DocumentCode :
2496529
Title :
Authentication in Stealth Distributed Hash Tables
Author :
MacQuire, Andrew ; Brampton, Andrew ; Rai, Idris A. ; Race, Nicholas J P ; Mathy, Laurent
Author_Institution :
Dept. of Comput., Lancaster Univ.
fYear :
2006
fDate :
Aug. 29 2006-Sept. 1 2006
Firstpage :
348
Lastpage :
355
Abstract :
Most existing DHT algorithms assume that all nodes have equal capabilities. This assumption has previously been shown to be untrue in real deployments, where the heterogeneity of nodes can actually have a detrimental effect upon performance. In this paper, we acknowledge that nodes on the same overlay may also differ in terms of their trustworthiness. However, implementing and enforcing security policies in a network where all nodes are treated equally is a non-trivial task. We therefore extend our previous work on stealth DHTs to consider the differentiation of nodes based on their trustworthiness rather than their capabilities alone
Keywords :
distributed processing; message authentication; table lookup; DHT algorithm; authentication; network security policy; stealth distributed hash tables; Authentication; Computer crime; Data security; Environmentally friendly manufacturing techniques; Large-scale systems; Peer to peer computing; Pollution; Protocols; Routing; Software engineering;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Software Engineering and Advanced Applications, 2006. SEAA '06. 32nd EUROMICRO Conference on
Conference_Location :
Cavtat, Dubrovnik
ISSN :
1089-6503
Print_ISBN :
0-7695-2594-6
Type :
conf
DOI :
10.1109/EUROMICRO.2006.23
Filename :
1690158
Link To Document :
بازگشت