{"title":"Secure model for distributed data structures on distributed hash tables","authors":"Read Al-Aaridhi, Ahmet Yüksektepe, Kalman Graffi","doi":"10.1109/AEECT.2017.8257771","DOIUrl":null,"url":null,"abstract":"Distributed Hash Tables and unstructured Peer-to-Peer networks present an alternative basis for global software applications. Compared to the Client-Server applications, P2P applications have significant advantages. By eliminating the idea of Servers as the single point of failures and single point of control out of the picture. P2P networks are suitable for many applications like Distributed Online Social Networks the modern society needs today. Distributed Applications built on top of a P2P network are much more resistant to complete system breakdowns, power misuse by authorities (e.g. censorship) and limitless surveillance. In previous work, we presented Distributed Data Structure (DDS) offers a middle-ware for distributed applications. This software has been implemented in a simulation framework for P2P networks called PeerFactSim.KOM. The DDS middle-ware works on top of a Distributed Hash Table (DHT) overlay as a structured P2P network and offers an object-oriented, distributed storage layer. The security of data is an essential topic in such environments. Therefore, without proper security mechanisms, the idea of storing private and sensitive data on unknown network peers become useless, as the stored data can be read or manipulated. In this paper, we present and evaluate a concept of a secure model working completely without trusted nodes for such distributed data structures in peer-to-peer networks. In the evaluation, we show that the time and storage overhead introduced through the security architecture for DDS comes with acceptable proportions for large P2P applications.","PeriodicalId":286127,"journal":{"name":"2017 IEEE Jordan Conference on Applied Electrical Engineering and Computing Technologies (AEECT)","volume":"60 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2017 IEEE Jordan Conference on Applied Electrical Engineering and Computing Technologies (AEECT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/AEECT.2017.8257771","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
Distributed Hash Tables and unstructured Peer-to-Peer networks present an alternative basis for global software applications. Compared to the Client-Server applications, P2P applications have significant advantages. By eliminating the idea of Servers as the single point of failures and single point of control out of the picture. P2P networks are suitable for many applications like Distributed Online Social Networks the modern society needs today. Distributed Applications built on top of a P2P network are much more resistant to complete system breakdowns, power misuse by authorities (e.g. censorship) and limitless surveillance. In previous work, we presented Distributed Data Structure (DDS) offers a middle-ware for distributed applications. This software has been implemented in a simulation framework for P2P networks called PeerFactSim.KOM. The DDS middle-ware works on top of a Distributed Hash Table (DHT) overlay as a structured P2P network and offers an object-oriented, distributed storage layer. The security of data is an essential topic in such environments. Therefore, without proper security mechanisms, the idea of storing private and sensitive data on unknown network peers become useless, as the stored data can be read or manipulated. In this paper, we present and evaluate a concept of a secure model working completely without trusted nodes for such distributed data structures in peer-to-peer networks. In the evaluation, we show that the time and storage overhead introduced through the security architecture for DDS comes with acceptable proportions for large P2P applications.