Trusted Computing: Providing Security for Peer-to-Peer Networks

  • Authors:
  • Shane Balfe;Amit D. Lakhani;Kenneth G. Paterson

  • Affiliations:
  • University of London;University of London;University of London

  • Venue:
  • P2P '05 Proceedings of the Fifth IEEE International Conference on Peer-to-Peer Computing
  • Year:
  • 2005

Quantified Score

Hi-index 0.00

Visualization

Abstract

In this paper, we demonstrate the application of Trusted Computing to securing Peer-to-Peer (P2P) networks. We identify a central challenge in providing many of the security services within these networks, namely the absence of stable verifiable peer identities. We employ the functionalities provided by Trusted Computing technology to establish a pseudonymous authentication scheme for peers and extend this scheme to build secure channels between peers for future communications. In support of our work, we illustrate how commands from the Trusted Computing Group (TCG) specifications can be used to implement our approach in P2P networks.