gzz-commits
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[Gzz-commits] gzz/Documentation/misc/hemppah-progradu mastert...


From: Hermanni Hyytiälä
Subject: [Gzz-commits] gzz/Documentation/misc/hemppah-progradu mastert...
Date: Mon, 03 Mar 2003 05:49:56 -0500

CVSROOT:        /cvsroot/gzz
Module name:    gzz
Changes by:     Hermanni Hyytiälä <address@hidden>      03/03/03 05:49:55

Modified files:
        Documentation/misc/hemppah-progradu: masterthesis.tex 
                                             progradu.bib 

Log message:
        More trust

CVSWeb URLs:
http://savannah.gnu.org/cgi-bin/viewcvs/gzz/gzz/Documentation/misc/hemppah-progradu/masterthesis.tex.diff?tr1=1.102&tr2=1.103&r1=text&r2=text
http://savannah.gnu.org/cgi-bin/viewcvs/gzz/gzz/Documentation/misc/hemppah-progradu/progradu.bib.diff?tr1=1.89&tr2=1.90&r1=text&r2=text

Patches:
Index: gzz/Documentation/misc/hemppah-progradu/masterthesis.tex
diff -u gzz/Documentation/misc/hemppah-progradu/masterthesis.tex:1.102 
gzz/Documentation/misc/hemppah-progradu/masterthesis.tex:1.103
--- gzz/Documentation/misc/hemppah-progradu/masterthesis.tex:1.102      Mon Mar 
 3 05:17:31 2003
+++ gzz/Documentation/misc/hemppah-progradu/masterthesis.tex    Mon Mar  3 
05:49:55 2003
@@ -1051,10 +1051,17 @@
 
 \subsection{Trust, data authenticity and integrity}
 
+Currently, trust in Peer-to-Peer systems is based on \emph{reputation}. 
Current repuation methods focus either
+on the semantic properties, or data management properties of the trust model. 
Some research has been 
+done on reputation models in Peer-to-Peer systems, such as 
\cite{aberer01trust}. Implementations
+include Advogato \cite{advogatourl}. None of the current proposals or 
implementations based on reputation address trust
+in a trustworthy way.
+
+Optimal solution for trust in Peer-to-Peer systems would be certificate based 
security methods.
 Quite recently, widely used Public Key Infrastructure (PKI) has been deployed 
in distributed
 systems \cite{rivest96sdsi}, \cite{spkiworkinggroup}. PKI is an reliable 
technology for securing
 data in rather \emph{static} computing systems, such as in the Internet. 
However, in Peer-to-Peer 
-network, the problem of PKI-based security mechanism is the maintenance of the 
keys as participating
+network, the problem of key based security mechanism is the maintenance of the 
keys as participating
 peer constantly join and leave the system. Specifically, the distribution of 
key changes comes an essential
 problem in ad hoc enviroments. These include revokation of keys and new key 
distribution. Also, the scenario
 in which hostile peers are present has to be addressed.
@@ -1064,6 +1071,12 @@
 features of PKI to be fully usable yet. Furthermore, the hierarchy of 
SDSI/SPKI may a problem for
 Peer-to-Peer systems, in which hierarchy is intentionally missing.
 
+For data integrity, on the other hand, there are few working solutions. 
Cryptographic content hashes,
+such as \cite{fips-sha-1}, variations \cite{merkle87hashtree} and their 
implementation techniques \cite{mohr02thex},
+are efficient and reliable methods for identifying the integrity of data in 
Peer-to-Peer systems. One
+possible application of cryptographic content hashes may in peer identifier 
creation process, in which
+IP address of peer can be verified by the other peer. This is one form of 
\emph{self-certifying data}. 
+
 
 \subsection{Anonymity}
 Anonymoys \cite{352607}
@@ -1080,7 +1093,7 @@
 
 \cite{sit02securitycons}
 
-\cite{aberer01trust}
+
 
 \cite{ajmani02conchord}
 
Index: gzz/Documentation/misc/hemppah-progradu/progradu.bib
diff -u gzz/Documentation/misc/hemppah-progradu/progradu.bib:1.89 
gzz/Documentation/misc/hemppah-progradu/progradu.bib:1.90
--- gzz/Documentation/misc/hemppah-progradu/progradu.bib:1.89   Mon Mar  3 
05:17:31 2003
+++ gzz/Documentation/misc/hemppah-progradu/progradu.bib        Mon Mar  3 
05:49:55 2003
@@ -2026,4 +2026,20 @@
        url = {http://www.ietf.org/html.charters/spki-charter.html}
 }
 
address@hidden,
+       title = {Advogato Trust Metric},
+       key = {Advogato Trust Metric},
+       url = {http://advogato.org/trust-metric.html}
+}
 
address@hidden,
+       key = {Khashmir},
+       title ={Khashmir},
+       url = {http://khashmir.sourceforge.net/}
+}
+
address@hidden,
+       title ={Mixminion},
+       key = {Mixminion},
+       url ={http://www.mixminion.net/}
+}




reply via email to

[Prev in Thread] Current Thread [Next in Thread]