentication overhead. In particular, for a network with peers, resources are securely located with (log ) messages and content from a collection of data items is securely retrieved with (log log) messages.
Copyright © 2009–2024 ICST