Providing a collaborative mechanism for peer group access control

Peer-to-peer applications enable users to create a communications framework from scratch without the need of a central service provider. This is achievable via the aggregation of resources each one of them provide, creating a completely distributed collaborative environment. Under some circumstances, groups of users operating in a global peer-to-peer network may need to create a closed communities, limiting access to the shared resources only to its members. This can be useful for security reasons or in order to provide scoping within the global overlay network. In order to achieve this scenario, security mechanisms must be implemented. In this paper, a method for peer group access control is presented managed only by the group members in a completely autonomous way without the need of any third parties

[1]  Rafail Ostrovsky,et al.  Efficient Password-Authenticated Key Exchange Using Human-Memorable Passwords , 2001, EUROCRYPT.

[2]  Thomas Beth,et al.  Valuation of Trust in Open Networks , 1994, ESORICS.

[3]  Jan Camenisch,et al.  Proving in Zero-Knowledge that a Number Is the Product of Two Safe Primes , 1998, EUROCRYPT.

[4]  Fred B. Schneider,et al.  COCA: a secure distributed online certification authority , 2002 .

[5]  Robbert van Renesse,et al.  COCA: a secure distributed online certification authority , 2002, Foundations of Intrusion Tolerant Systems, 2003 [Organically Assured and Survivable Information Systems].

[6]  Adi Shamir,et al.  How to share a secret , 1979, CACM.

[7]  Diana K. Smetters,et al.  Talking to Strangers: Authentication in Ad-Hoc Wireless Networks , 2002, NDSS.

[8]  Byrav Ramamurthy,et al.  Secure Group Communications Over Data Networks , 2004 .

[9]  Partha Dasgupta,et al.  Distributed authentication for peer-to-peer networks , 2003, 2003 Symposium on Applications and the Internet Workshops, 2003. Proceedings..

[10]  Jiejun Kong,et al.  Providing robust and ubiquitous security support for mobile ad-hoc networks , 2001, Proceedings Ninth International Conference on Network Protocols. ICNP 2001.

[11]  Gesine Reinert,et al.  Small worlds , 2001, Random Struct. Algorithms.

[12]  Perry B. Gentry What is a VPN? , 2001, Inf. Secur. Tech. Rep..

[13]  Birgit Pfitzmann,et al.  Collision-Free Accumulators and Fail-Stop Signature Schemes Without Trees , 1997, EUROCRYPT.

[14]  Robin Kravets,et al.  MOCA : MObile Certificate Authority for Wireless Ad Hoc Networks , 2004 .

[15]  Jean-Pierre Hubaux,et al.  The quest for security in mobile ad hoc networks , 2001, MobiHoc '01.

[16]  Tom Groth,et al.  Project JXTA , 2002, Peer-to-Peer: Ökonomische, technische und juristische Perspektiven.

[17]  Srdjan Capkun,et al.  Self-Organized Public-Key Management for Mobile Ad Hoc Networks , 2003, IEEE Trans. Mob. Comput..

[18]  Zygmunt J. Haas,et al.  Securing ad hoc networks , 1999, IEEE Netw..

[19]  Patrick Th. Eugster,et al.  DICTATE: DIstributed CerTification Authority with probabilisTic frEshness for ad hoc networks , 2005, IEEE Transactions on Dependable and Secure Computing.

[20]  Frank Stajano,et al.  The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks , 1999, Security Protocols Workshop.

[21]  Zhaoyu Liu,et al.  A dynamic trust model for mobile ad hoc networks , 2004, Proceedings. 10th IEEE International Workshop on Future Trends of Distributed Computing Systems, 2004. FTDCS 2004..

[22]  Michael R. Lyu,et al.  Trust- and clustering-based authentication services in mobile ad hoc networks , 2004, 24th International Conference on Distributed Computing Systems Workshops, 2004. Proceedings..

[23]  Simson L. Garfinkel,et al.  PGP: Pretty Good Privacy , 1994 .