Leveraging identity-based cryptography for node ID assignment in structured P2P systems

Kevin R.B. Butler, Sunam Ryu, Patrick Traynor, Patrick Drew McDaniel

Research output: Contribution to journalArticle

21 Citations (Scopus)

Abstract

Structured peer-to-peer (P2P) systems have grown enormously because of their scalability, efficiency, and reliability. These systems assign a unique identifier to each user and object. However, current assignment schemes allow an adversary to carefully select user IDs and/or simultaneously obtain many pseudo-identitiesultimately leading to an ability to disrupt the P2P system in very targeted and dangerous ways. In this paper, we propose novel ID assignment protocols based on identity-based cryptography. This approach permits the acquisition of node IDs to be tightly regulated without many of the complexities and costs associated with traditional certificate solutions. We broadly consider the security requirements of ID assignment and present three protocols representing distinct threat and trust models. A detailed empirical study of the protocols is given. Our analysis shows that the cost of our identity-based protocols is nominal, and that the associated identity services can scale to millions of users using a limited number of servers.

Original languageEnglish (US)
Article number4695827
Pages (from-to)1803-1815
Number of pages13
JournalIEEE Transactions on Parallel and Distributed Systems
Volume20
Issue number12
DOIs
StatePublished - Dec 1 2009

Fingerprint

Cryptography
Network protocols
Scalability
Costs
Servers

All Science Journal Classification (ASJC) codes

  • Signal Processing
  • Hardware and Architecture
  • Computational Theory and Mathematics

Cite this

@article{5c3beacc8b7f4845b3949dbb7ba2ce68,
title = "Leveraging identity-based cryptography for node ID assignment in structured P2P systems",
abstract = "Structured peer-to-peer (P2P) systems have grown enormously because of their scalability, efficiency, and reliability. These systems assign a unique identifier to each user and object. However, current assignment schemes allow an adversary to carefully select user IDs and/or simultaneously obtain many pseudo-identitiesultimately leading to an ability to disrupt the P2P system in very targeted and dangerous ways. In this paper, we propose novel ID assignment protocols based on identity-based cryptography. This approach permits the acquisition of node IDs to be tightly regulated without many of the complexities and costs associated with traditional certificate solutions. We broadly consider the security requirements of ID assignment and present three protocols representing distinct threat and trust models. A detailed empirical study of the protocols is given. Our analysis shows that the cost of our identity-based protocols is nominal, and that the associated identity services can scale to millions of users using a limited number of servers.",
author = "Butler, {Kevin R.B.} and Sunam Ryu and Patrick Traynor and McDaniel, {Patrick Drew}",
year = "2009",
month = "12",
day = "1",
doi = "10.1109/TPDS.2008.249",
language = "English (US)",
volume = "20",
pages = "1803--1815",
journal = "IEEE Transactions on Parallel and Distributed Systems",
issn = "1045-9219",
publisher = "IEEE Computer Society",
number = "12",

}

Leveraging identity-based cryptography for node ID assignment in structured P2P systems. / Butler, Kevin R.B.; Ryu, Sunam; Traynor, Patrick; McDaniel, Patrick Drew.

In: IEEE Transactions on Parallel and Distributed Systems, Vol. 20, No. 12, 4695827, 01.12.2009, p. 1803-1815.

Research output: Contribution to journalArticle

TY - JOUR

T1 - Leveraging identity-based cryptography for node ID assignment in structured P2P systems

AU - Butler, Kevin R.B.

AU - Ryu, Sunam

AU - Traynor, Patrick

AU - McDaniel, Patrick Drew

PY - 2009/12/1

Y1 - 2009/12/1

N2 - Structured peer-to-peer (P2P) systems have grown enormously because of their scalability, efficiency, and reliability. These systems assign a unique identifier to each user and object. However, current assignment schemes allow an adversary to carefully select user IDs and/or simultaneously obtain many pseudo-identitiesultimately leading to an ability to disrupt the P2P system in very targeted and dangerous ways. In this paper, we propose novel ID assignment protocols based on identity-based cryptography. This approach permits the acquisition of node IDs to be tightly regulated without many of the complexities and costs associated with traditional certificate solutions. We broadly consider the security requirements of ID assignment and present three protocols representing distinct threat and trust models. A detailed empirical study of the protocols is given. Our analysis shows that the cost of our identity-based protocols is nominal, and that the associated identity services can scale to millions of users using a limited number of servers.

AB - Structured peer-to-peer (P2P) systems have grown enormously because of their scalability, efficiency, and reliability. These systems assign a unique identifier to each user and object. However, current assignment schemes allow an adversary to carefully select user IDs and/or simultaneously obtain many pseudo-identitiesultimately leading to an ability to disrupt the P2P system in very targeted and dangerous ways. In this paper, we propose novel ID assignment protocols based on identity-based cryptography. This approach permits the acquisition of node IDs to be tightly regulated without many of the complexities and costs associated with traditional certificate solutions. We broadly consider the security requirements of ID assignment and present three protocols representing distinct threat and trust models. A detailed empirical study of the protocols is given. Our analysis shows that the cost of our identity-based protocols is nominal, and that the associated identity services can scale to millions of users using a limited number of servers.

UR - http://www.scopus.com/inward/record.url?scp=74449090467&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=74449090467&partnerID=8YFLogxK

U2 - 10.1109/TPDS.2008.249

DO - 10.1109/TPDS.2008.249

M3 - Article

AN - SCOPUS:74449090467

VL - 20

SP - 1803

EP - 1815

JO - IEEE Transactions on Parallel and Distributed Systems

JF - IEEE Transactions on Parallel and Distributed Systems

SN - 1045-9219

IS - 12

M1 - 4695827

ER -