𝔖 Scriptorium
✦   LIBER   ✦

πŸ“

Peer-To-Peer Storage: Security and Protocols

✍ Scribed by Nouha Oualha, Yves Roudier


Publisher
Nova Science Publishers
Year
2010
Tongue
English
Leaves
76
Series
Computer Science, Technology and Applications
Category
Library

⬇  Acquire This Volume

No coin nor oath required. For personal study only.

✦ Synopsis


Peer-to-peer (P2P) has proven as a most successful way to produce large scale, reliable, and cost-effective applications, as illustrated for file sharing or VoIP. P2P storage is an emerging field of application which allows peers to collectively leverage their resources towards ensuring the reliability and availability of user data. Providing assurances in both domains requires not only ensuring the confidentiality and privacy of the data storage process, but also thwarting peer misbehavior through the introduction of proper security and co-operation enforcement mechanisms. This book highlights how the continuous observation of peer behavior and monitoring of the storage process is an important requirement to secure a storage system.

✦ Table of Contents


PEER-TO-PEER STORAGE: SECURITY AND PROTOCOLS......Page 6
CONTENTS......Page 8
PREFACE......Page 10
A. A Case for P2P Storage......Page 14
Anonymity......Page 16
Scalability......Page 17
Data Availability......Page 18
TRUST ESTABLISHMENT......Page 20
A. Static Trust......Page 21
B. Dynamic Trust......Page 22
2. Cooperation Incentives......Page 23
A. Requirements......Page 26
2. Security......Page 27
B. Verification Protocols......Page 28
Authenticator......Page 29
Compact Proofs of Retrievability......Page 30
Incremental Cryptography......Page 31
Homomorphic Hash Functions......Page 32
C. Delegable Verification Protocol......Page 33
1. Delegability......Page 34
a. Security Background......Page 36
b. Protocol Description......Page 37
d. Performance Analysis......Page 39
A. Bartering......Page 42
Direct Vs. Indirect Reputation......Page 43
Resistance to Bashing......Page 44
C. Payment......Page 45
Fair Exchange and Payment......Page 46
Preventing Starvation......Page 48
1. Game......Page 50
3. Game Equilibria......Page 51
1. Static games......Page 52
2. Dynamic games......Page 53
3. Whitewashing Problem......Page 57
c. Payment Incentive Modeling......Page 59
CONCLUSION......Page 62
REFERENCES......Page 64
INDEX......Page 72


πŸ“œ SIMILAR VOLUMES


Disruptive Security Technologies with Mo
✍ R.R. Brooks πŸ“‚ Library πŸ“… 2004 πŸ› CRC Press 🌐 English

This book presents initial steps towards creating secure systems that overcome attacks through adaptation. It provides a model explaining mobile code and methods for designing robust peer-to-peer networks. Methods are provided for implementing adaptive systems designed to tolerate many current attac

Peer-to-Peer Computing: Applications, Ar
✍ Yu-Kwong Ricky Kwok πŸ“‚ Library πŸ“… 2011 πŸ› CRC Press 🌐 English

While people are now using peer-to-peer (P2P) applications for various processes, such as file sharing and video streaming, many research and engineering issues still need to be tackled in order to further advance P2P technologies. Peer-to-Peer Computing: Applications, Architecture, Protocols, and C

Structured Peer-to-Peer Systems: Fundame
✍ Dmitry Korzun, Andrei Gurtov πŸ“‚ Library πŸ“… 2012 πŸ› Springer 🌐 English

The field of structured P2P systems has seen fast growth upon the introduction of Distributed Hash Tables (DHTs) in the early 2000s. The first proposals, including Chord, Pastry, Tapestry, were gradually improved to cope with scalability, locality and security issues. By utilizing the processing and

Structured Peer-to-Peer Systems: Fundame
✍ Dmitry Korzun, Andrei Gurtov (auth.) πŸ“‚ Library πŸ“… 2013 πŸ› Springer-Verlag New York 🌐 English

<p><p>The field of structured P2P systems has seen fast growth upon the introduction of Distributed Hash Tables (DHTs) in the early 2000s. The first proposals, including Chord, Pastry, Tapestry, were gradually improved to cope with scalability, locality and security issues. By utilizing the processi