Um serviço para prover autenticação e revogação de nós na rede DHT
Resumo
Este artigo tem como objetivo propor e implementar um serviço para prover autenticação na rede DHT através de certificados digitais, além disso oferecer uma forma reativa de revogação de nós.
Palavras-chave:
Segurança em sistemas distribuídos e paralelos
Referências
Ismail, H., Germanus, D., and Suri, N. (2016). Malicious peers eviction for p2p overlays. In 2016 IEEE Conference on Communications and Network Security (CNS), pages 216–224.
Kohnen, M., Gerbecks, J., and P Rathgeb, E. (2011). Applying certificate-based routing to a kademlia- based distributed hash table.
Maymounkov, P. and Mazieres, D. (2002). Kademlia: A peer-to-peer information system based on the xor metric. In International Workshop on Peer-to-Peer Systems, pages 53–65. Springer.
Pecori, R. (2015). Trust-based storage in a kademlia network infected by sybils. pages 1–5.
Rahimi, N., Sinha, K., Gupta, B., Rahimi, S., and Debnath, N. C. (2016). Ldepth: A low diameter hierarchical p2p network architecture. pages 832–837.
Savoir-faire Linux Inc (2019). Opendht. Acesso em 20 jul. 2019.
Shin, J., Islam, M. R., Rahim, M. A., and Mun, H.-J. (2019). Arm movement activity based user authentication in p2p systems. Peer-to-Peer Networking and Applications, pages 1–12.
Srinivasan, A. and Aldharrab, H. (2019). Xtra—extended bit-torrent protocol for authenticated covert peer communication. Peer-to-Peer Networking and Applications, 12(1):143–157.
Tang, X., Xu, J., and Lee, W. (2008). Analysis of ttl-based consistency in unstructured peer-to-peer networks. IEEE Transactions on Parallel and Distributed Systems, 19(12):1683–1694.
U.S. Naval Research Lab (2015). Core manual. Acesso em 20 jul. 2019.
Xinxing, Z., Zhihong, T., and Luchen, Z. (2016). A measurement study on mainline dht and magnet link. In 2016 IEEE First International Conference on Data Science in Cyberspace (DSC), pages 11–19.
Kohnen, M., Gerbecks, J., and P Rathgeb, E. (2011). Applying certificate-based routing to a kademlia- based distributed hash table.
Maymounkov, P. and Mazieres, D. (2002). Kademlia: A peer-to-peer information system based on the xor metric. In International Workshop on Peer-to-Peer Systems, pages 53–65. Springer.
Pecori, R. (2015). Trust-based storage in a kademlia network infected by sybils. pages 1–5.
Rahimi, N., Sinha, K., Gupta, B., Rahimi, S., and Debnath, N. C. (2016). Ldepth: A low diameter hierarchical p2p network architecture. pages 832–837.
Savoir-faire Linux Inc (2019). Opendht. Acesso em 20 jul. 2019.
Shin, J., Islam, M. R., Rahim, M. A., and Mun, H.-J. (2019). Arm movement activity based user authentication in p2p systems. Peer-to-Peer Networking and Applications, pages 1–12.
Srinivasan, A. and Aldharrab, H. (2019). Xtra—extended bit-torrent protocol for authenticated covert peer communication. Peer-to-Peer Networking and Applications, 12(1):143–157.
Tang, X., Xu, J., and Lee, W. (2008). Analysis of ttl-based consistency in unstructured peer-to-peer networks. IEEE Transactions on Parallel and Distributed Systems, 19(12):1683–1694.
U.S. Naval Research Lab (2015). Core manual. Acesso em 20 jul. 2019.
Xinxing, Z., Zhihong, T., and Luchen, Z. (2016). A measurement study on mainline dht and magnet link. In 2016 IEEE First International Conference on Data Science in Cyberspace (DSC), pages 11–19.
Publicado
16/09/2019
Como Citar
GARCIA, Jean; DIAS, Lucas; RIZZETTI, Tiago Antônio.
Um serviço para prover autenticação e revogação de nós na rede DHT. In: ESCOLA REGIONAL DE REDES DE COMPUTADORES (ERRC), 17. , 2019, Alegrete.
Anais [...].
Porto Alegre: Sociedade Brasileira de Computação,
2019
.
p. 160-165.
DOI: https://doi.org/10.5753/errc.2019.9231.