TY - GEN
T1 - Reliable resource searching in P2P networks
AU - Goodrich, Michael T.
AU - Sun, Jonathan Z.
AU - Tamassia, Roberto
AU - Triandopoulos, Nikos
PY - 2009
Y1 - 2009
N2 - We study the problem of securely searching for resources in p2p networks where a constant fraction of the peers may act maliciously. We present two novel hashing-based schemes that can be employed to reliably support resource location and content retrieval queries, limiting the ability of adversarial nodes to carry out attacks. Our schemes achieve scalability and load balancing and have small authentication overhead. In particular, for a network with n peers, resources are securely located with O(log2n) messages and content from a collection of m data items is securely retrieved with O(lognlogm) messages.
AB - We study the problem of securely searching for resources in p2p networks where a constant fraction of the peers may act maliciously. We present two novel hashing-based schemes that can be employed to reliably support resource location and content retrieval queries, limiting the ability of adversarial nodes to carry out attacks. Our schemes achieve scalability and load balancing and have small authentication overhead. In particular, for a network with n peers, resources are securely located with O(log2n) messages and content from a collection of m data items is securely retrieved with O(lognlogm) messages.
KW - Digital signatures
KW - Distributed hash tables
KW - Oneway hash functions
KW - Overlay networks
KW - Peer-to-peer
UR - http://www.scopus.com/inward/record.url?scp=84885888809&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84885888809&partnerID=8YFLogxK
U2 - 10.1007/978-3-642-05284-2_25
DO - 10.1007/978-3-642-05284-2_25
M3 - Conference contribution
AN - SCOPUS:84885888809
SN - 3642052835
SN - 9783642052835
T3 - Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering
SP - 437
EP - 447
BT - Security and Privacy in Communication Networks - 5th International ICST Conference, SecureComm 2009, Revised Selected Papers
T2 - 5th International ICST Conference on Security and Privacy in Communication Networks, SecureComm 2009
Y2 - 14 September 2009 through 18 September 2009
ER -