在对等消息传递中间件中保护通信

Péter Szilágyi
{"title":"在对等消息传递中间件中保护通信","authors":"Péter Szilágyi","doi":"10.1109/SYNASC.2013.50","DOIUrl":null,"url":null,"abstract":"Traditionally, message oriented middlewares (MOM) are looked upon as either centralized systems (e.g. AMQP) or a rigidly distributed collection of machines, requiring significant configuration overhead for achieving the desired throughput under the needed security constraints. On the other end of the spectrum, peer-to-peer systems (P2P) in general achieve amazing scalability and fault tolerance, but due to their very nature, are susceptible to various attacks. Since all measures of security have considerable consequences on the system's capabilities, the securing of a peer-to-peer system requires a thorough analysis on the exact designated use-case and environment in which the network is required to operate in, as well as all the possible threats the system must be able to withstand. The paper proposes a security model that bridges the distribution concept of peer-to-peer systems with the necessities of MOMs by rigorously defining the operational environment, assumptions and requirements, on top of which a security protocol was implemented. Taking advantage of the specific use case of P2P MOMs, further optimizations are provided which provide the same security against the defined threat model, but result in significant gains with regard to the overall switching throughput of the network.","PeriodicalId":293085,"journal":{"name":"2013 15th International Symposium on Symbolic and Numeric Algorithms for Scientific Computing","volume":"57 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2013-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"Securing Communication in a Peer-to-Peer Messaging Middleware\",\"authors\":\"Péter Szilágyi\",\"doi\":\"10.1109/SYNASC.2013.50\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Traditionally, message oriented middlewares (MOM) are looked upon as either centralized systems (e.g. AMQP) or a rigidly distributed collection of machines, requiring significant configuration overhead for achieving the desired throughput under the needed security constraints. On the other end of the spectrum, peer-to-peer systems (P2P) in general achieve amazing scalability and fault tolerance, but due to their very nature, are susceptible to various attacks. Since all measures of security have considerable consequences on the system's capabilities, the securing of a peer-to-peer system requires a thorough analysis on the exact designated use-case and environment in which the network is required to operate in, as well as all the possible threats the system must be able to withstand. The paper proposes a security model that bridges the distribution concept of peer-to-peer systems with the necessities of MOMs by rigorously defining the operational environment, assumptions and requirements, on top of which a security protocol was implemented. Taking advantage of the specific use case of P2P MOMs, further optimizations are provided which provide the same security against the defined threat model, but result in significant gains with regard to the overall switching throughput of the network.\",\"PeriodicalId\":293085,\"journal\":{\"name\":\"2013 15th International Symposium on Symbolic and Numeric Algorithms for Scientific Computing\",\"volume\":\"57 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2013-09-23\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2013 15th International Symposium on Symbolic and Numeric Algorithms for Scientific Computing\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/SYNASC.2013.50\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2013 15th International Symposium on Symbolic and Numeric Algorithms for Scientific Computing","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/SYNASC.2013.50","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2

摘要

传统上,面向消息的中间件(MOM)被视为集中式系统(例如AMQP)或严格分布的机器集合,需要大量的配置开销才能在所需的安全约束下实现所需的吞吐量。另一方面,点对点系统(P2P)通常实现了惊人的可伸缩性和容错性,但由于其本身的性质,容易受到各种攻击。由于所有的安全措施都对系统的功能有相当大的影响,因此确保点对点系统的安全需要对网络需要运行的确切指定用例和环境以及系统必须能够承受的所有可能的威胁进行彻底的分析。本文提出了一个安全模型,通过严格定义操作环境、假设和需求,将点对点系统的分布概念与mom的需求联系起来,并在此基础上实现了安全协议。利用P2P mom的特定用例,提供了进一步的优化,提供了针对定义的威胁模型的相同安全性,但在网络的总体交换吞吐量方面产生了显着的收益。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Securing Communication in a Peer-to-Peer Messaging Middleware
Traditionally, message oriented middlewares (MOM) are looked upon as either centralized systems (e.g. AMQP) or a rigidly distributed collection of machines, requiring significant configuration overhead for achieving the desired throughput under the needed security constraints. On the other end of the spectrum, peer-to-peer systems (P2P) in general achieve amazing scalability and fault tolerance, but due to their very nature, are susceptible to various attacks. Since all measures of security have considerable consequences on the system's capabilities, the securing of a peer-to-peer system requires a thorough analysis on the exact designated use-case and environment in which the network is required to operate in, as well as all the possible threats the system must be able to withstand. The paper proposes a security model that bridges the distribution concept of peer-to-peer systems with the necessities of MOMs by rigorously defining the operational environment, assumptions and requirements, on top of which a security protocol was implemented. Taking advantage of the specific use case of P2P MOMs, further optimizations are provided which provide the same security against the defined threat model, but result in significant gains with regard to the overall switching throughput of the network.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信