Peer-To-Peer Storage: Security and Protocols
β Scribed by Nouha Oualha, Yves Roudier
- Publisher
- Nova Science Publishers
- Year
- 2010
- Tongue
- English
- Leaves
- 76
- Series
- Computer Science, Technology and Applications
- Category
- Library
No coin nor oath required. For personal study only.
β¦ Synopsis
Peer-to-peer (P2P) has proven as a most successful way to produce large scale, reliable, and cost-effective applications, as illustrated for file sharing or VoIP. P2P storage is an emerging field of application which allows peers to collectively leverage their resources towards ensuring the reliability and availability of user data. Providing assurances in both domains requires not only ensuring the confidentiality and privacy of the data storage process, but also thwarting peer misbehavior through the introduction of proper security and co-operation enforcement mechanisms. This book highlights how the continuous observation of peer behavior and monitoring of the storage process is an important requirement to secure a storage system.
β¦ Table of Contents
PEER-TO-PEER STORAGE: SECURITY AND PROTOCOLS......Page 6
CONTENTS......Page 8
PREFACE......Page 10
A. A Case for P2P Storage......Page 14
Anonymity......Page 16
Scalability......Page 17
Data Availability......Page 18
TRUST ESTABLISHMENT......Page 20
A. Static Trust......Page 21
B. Dynamic Trust......Page 22
2. Cooperation Incentives......Page 23
A. Requirements......Page 26
2. Security......Page 27
B. Verification Protocols......Page 28
Authenticator......Page 29
Compact Proofs of Retrievability......Page 30
Incremental Cryptography......Page 31
Homomorphic Hash Functions......Page 32
C. Delegable Verification Protocol......Page 33
1. Delegability......Page 34
a. Security Background......Page 36
b. Protocol Description......Page 37
d. Performance Analysis......Page 39
A. Bartering......Page 42
Direct Vs. Indirect Reputation......Page 43
Resistance to Bashing......Page 44
C. Payment......Page 45
Fair Exchange and Payment......Page 46
Preventing Starvation......Page 48
1. Game......Page 50
3. Game Equilibria......Page 51
1. Static games......Page 52
2. Dynamic games......Page 53
3. Whitewashing Problem......Page 57
c. Payment Incentive Modeling......Page 59
CONCLUSION......Page 62
REFERENCES......Page 64
INDEX......Page 72
π SIMILAR VOLUMES
This book presents initial steps towards creating secure systems that overcome attacks through adaptation. It provides a model explaining mobile code and methods for designing robust peer-to-peer networks. Methods are provided for implementing adaptive systems designed to tolerate many current attac
While people are now using peer-to-peer (P2P) applications for various processes, such as file sharing and video streaming, many research and engineering issues still need to be tackled in order to further advance P2P technologies. Peer-to-Peer Computing: Applications, Architecture, Protocols, and C
The field of structured P2P systems has seen fast growth upon the introduction of Distributed Hash Tables (DHTs) in the early 2000s. The first proposals, including Chord, Pastry, Tapestry, were gradually improved to cope with scalability, locality and security issues. By utilizing the processing and
<p><p>The field of structured P2P systems has seen fast growth upon the introduction of Distributed Hash Tables (DHTs) in the early 2000s. The first proposals, including Chord, Pastry, Tapestry, were gradually improved to cope with scalability, locality and security issues. By utilizing the processi