Flexible security in peer-to-peer applications: Enabling new opportunities beyond file sharing |
| |
Affiliation: | 1. Department of Informatics and Statistics, Federal University of Santa Catarina (UFSC), Campus Reitor João David Ferreira Lima, Trindade, Florianópolis 88040-970, Brazil;2. Institute of Computing, University of Campinas (UNICAMP), Av. Albert Einstein, 1251, Cidade Universitária, Campinas 13083-852, Brazil;3. BRGM, BP 6009, 45060 Orléans Cedex 2, France;4. Informatics Institute, Federal University of Rio Grande do Sul (UFRGS), Av. Bento Gonçalves, 9500, Campus do Vale, Porto Alegre 91501-970, Brazil;5. CEA-DRT - LIG Laboratory, University of Grenoble Alpes, 110 Avenue de la Chimie, 38400 Saint-Martin d’Hères, France;1. Federal University of Rio Grande do Sul, Brazil;2. University of Missouri-Kansas City, Missouri, USA;1. Instituto Federal de Educação Ciência e Tecnologia do Rio Grande do Sul, Porto Alegre, Brazil;2. Instituto de Informática, Universidade Federal do Rio Grande do Sul, Porto Alegre, Brazil;1. Institute of Physics, Federal University of Rio Grande do Sul,Av. Bento Gonçalves, 9500, Porto Alegre, 91501-970 RS, Brazil;2. Institute of Informatics, Federal University of Rio Grande do Sul, Av. Bento Gonçalves, 9500, Porto Alegre, 91501-970 RS, Brazil |
| |
Abstract: | The widespread adoption of P2P applications in environments beyond ordinary file sharing demands the fulfillment of several security requirements. Important steps have been taken towards security in P2P systems, with relevant mechanisms being proposed in the past to address specific vulnerabilities. However, existing approaches lack flexibility, since they do not (include enough mechanisms to) tackle a wide range of requirements in an integrated fashion. In addition, they oblige the user/application to manipulate a complex programming interface, as well as going through a cumbersome configuration process. To address these issues, we present P2PSL (P2P Security Layer), a software architecture that allows gradual and flexible integration of security functionality into P2P applications. To show concept and technical feasibility, we have implemented P2PSL, assessed the overhead it induces, and estimated the feasibility of incorporating the layer into two categories of real world P2P applications. |
| |
Keywords: | |
本文献已被 ScienceDirect 等数据库收录! |
|