Secure model for distributed data structures on distributed hash tables

Distributed Hash Tables and unstructured Peer-to-Peer networks present an alternative basis for global software applications. Compared to the Client-Server applications, P2P applications have significant advantages. By eliminating the idea of Servers as the single point of failures and single point of control out of the picture. P2P networks are suitable for many applications like Distributed Online Social Networks the modern society needs today. Distributed Applications built on top of a P2P network are much more resistant to complete system breakdowns, power misuse by authorities (e.g. censorship) and limitless surveillance. In previous work, we presented Distributed Data Structure (DDS) offers a middle-ware for distributed applications. This software has been implemented in a simulation framework for P2P networks called PeerFactSim.KOM. The DDS middle-ware works on top of a Distributed Hash Table (DHT) overlay as a structured P2P network and offers an object-oriented, distributed storage layer. The security of data is an essential topic in such environments. Therefore, without proper security mechanisms, the idea of storing private and sensitive data on unknown network peers become useless, as the stored data can be read or manipulated. In this paper, we present and evaluate a concept of a secure model working completely without trusted nodes for such distributed data structures in peer-to-peer networks. In the evaluation, we show that the time and storage overhead introduced through the security architecture for DDS comes with acceptable proportions for large P2P applications.

[1]  Ralf Steinmetz,et al.  Overlay Bandwidth Management: Scheduling and Active Queue Management of Overlay Flows , 2007 .

[2]  Ralf Steinmetz,et al.  A Distributed Platform for Multimedia Communities , 2008, 2008 Tenth IEEE International Symposium on Multimedia.

[3]  Kalman Graffi,et al.  Distributed data structures improvement for collective retrieval time , 2016, 2016 19th International Symposium on Wireless Personal Multimedia Communications (WPMC).

[4]  Robert W. Shirey,et al.  Internet Security Glossary, Version 2 , 2007, RFC.

[5]  Karl J. O'Dwyer,et al.  Bitcoin mining and its energy footprint , 2014 .

[6]  Kalman Graffi,et al.  Secure distributed data structures for peer-to-peer-based social networks , 2014, 2014 International Conference on Collaboration Technologies and Systems (CTS).

[7]  Taoufik En-Najjary,et al.  Long Term Study of Peer Behavior in the kad DHT , 2009, IEEE/ACM Transactions on Networking.

[8]  J. V. Vroonhoven Peer to Peer Security , 2006 .

[9]  Miguel Castro,et al.  Secure routing for structured peer-to-peer overlay networks , 2002, OSDI '02.

[10]  David R. Karger,et al.  Chord: A scalable peer-to-peer lookup service for internet applications , 2001, SIGCOMM '01.

[11]  Mary Subaja Christo,et al.  Enhancing security properties of Rumor Riding protocol under various attacks scenario in P2P network , 2016, 2016 International Conference on Communication and Signal Processing (ICCSP).

[12]  Ralf Steinmetz,et al.  LifeSocial.KOM: A secure and P2P-based solution for online social networks , 2011, 2011 IEEE Consumer Communications and Networking Conference (CCNC).

[13]  Ralf Steinmetz,et al.  LifeSocial.KOM: A P2P-Based Platform for Secure Online Social Networks , 2010, 2010 IEEE Tenth International Conference on Peer-to-Peer Computing (P2P).

[14]  Laura Ricci,et al.  DiDuSoNet: A P2P architecture for distributed Dunbar-based social networks , 2016, Peer-to-Peer Netw. Appl..

[15]  Refik Molva,et al.  Safebook: A distributed privacy preserving Online Social Network , 2011, 2011 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks.

[16]  Kalman Graffi,et al.  Sets, lists and trees: Distributed data structures on distributed hash tables , 2016, 2016 IEEE 35th International Performance Computing and Communications Conference (IPCCC).

[17]  Hui Zhang,et al.  Global network positioning: a new approach to network distance prediction , 2002, CCRV.

[18]  Kálmán György Graffi,et al.  Monitoring and management of peer-to-peer systems , 2010, ACMMR.

[19]  Yi Ma,et al.  A novel trust model for P2P networks , 2016, 2016 12th International Conference on Natural Computation, Fuzzy Systems and Knowledge Discovery (ICNC-FSKD).

[20]  Werner Vogels,et al.  Eventually consistent , 2008, CACM.

[21]  Diego Suarez Touceda,et al.  Privacy in Peer-to-Peer Networks , 2015 .

[22]  Mika Suvanto,et al.  Privacy In Peer-to-Peer Networks , .

[23]  Kalman Graffi,et al.  Comparative evaluation of peer-to-peer systems using PeerfactSim.KOM , 2013, 2013 International Conference on High Performance Computing & Simulation (HPCS).