Abstract
Pastry is one of the most popular DHT overlay used in various distributed applications, because of its scalability, efficiency and reliability. On the other hand, Pastry is not resistant against the more generous attacks include Sybil attack, Eclipse attack etc. In this paper, we propose SEPastry (security enhanced pastry) to heighten the security features of Pastry without using any computational cryptographic primitives. SEPastry is found to be resistant against various forms of node-id attacks like Sybil attack, Eclipse attack, etc.
Access provided by Autonomous University of Puebla. Download to read the full chapter text
Chapter PDF
Similar content being viewed by others
References
Rowstron, A., Druschel, P.: Pastry: Scalable, Decentralized Object Location, and Routing for Large-Scale Peer-to-Peer Systems. In: Guerraoui, R. (ed.) Middleware 2001. LNCS, vol. 2218, pp. 329–350. Springer, Heidelberg (2001)
Rowstron, A., Kermarrec, A.-M., Druschel, P., Castro, M.: Scribe: The design of a large-scale event notification infrastructure. In: Intl. Workshop on Networked Group Communication (NGC 2001) (June 2001)
Cerri, D., Ghioni, A., Paraboschi, S., Tiraboschi, S.: ID mapping attacks in P2P networks. In: IEEE Global Telecommunications Conference, GLOBECOM 2005, December 3 (2005)
Rowaihy, H., William, E., Patrick, M., Porta, T.L.: Limiting sybil attacks in structured peer-to-peer networks. Technical Report NAS-TR-0017-2005, Network and Security Research Center, Department of Computer Science and Engineering, Pennsylvania State University, University Park, PA, USA (2005)
Dinger, J., Hartentstein: Defending the Sybil Attack in P2P Networks: Taxonomy, Challenges,and a Proposal for Self-Registration. In: Proc. 1st International Conference on Availability, Reliability and Security, Vienna, Austria, pp. 756–763. IEEE Computer Society Press, Los Alamitos (2006)
Douceur, J.R.: The Sybil Attack. In: Druschel, P., Kaashoek, M.F., Rowstron, A. (eds.) IPTPS 2002. LNCS, vol. 2429, pp. 251–260. Springer, Heidelberg (2002)
Puttaswamy, K., Zheng, H., Zhao, B.: Securing structured overlays against identity attacks. IEEE Transactions on Paralleland Distributed Systems 2010, 1487–1498 (2009)
Aiello, L.M., Milanesio, M., Ruffo, G., Schifanella, R.: Tampering Kadmelia with a Robust Identity Based System. Computer science Department - Universit‘a degli Studi di Torino, Italy
Castro, M., Druschel, P., Ganesh, A., Rowstron, A., Wallach, D.S.: Secure routing for structured peer-to-peer overlay networks. In: Proc. of the 5th Usenix Symposium on Operating Systems Design and Implementation, Boston, MA (December 2002)
Margolin, N.B., Levine, B.N.: Informant: Detecting Sybils Using Incentives. In: Dietrich, S., Dhamija, R. (eds.) FC 2007 and USEC 2007. LNCS, vol. 4886, pp. 192–207. Springer, Heidelberg (2007)
Druschel, P., Rowstron, A.: PAST: A large-scale, persistent peer-to-peer storage utility. In: Proc. HotOS VIII, Schloss Elmau, Germany (May 2001)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Mishra, M., Tripathy, S., Peri, S. (2012). SEPastry: Security Enhanced Pastry. In: Meghanathan, N., Nagamalai, D., Chaki, N. (eds) Advances in Computing and Information Technology. Advances in Intelligent Systems and Computing, vol 176. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-31513-8_80
Download citation
DOI: https://doi.org/10.1007/978-3-642-31513-8_80
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-31512-1
Online ISBN: 978-3-642-31513-8
eBook Packages: EngineeringEngineering (R0)