A secure platform for peer-to-peer computing in the Internet

Peer-to-peer computing (P2P) draws growing interest as a new distributed computing paradigm for its potential to harness "edge" computers (e.g., PCs) and make their under-utilized resources available to each other. P2P based e-commerce on the Internet is of particular interest because of P2P's cost effectiveness and redundancy-induced dependability. Beneath the promising benefits lie daunting challenges of supporting security, reliability, resilience, and scalability. In particular, scalable discovery and secure transaction are of paramount importance due to the sheer size and the laissez,faire nature of the Internet. E-Speak is an e-services infrastructure where services advertise, discover, and interoperate each other in a dynamic and secure way. The E-Speak security adopts a multi-layered approach and builds a range of protection mechanisms on top of the Public Key Infrastructure. The E-Speak advertising services have a dynamic pluggable architecture and implement a scalable wide-area discovery based on distributed queries. We argue that E-Speak may be used as the common secure, scalable infrastructure for different multiple P2P applications.

[1]  Butler W. Lampson,et al.  SPKI Certificate Theory , 1999, RFC.

[2]  Mark Weiser,et al.  Some computer science issues in ubiquitous computing , 1993, CACM.

[3]  Nicholas Carriero,et al.  Linda in context , 1989, CACM.

[4]  David R. Karger,et al.  Consistent hashing and random trees: distributed caching protocols for relieving hot spots on the World Wide Web , 1997, STOC '97.

[5]  Michael F. Schwartz,et al.  Locating nearby copies of replicated Internet servers , 1995, SIGCOMM '95.

[6]  F SchwartzMichael,et al.  Locating nearby copies of replicated Internet servers , 1995 .

[7]  Rajmohan Rajaraman,et al.  Accessing Nearby Copies of Replicated Objects in a Distributed Environment , 1997, SPAA '97.

[8]  Ian F. Blake,et al.  Elliptic curves in cryptography , 1999 .

[9]  P. Hoffman Internet Draft , 1998 .

[10]  Ben Y. Zhao,et al.  OceanStore: an architecture for global-scale persistent storage , 2000, SIGP.

[11]  Christopher Allen,et al.  The TLS Protocol Version 1.0 , 1999, RFC.

[12]  Samuel P. Midkiff,et al.  The NINJA project , 2001, CACM.

[13]  Akhil Sahai,et al.  E-Speak - an Enabling Infrastructure for Web-based E-Services , 2000 .

[14]  Tim Howes,et al.  Lightweight Directory Access Protocol , 1995, RFC.

[15]  Philip R. Zimmermann,et al.  The official PGP user's guide , 1996 .

[16]  Charles E. Perkins,et al.  Service Location Protocol, Version 2 , 1999, RFC.

[17]  Nigel P. Smart,et al.  Elliptic Curves in Cryptography: Preface , 1999 .

[18]  Ian Clarke,et al.  Freenet: A Distributed Anonymous Information Storage and Retrieval System , 2000, Workshop on Design Issues in Anonymity and Unobservability.

[19]  M. Lynn Hawaii International Conference on System Sciences , 1996 .

[20]  Gul A. Agha,et al.  Abstraction and modularity mechanisms for concurrent computing , 1993, IEEE Parallel & Distributed Technology: Systems & Applications.

[21]  Ben Y. Zhao,et al.  An architecture for a secure service discovery service , 1999, MobiCom.