Access control for secure distributed data structures in Distributed Hash Tables

Peer-To-Peer (P2P) networks open up great possibilities for intercommunication, collaborative and social projects like file sharing, communication protocols or social networks while offering advantages over the conventional Client-Server model of computing pattern. Such networks counter the problems of centralized servers such as that P2P networks can scale to millions without additional costs. In previous work, we presented Distributed Data Structure (DDS) which offers a middle-ware scheme for distributed applications. This scheme builds on top of DHT (Distributed Hash Table) based P2P overlays, and offers distributed data storage services as a middle-ware it still needs to address security issues. The main objective of this paper is to investigate possible ways to handle the security problem for DDS, and to develop a possibly reusable security architecture for access control for secure distributed data structures in P2P networks without depending on trusted third parties.

[1]  Michael Backes,et al.  Secure Key-Updating for Lazy Revocation , 2006, ESORICS.

[2]  Ralf Steinmetz,et al.  A Distributed Platform for Multimedia Communities , 2008, 2008 Tenth IEEE International Symposium on Multimedia.

[3]  Kalman Graffi,et al.  Distributed data structures improvement for collective retrieval time , 2016, 2016 19th International Symposium on Wireless Personal Multimedia Communications (WPMC).

[4]  Ralf Steinmetz,et al.  LifeSocial.KOM: A secure and P2P-based solution for online social networks , 2011, 2011 IEEE Consumer Communications and Networking Conference (CCNC).

[5]  Ralf Steinmetz,et al.  LifeSocial.KOM: A P2P-Based Platform for Secure Online Social Networks , 2010, 2010 IEEE Tenth International Conference on Peer-to-Peer Computing (P2P).

[6]  Refik Molva,et al.  Safebook: A distributed privacy preserving Online Social Network , 2011, 2011 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks.

[7]  Robert W. Shirey,et al.  Internet Security Glossary, Version 2 , 2007, RFC.

[8]  Kálmán György Graffi,et al.  Monitoring and management of peer-to-peer systems , 2010, ACMMR.

[9]  Gail-Joon Ahn,et al.  Multiparty Authorization Framework for Data Sharing in Online Social Networks , 2011, DBSec.

[10]  Reiner Kolla,et al.  A Method for Self-Organizing Communication in WSN Based Localization Systems: HashSlot , 2007 .

[11]  Ralf Steinmetz,et al.  Overlay Bandwidth Management: Scheduling and Active Queue Management of Overlay Flows , 2007 .

[12]  Kalman Graffi,et al.  Sets, lists and trees: Distributed data structures on distributed hash tables , 2016, 2016 IEEE 35th International Performance Computing and Communications Conference (IPCCC).