Secure Content Distribution in Pure P2P

Secure Content Distribution in Pure P2P

Esther Palomar, Juan M.E. Tapiador, Julio C. Hernandez-Castro, Arturo Ribagorda
Copyright: © 2009 |Pages: 19
ISBN13: 9781605662626|ISBN10: 1605662623|EISBN13: 9781605662633
DOI: 10.4018/978-1-60566-262-6.ch020
Cite Chapter Cite Chapter

MLA

Palomar, Esther, et al. "Secure Content Distribution in Pure P2P." Handbook of Research on Secure Multimedia Distribution, edited by Shiguo Lian and Yan Zhang, IGI Global, 2009, pp. 384-402. https://doi.org/10.4018/978-1-60566-262-6.ch020

APA

Palomar, E., Tapiador, J. M., Hernandez-Castro, J. C., & Ribagorda, A. (2009). Secure Content Distribution in Pure P2P. In S. Lian & Y. Zhang (Eds.), Handbook of Research on Secure Multimedia Distribution (pp. 384-402). IGI Global. https://doi.org/10.4018/978-1-60566-262-6.ch020

Chicago

Palomar, Esther, et al. "Secure Content Distribution in Pure P2P." In Handbook of Research on Secure Multimedia Distribution, edited by Shiguo Lian and Yan Zhang, 384-402. Hershey, PA: IGI Global, 2009. https://doi.org/10.4018/978-1-60566-262-6.ch020

Export Reference

Mendeley
Favorite

Abstract

Perhaps the most popular feature offered by Peer-to-Peer (P2P) networks is the possibility of having several replicas of the same content distributed among multiple nodes. Among the advantages of P2P networks, we emphasize the property of robust fault tolerance. Nevertheless, there are also some disadvantages (e.g. those derived from their decentralized and self-organized nature) such as the complexity of network management and the existence of new security vulnerabilities. In fact, a significant challenge for P2P file sharing systems is maintaining the correctness and consistency of their global data structures and shared contents, as peers independently and unpredictably join and leave the system. Similarly, access control to the shared resources is a noteworthy problem for users of such systems. Most of the difficulties found to apply classic security solutions (e.g. authentication and authorization services) are just related to the impossibility of deploying a public key infrastructure (PKI) in these env ronments, and new proposals have to deal with avoiding such a centralization by exploring alternative paradigms, which often require cooperation among peers. In this chapter, we describe the background and framework of content distribution in pure P2P networks and present the most representative schemes for providing a secure content replication.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.