DocumentCode :
2666672
Title :
Trusted computing: providing security for peer-to-peer networks
Author :
Balfe, Shane ; Lakhani, Amit D. ; Paterson, Kenneth G.
Author_Institution :
Inf. Security Group, London Univ., UK
fYear :
2005
fDate :
31 Aug.-2 Sept. 2005
Firstpage :
117
Lastpage :
124
Abstract :
In this paper, we demonstrate the application of trusted computing to securing peer-to-peer (P2P) networks. We identify a central challenge in providing many of the security services within these networks, namely the absence of stable verifiable peer identities. We employ the functionalities provided by trusted computing technology to establish a pseudonymous authentication scheme for peers and extend this scheme to build secure channels between peers for future communications. In support of our work, we illustrate how commands from the trusted computing group (TCG) specifications can be used to implement our approach in P2P networks.
Keywords :
formal verification; message authentication; peer-to-peer computing; telecommunication security; P2P network; peer-to-peer network security; pseudonymous authentication; security service; trusted computing group specification; Authentication; Computer applications; Computer architecture; Computer networks; Data security; Hardware; Information security; Operating systems; Peer to peer computing; Protocols;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Peer-to-Peer Computing, 2005. P2P 2005. Fifth IEEE International Conference on
Print_ISBN :
0-7695-2376-5
Type :
conf
DOI :
10.1109/P2P.2005.40
Filename :
1551027
Link To Document :
بازگشت