The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Due to their nature, Peer-to-Peer (P2P) systems are subject to a wide range of security issues. In this paper, we focus on a specific security property, called the root authenticity (or RA) property of the so-called structured P2P overlays. We propose a P2P architecture that uses Trusted Computing as the security mechanism. We formalize that system using a process algebra (CSP), then verify that it...
Sharing data from various sources and of diverse kinds, and fusing them together for sophisticated analytics and mash-up applications are emerging trends, and are prerequisites for realizing grand visions such as that of cyber-physical systems enabled smart cities. Cloud infrastructure can enable such data sharing both because it can scale easily to an arbitrary volume of data and computation needs...
Peer-to-peer (P2P) based marketplaces have a number of advantages over traditional centralized systems (such as eBay). Peers form a distributed hash table and store sale offers for other peers. A key problem in such a system is ensuring that the peers store and report all sale offers fairly, and do not for instance favor their own offers. We give a solution to this problem based on trusted computing,...
P2P systems have witnessed phenomenal development in recent years. Evaluating and analyzing new and existing algorithms and techniques is a key issue for developers of P2P systems. In this context, simulation is an important tool for P2P developers. However, such systems are often very large and few existing simulators offer the ability to execute simulations with an Internet scale. In this paper...
We propose a reputation-based trust model for P2P applications and study it in a security framework. This framework makes it easy to reason about the resilience of the reputation metrics against Sybil attacks. We show that using the PageRank reputation metric in a P2P system can make it very vulnerable to Sybil attacks. We then propose a new reputation metric, based on the original PageRank, and show...
Distributed hash tables (DHTs) often maintain additional routing information regarding each node's surrounding neighbors within a network overlay. Sequential neighbors play a critical role in network recovery, providing alternative routes thus allowing more flexible and robust routing around a overlay. This paper details our analysis of a existing DHT routing protocol under continuously dynamic network...
P2P systems have witnessed phenomenal development in recent years, evaluating and analysing new and existing new algorithms and techniques is a key issue for developers of p2p systems. In this context Simulation is an important tool for p2p developers. However, such systems are often very large and few existing simulators offer the ability to execute systems of real world size. In this paper we present...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.