Open Access
Subscription Access
Open Access
Subscription Access
Managing Trust and Detecting the Guilty Party in P2P Networks
Subscribe/Renew Journal
Our Enhanced system increases the security in data transfer and identifying the intruder in that communication. Due to the lack of secure routing protocols for unstructured overlays we have started to investigate a possible solution for these systems. Through analytical study and experimental results we demonstrate the secure routing protocols potential in providing a secure topology management service for a broad range of node classes and communication capabilities. We show that it is possible to combine security, scalability and adaptability in one mechanism allowing each node to achieve an adequate level of security to meet the overall system requirements. A data distributor has given sensitive data to a set of supposedly trusted agents (third parties). Some of the data are leaked and found in an unauthorized place. We propose data allocation strategies (across the agents) that improve the probability of identifying leakages. In some cases, we can also inject “realistic but fake” data records to further improve our chances of detecting leakage and identifying the guilty party.
Keywords
Distributed Hash Table, Routing Protocols, Secure Routing, Unstructured P2P.
User
Subscription
Login to verify subscription
Font Size
Information
Abstract Views: 251
PDF Views: 3