Visible to the public Access Control for Secure Distributed Data Structures in Distributed Hash Tables

TitleAccess Control for Secure Distributed Data Structures in Distributed Hash Tables
Publication TypeConference Paper
Year of Publication2017
AuthorsAl-Aaridhi, R., Yueksektepe, A., Graffi, K.
Conference Name2017 IEEE International Symposium on Local and Metropolitan Area Networks (LANMAN)
Date Publishedjun
KeywordsAccess Control, authorisation, centralized servers, client-server model, client-server systems, communication protocols, composability, computer network security, Context, data structures, DDS, DHT, distributed data storage services, Distributed databases, distributed hash tables, Encryption, file sharing, Human Behavior, Metrics, middle-ware scheme, middleware, P2P networks, P2P overlays, Peer-to-peer computing, peer-to-peer networks, pubcrawl, resilience, Resiliency, reusable security architecture, secure distributed data structures, Secure File Sharing, security issues, social networking (online), social networks, social projects, trusted third parties
AbstractPeer-To-Peer (P2P) networks open up great possibilities for intercommunication, collaborative and social projects like file sharing, communication protocols or social networks while offering advantages over the conventional Client-Server model of computing pattern. Such networks counter the problems of centralized servers such as that P2P networks can scale to millions without additional costs. In previous work, we presented Distributed Data Structure (DDS) which offers a middle-ware scheme for distributed applications. This scheme builds on top of DHT (Distributed Hash Table) based P2P overlays, and offers distributed data storage services as a middle-ware it still needs to address security issues. The main objective of this paper is to investigate possible ways to handle the security problem for DDS, and to develop a possibly reusable security architecture for access control for secure distributed data structures in P2P networks without depending on trusted third parties.
Citation Keyal-aaridhi_access_2017