Secure Identity and Location Decoupling Using Peer-to-Peer Networks

The emerging issues of personal and network mobility have created a need for the decoupling of identity from location in Internet addressing. This decoupling requires name resolution systems that can provide scalable resolution of globally unique persistent identifiers of communication endpoints, which may be users, devices, content or services. Recent developments in structured peer-to-peer overlay networks have made possible the scalable resolution of flat names, which opens up new possibilities in the area of naming and name resolution systems. In this paper we propose a scheme to provide authentication and verification in a name resolution system based on structured peer to peer networks such as distributed hash tables (DHTs). We specify how namespace security and global uniqueness may be managed with the use of public key cryptography. We also propose a framework within which independent overlay networks may compose a global namespace.

[1]  Michael Walfish,et al.  Untangling the Web from DNS , 2004, NSDI.

[2]  Ion Stoica,et al.  Peer-to-Peer Systems II , 2003, Lecture Notes in Computer Science.

[3]  Bryan Ford,et al.  Unmanaged Internet Protocol , 2004, Comput. Commun. Rev..

[4]  Robert Morris,et al.  Chord: A scalable peer-to-peer lookup service for internet applications , 2001, SIGCOMM 2001.

[5]  Hari Balakrishnan,et al.  Reconsidering Internet mobility , 2001, Proceedings Eighth Workshop on Hot Topics in Operating Systems.

[6]  Pekka Nikander,et al.  Integrating Security, Mobility and Multi-Homing in a HIP Way , 2003, NDSS.

[7]  Peter Druschel,et al.  Providing Administrative Control and Autonomy in Structured Peer-to-Peer Overlays , 2004, IPTPS.

[8]  David D. Clark,et al.  FARA: reorganizing the addressing architecture , 2003, FDNA '03.

[9]  Michalis Faloutsos,et al.  PeerNet: Pushing Peer-to-Peer Down the Stack , 2003, IPTPS.

[10]  Michael Walfish,et al.  A layered naming architecture for the internet , 2004, SIGCOMM 2004.

[11]  David R. Karger,et al.  Looking up data in P2P systems , 2003, CACM.

[12]  Hari Balakrishnan,et al.  An end-to-end approach to host mobility , 2000, MobiCom '00.

[13]  Ben Y. Zhao,et al.  Towards a Common API for Structured Peer-to-Peer Overlays , 2003, IPTPS.

[14]  David R. Karger,et al.  Chord: a scalable peer-to-peer lookup protocol for internet applications , 2003, TNET.

[15]  Miguel Castro,et al.  Secure routing for structured peer-to-peer overlay networks , 2002, OSDI '02.

[16]  Scott Shenker,et al.  Peer-to-Peer Systems III, Third International Workshop, IPTPS 2004, La Jolla, CA, USA, February 26-27, 2004, Revised Selected Papers , 2005, IPTPS.

[17]  David Mazières,et al.  Separating key management from file system security , 1999, SOSP.