A security pattern for data integrity in P2P systems

Benjamin Schleinzer, Nobukazu Yoshioka

研究成果: Conference contribution

抄録

Peer-To-Peer-systems (P2P) introduced new methods to distribute large amounts of data to end users. To increase the distribution speed resources from all participating network nodes, the peers, are used, and therefore the workload on own resources decreases. To utilize all peers large data is split into small pieces, so called chunks, and these chunks are distributed among peers therefore making each chunk available on different peers. To identify and find chunks in P2P-systems hash algorithms are used, and each peer is responsible for a specific range of the hash's keyspace and all chunks that fall within this keyspace. With data stored on multiple peers new security risks in terms of confidentiality, integrity, and availability arise. Our security pattern targeted specifically for P2P-systems helps system designers to identify possible threats and show appropriate countermeasures. We show how secure hash algorithms can guarantee the integrity of the distributed data even though chunks are sent to, received from, and stored by multiple, possible untrustworthy, peers.

本文言語English
ホスト出版物のタイトルPLoP 2010 - 17th Conference on Pattern Languages of Programs, Proceedings
DOI
出版ステータスPublished - 2010
外部発表はい
イベント17th Conference on Pattern Languages of Programs, PLoP 2010 - Reno, NV, United States
継続期間: 2010 10月 162010 10月 18

出版物シリーズ

名前ACM International Conference Proceeding Series

Conference

Conference17th Conference on Pattern Languages of Programs, PLoP 2010
国/地域United States
CityReno, NV
Period10/10/1610/10/18

ASJC Scopus subject areas

  • ソフトウェア
  • 人間とコンピュータの相互作用
  • コンピュータ ビジョンおよびパターン認識
  • コンピュータ ネットワークおよび通信

フィンガープリント

「A security pattern for data integrity in P2P systems」の研究トピックを掘り下げます。これらがまとまってユニークなフィンガープリントを構成します。

引用スタイル