Peer-to-Peer Security

Allan Friedman and L. Jean Camp, Harvard University

Introduction

About Peer-to-Peer Systems

What Is Peer-to-Peer?

A Sample Architecture: Gnutella

Peer-to-Peer and Security

Implementing Secure Peer-to-Peer Systems

Anonymous Transport: Tarzan

Efficient Robust Routing: Secure Overlays

Censorship-Resistant Anonymous Publishing: Freenet and Free Haven

Secure Groupware: Groove

Secure Distributed Storage

Reputation and Accountability

Conclusion

Glossary

Cross References

References

INTRODUCTION

Peer-to-peer systems (P2P) have grown in importance over the past 5 years as an attractive way to mobilize the resources of Internet users. As more and more users have powerful processors, large storage spaces, and fast network connections, more actors seek to coordinate these resources for common goals. Because of their unique decentralized nature, security in these systems is both critical and an interesting problem. How do you secure a dynamic system without central coordination? Good security on P2P systems must reflect the design goals of the system itself. In this chapter, we introduce some basic concepts for P2P systems and their security demands and then discuss several case studies to highlight issues of robustness, privacy, and trust. We analyze systems that offer secure distributed routing, privacy-enhancing and censorship-resistance publishing, shared storage, and decentralized collaborative work spaces. We conclude by examining how accountability and trust mechanisms ...

Get Handbook of Information Security, Volume 1, Key Concepts, Infrastructure, Standards, and Protocols now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.