2024-03-29T06:15:33Zhttps://www.tdx.cat/oai/requestoai:www.tdx.cat:10803/3982032017-08-31T08:23:56Zcom_10803_183col_10803_234
nam a 5i 4500
Secure identity management in structured peer-to-peer (P2P) networks
[Barcelona] :
Universitat Politècnica de Catalunya,
2016
Accés lliure
http://hdl.handle.net/10803/398203
cr |||||||||||
AAMMDDs2016 sp ||||fsm||||0|| 0 eng|c
Caubet Fernández, Juan,
autor
1 recurs en línia (203 pàgines)
Tesi
Doctorat
Universitat Politècnica de Catalunya. Departament d'Enginyeria Telemàtica
2016
Universitat Politècnica de Catalunya. Departament d'Enginyeria Telemàtica
Tesis i dissertacions electròniques
Esparza Martín, Óscar,
supervisor acadèmic
Muñoz Tapia, José L.
(José Luis)
supervisor acadèmic
TDX
Structured Peer-to-Peer (P2P) networks were proposed to solve routing problems of big distributed infrastructures. But the research community has been questioning their security for years. Most prior work in security services was focused on secure routing, reputation systems, anonymity, etc. However, the proper management of identities is an important prerequisite to provide most of these security services.
The existence of anonymous nodes and the lack of a centralized authority capable of monitoring (and/or punishing) nodes make these systems more vulnerable against selfish or malicious behaviors. Moreover, these improper usages cannot be faced only with data confidentiality, nodes authentication, non-repudiation, etc. In particular, structured P2P networks should follow the following secure routing primitives: (1) secure maintenance of routing tables, (2) secure routing of messages, and (3) secure identity assignment to nodes. But the first two problems depend in some way on the third one. If nodes’ identifiers can be chosen by users without any control, these networks can have security and operational problems. Therefore, like any other network or service, structured P2P networks require a robust access control to prevent potential attackers joining the network and a robust identity assignment system to guarantee their proper operation.
In this thesis, firstly, we analyze the operation of the current structured P2P networks when managing identities in order to identify what security problems are related to the nodes’ identifiers within the overlay, and propose a series of requirements to be accomplished by any generated node ID to provide more security to a DHT-based structured P2P network.
Secondly, we propose the use of implicit certificates to provide more security and to exploit the improvement in bandwidth, storage and performance that these certificates present compared to explicit certificates, design three protocols to assign nodes’ identifiers avoiding the identified problems, while maintaining user anonymity and allowing users’ traceability.
Finally, we analyze the operation of the most used mechanisms to distribute revocation data in the Internet, with special focus on the proposed systems to work in P2P networks, and design a new mechanism to distribute revocation data more efficiently in a structured P2P network.
p
ES-BaCBU
cat
rda
ES-BaCBU
text
txt
rdacontent
informàtic
c
rdamedia
recurs en línia
cr
rdacarrier