In the environment of the 3:rd generation Internet based on peer-to-peer architecture, well-trusted methods must exist to establish a secure environment. One main issue is the possibility to verify that a node actually is who it claims to be (authentication). Establishment of authentication between nodes in a peer-to-peer environment where nodes are exchanging information directly with each other requires more planning than in a typical client-server environment where the authentication methods are server-based. The peer-to-peer applications described in this report use authentication methods…
Contents
1 Introduction
1.1 Background
1.2 Motivation
1.3 Purpose
1.4 About this document
2 Peer-to-Peer: definitions and architecture
2.1 Definitions
2.2 Architecture
2.2.1 Hybrid peer-to-peer networks
2.2.2 Pure peer-to-peer networks
2.3 Summary
3 Security: definitions
3.1 Establishment of a trusted environment
3.2 Authentication
3.3 Authorization and access control
3.4 Data integrity
4 Network authentication methods
4.1 Key distribution
4.1.1 Private keys
4.1.2 Public keys
4.2 Symmetric algorithms
4.3 Asymmetric algorithms
5 Peer-to-Peer authentication
5.1 Napster
5.2 Mangomind
5.3 WebRiposte
5.4 Groove
5.5 Magi Enterprise
5.6 Avaki
5.7 Globus
5.8 Summary
6 Secure P2P development platforms
6.1 JXTA
6.2 .NET
6.3 Peer-to-Peer Trusted Libraries
6.4 Summary
7 Conclusions and future work
7.1 Conclusion
7.2 Future work
Appendix A: Authentication procedures
A.1 Kerberos
A.1.1 Description
A.1.2 Architecture
A.2 X.509
A.2.1 Description
A.2.2 Architecture
Appendix B: Existing P2P systems
B.1 Napster
B.1.1 Architecture
B.1.2 Security
B.2 Gnutella
B.2.1 Architecture
B.2.2 Security
B.3 Freenet
B.3.1 Architecture
B.3.2 Security
B.4 Mangomind
B.4.1 Architecture
B.4.2 Security
B.5 WebRiposte
B.5.1 Architecture
B.5.2 Security
B.6 Groove
B.6.1 Architecture
B.6.2 Security
B.7 Magi Enterprise
B.7.1 Architecture
B.7.2 Security
B.8 Avaki
B.8.1 Architecture
B.8.2 Security
B.8.3 Secure Grid Network Protocol
B.9 Globus
B.9.1 Architecture
B.9.2 Security
Appendix C: P2P development platforms
C.1 JXTA
C.1.1 Description
C.1.2 Architecture
C.1.3 Security
C.2 .NET
C.2.1 Description
C.2.2 Architecture
C.2.3 Security
C.3 Peer-to-Peer Trusted Library
C.3.1 Description
C.3.2 Architecture
C.3.3 Security
Bibliography
Literature
Links
Glossary
Index
Author: Åslund, Jonas
Source: Linköping University
Download URL 2: Visit Now