Enhancing Security and Robustness of P2P Caching System

At present, P2P caching system is widely used to reduce P2P traffic, but the security is always ignored. In this paper, we discuss three potential security issues: content poison, illegal files diffusion and malicious downloading. First, we propose content verification to ensure the correctness of data and defend against content poison attacks. Then, to prevent the spread of illegal files, we filter requests and responses by an info library and a feature library of known illegal files. Third, we present the strategies and introduce identity authentication to prevent malicious downloading from exhausting system’s resources. Based on these considerations, we implement a novel P2P caching system to evaluate our designs. According to the result and analysis, we believe our strategies can promote the security and robustness of P2P caching system.

[1]  Zhang Fuchao The research of PPCache system , 2010 .

[2]  Roger Wattenhofer,et al.  Attacks on Peer-to-Peer Networks , 2005 .

[3]  Mohamed Hefeeda,et al.  Modeling and Caching of Peer-to-Peer Traffic , 2006, Proceedings of the 2006 IEEE International Conference on Network Protocols.

[4]  Chun-Hsin Wang,et al.  Copyright Protection in P2P Networks by False Pieces Pollution , 2011, ATC.

[5]  Rakesh Kumar,et al.  Pollution in P2P file sharing systems , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..

[6]  Mohamed Hefeeda,et al.  Traffic modeling and proportional partial caching for peer-to-peer systems , 2008, TNET.

[7]  Olivier Festor,et al.  Content pollution quantification in large P2P networks : A measurement study on KAD , 2011, 2011 IEEE International Conference on Peer-to-Peer Computing.

[8]  Xin Wang,et al.  I-Swifter: Improving chunked network coding for peer-to-peer content distribution , 2012, Peer Peer Netw. Appl..

[9]  Hong Wang,et al.  Securing network coding against pollution attacks in P2P converged ubiquitous networks , 2015, Peer Peer Netw. Appl..

[10]  Kai Hwang,et al.  Collusive Piracy Prevention in P2P Content Delivery Networks , 2009, IEEE Transactions on Computers.