{"title":"使用分层签名的防篡改复制点对点存储","authors":"Alexander Zangerl","doi":"10.1109/ARES.2006.129","DOIUrl":null,"url":null,"abstract":"Peer-to-peer-based file replication is a proven approach to provide cooperative robust backup for data: if one peer does not have a specific datum, another one might. If enough peers participate, the overall system can survive isolated failures. Applying this approach to distributed file integrity checking (or similar security-sensitive areas) requires that current and untampered information is distributed among the peers in such a way that a limited number of malicious peers cannot subvert or sabotage the overall system. This paper presents a mechanism to provide such tamper-resistant replicated storage in a decentralised peer-to-peer system where no component is trusted a priori. We present a system model for our mechanism, and discuss the threats and countermeasures used to detect tampering. We also give an analysis of various distribution strategies and their respective costs and benefits as observed in our research implementation.","PeriodicalId":106780,"journal":{"name":"First International Conference on Availability, Reliability and Security (ARES'06)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2006-04-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":"{\"title\":\"Tamper-resistant replicated peer-to-peer storage using hierarchical signatures\",\"authors\":\"Alexander Zangerl\",\"doi\":\"10.1109/ARES.2006.129\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Peer-to-peer-based file replication is a proven approach to provide cooperative robust backup for data: if one peer does not have a specific datum, another one might. If enough peers participate, the overall system can survive isolated failures. Applying this approach to distributed file integrity checking (or similar security-sensitive areas) requires that current and untampered information is distributed among the peers in such a way that a limited number of malicious peers cannot subvert or sabotage the overall system. This paper presents a mechanism to provide such tamper-resistant replicated storage in a decentralised peer-to-peer system where no component is trusted a priori. We present a system model for our mechanism, and discuss the threats and countermeasures used to detect tampering. We also give an analysis of various distribution strategies and their respective costs and benefits as observed in our research implementation.\",\"PeriodicalId\":106780,\"journal\":{\"name\":\"First International Conference on Availability, Reliability and Security (ARES'06)\",\"volume\":\"10 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2006-04-20\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"4\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"First International Conference on Availability, Reliability and Security (ARES'06)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ARES.2006.129\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"First International Conference on Availability, Reliability and Security (ARES'06)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ARES.2006.129","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Tamper-resistant replicated peer-to-peer storage using hierarchical signatures
Peer-to-peer-based file replication is a proven approach to provide cooperative robust backup for data: if one peer does not have a specific datum, another one might. If enough peers participate, the overall system can survive isolated failures. Applying this approach to distributed file integrity checking (or similar security-sensitive areas) requires that current and untampered information is distributed among the peers in such a way that a limited number of malicious peers cannot subvert or sabotage the overall system. This paper presents a mechanism to provide such tamper-resistant replicated storage in a decentralised peer-to-peer system where no component is trusted a priori. We present a system model for our mechanism, and discuss the threats and countermeasures used to detect tampering. We also give an analysis of various distribution strategies and their respective costs and benefits as observed in our research implementation.