Title :
Authentication in Stealth Distributed Hash Tables
Author :
MacQuire, Andrew ; Brampton, Andrew ; Rai, Idris A. ; Race, Nicholas J P ; Mathy, Laurent
Author_Institution :
Dept. of Comput., Lancaster Univ.
fDate :
Aug. 29 2006-Sept. 1 2006
Abstract :
Most existing DHT algorithms assume that all nodes have equal capabilities. This assumption has previously been shown to be untrue in real deployments, where the heterogeneity of nodes can actually have a detrimental effect upon performance. In this paper, we acknowledge that nodes on the same overlay may also differ in terms of their trustworthiness. However, implementing and enforcing security policies in a network where all nodes are treated equally is a non-trivial task. We therefore extend our previous work on stealth DHTs to consider the differentiation of nodes based on their trustworthiness rather than their capabilities alone
Keywords :
distributed processing; message authentication; table lookup; DHT algorithm; authentication; network security policy; stealth distributed hash tables; Authentication; Computer crime; Data security; Environmentally friendly manufacturing techniques; Large-scale systems; Peer to peer computing; Pollution; Protocols; Routing; Software engineering;
Conference_Titel :
Software Engineering and Advanced Applications, 2006. SEAA '06. 32nd EUROMICRO Conference on
Conference_Location :
Cavtat, Dubrovnik
Print_ISBN :
0-7695-2594-6
DOI :
10.1109/EUROMICRO.2006.23