Secure model for distributed data structures on distributed hash tables

Read Al-Aaridhi, Ahmet Yüksektepe, Kalman Graffi
{"title":"Secure model for distributed data structures on distributed hash tables","authors":"Read Al-Aaridhi, Ahmet Yüksektepe, Kalman Graffi","doi":"10.1109/AEECT.2017.8257771","DOIUrl":null,"url":null,"abstract":"Distributed Hash Tables and unstructured Peer-to-Peer networks present an alternative basis for global software applications. Compared to the Client-Server applications, P2P applications have significant advantages. By eliminating the idea of Servers as the single point of failures and single point of control out of the picture. P2P networks are suitable for many applications like Distributed Online Social Networks the modern society needs today. Distributed Applications built on top of a P2P network are much more resistant to complete system breakdowns, power misuse by authorities (e.g. censorship) and limitless surveillance. In previous work, we presented Distributed Data Structure (DDS) offers a middle-ware for distributed applications. This software has been implemented in a simulation framework for P2P networks called PeerFactSim.KOM. The DDS middle-ware works on top of a Distributed Hash Table (DHT) overlay as a structured P2P network and offers an object-oriented, distributed storage layer. The security of data is an essential topic in such environments. Therefore, without proper security mechanisms, the idea of storing private and sensitive data on unknown network peers become useless, as the stored data can be read or manipulated. In this paper, we present and evaluate a concept of a secure model working completely without trusted nodes for such distributed data structures in peer-to-peer networks. In the evaluation, we show that the time and storage overhead introduced through the security architecture for DDS comes with acceptable proportions for large P2P applications.","PeriodicalId":286127,"journal":{"name":"2017 IEEE Jordan Conference on Applied Electrical Engineering and Computing Technologies (AEECT)","volume":"60 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2017 IEEE Jordan Conference on Applied Electrical Engineering and Computing Technologies (AEECT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/AEECT.2017.8257771","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

Distributed Hash Tables and unstructured Peer-to-Peer networks present an alternative basis for global software applications. Compared to the Client-Server applications, P2P applications have significant advantages. By eliminating the idea of Servers as the single point of failures and single point of control out of the picture. P2P networks are suitable for many applications like Distributed Online Social Networks the modern society needs today. Distributed Applications built on top of a P2P network are much more resistant to complete system breakdowns, power misuse by authorities (e.g. censorship) and limitless surveillance. In previous work, we presented Distributed Data Structure (DDS) offers a middle-ware for distributed applications. This software has been implemented in a simulation framework for P2P networks called PeerFactSim.KOM. The DDS middle-ware works on top of a Distributed Hash Table (DHT) overlay as a structured P2P network and offers an object-oriented, distributed storage layer. The security of data is an essential topic in such environments. Therefore, without proper security mechanisms, the idea of storing private and sensitive data on unknown network peers become useless, as the stored data can be read or manipulated. In this paper, we present and evaluate a concept of a secure model working completely without trusted nodes for such distributed data structures in peer-to-peer networks. In the evaluation, we show that the time and storage overhead introduced through the security architecture for DDS comes with acceptable proportions for large P2P applications.
分布式哈希表上分布式数据结构的安全模型
分布式哈希表和非结构化点对点网络为全球软件应用程序提供了另一种基础。与客户机-服务器应用程序相比,P2P应用程序具有显著的优势。通过消除服务器作为单点故障和单点控制的想法。P2P网络适用于现代社会需要的分布式在线社交网络等许多应用。建立在P2P网络之上的分布式应用程序更能抵抗完全的系统故障、权力滥用(例如审查)和无限制的监视。在之前的工作中,我们介绍了分布式数据结构(DDS)为分布式应用程序提供了一个中间件。该软件已在P2P网络仿真框架PeerFactSim.KOM中实现。DDS中间件工作在分布式哈希表(DHT)覆盖层之上,作为结构化的P2P网络,并提供面向对象的分布式存储层。在这样的环境中,数据的安全性是一个重要的主题。因此,如果没有适当的安全机制,将私有和敏感数据存储在未知网络对等点上的想法将变得毫无用处,因为存储的数据可以被读取或操纵。在本文中,我们提出并评估了在点对点网络中这种分布式数据结构完全没有可信节点的安全模型的概念。在评估中,我们表明,通过DDS的安全架构引入的时间和存储开销对于大型P2P应用程序来说是可以接受的。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信