Open Access Open Access  Restricted Access Subscription or Fee Access

Managing Trust and Detecting the Guilty Party in P2P Networks

G. Nandhini, T. Kaleeswari, J. Brundha, G. MuthuKumar

Abstract


Our Enhanced system increases the security in data transfer and identifying the intruder in that communication. Due to the lack of secure routing protocols for unstructured overlays we have started to investigate a possible solution for these systems. Through analytical study and experimental results we demonstrate the secure routing protocols potential in providing a secure topology management service for a broad range of node classes and communication capabilities. We show that it is possible to combine security, scalability and adaptability in one mechanism allowing each node to achieve an adequate level of security to meet the overall system requirements. A data distributor has given sensitive data to a set of supposedly trusted agents (third parties). Some of the data are leaked and found in an unauthorized place. We propose data allocation strategies (across the agents) that improve the probability of identifying leakages. In some cases, we can also inject “realistic but fake” data records to further improve our chances of detecting leakage and identifying the guilty party.

Keywords


Distributed Hash Table, Routing Protocols, Secure Routing, Unstructured P2P.

Full Text:

PDF

References


Karl Aberer and Zoran Despotovic. Managing trust in a peer-2-peer information system.

Frank Kargl,Alfred Geib, Stefan Schlott,Michael Weber .Secure dynamic source routing, University of Ulm, Germany.

Stefan Kraxberger and Udo Payer. Security concept for peer-to-peer systems, Graz University of Technology, Graz, Austria.

Emil Sit and Robert Morris. Security considerations for peer-to-peer distributed hash tables. Laboratory for Computer Science, MIT.

Dan S. Wallach. A survey of peer-to-peer security issues. Rice University, Houston,TX 77005,USA.

Honghao Wang, Yingwu Zhu, and Yiming Hu. An efficient and secure peer-to-peer overlay network. In LCN '05,Universitry of Cincinnati, IEEE Conference on Local Computer Networks.

Miguel Castro1,Peter Druschel2,Ayalvadi Ganesh1, Antony Rowstron1, and Dan S. Wallach2, Secure routing for structured peer-to-peer overlay networks. Microsoft Research Ltd,Cambridge,UK1,Rice University,Houston,USA2 .

Thibault Cholez, Isabelle Chrisment and Olivier Festor, A Distributed and Adaptive Revocation Mechanism for P2P networks, MADYNES-INRIA Nancy-Grand Est,France.

Stefan Kraxberger, Scalable Secure routing for Heterogenous Unstructured P2P Networks, Graz University of Technology, Austria.

Jun-Won Ho,Matthew Wright,Sajal K Das,Fast Detection of Replica Node Attacks in Mobile Sensor Networks Using Sequential Analysis, IEEE Transactions on Mobile Computing,2011.


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.