Advertisement

Combating Index Poisoning in P2P File Sharing

  • Lingli Deng
  • Yeping He
  • Ziyao Xu
Part of the Lecture Notes in Computer Science book series (LNCS, volume 5576)

Abstract

In a peer-to-peer (P2P) file-sharing system, the faithful delivery of an authentic file depends on the authenticity of the file advertisement as well as the authenticity of the shared file advertised. We present the index authenticity problem in a distributed P2P indexing scheme, and propose to employ a secure index verification scheme, which allows a querying requestor to securely verify the authenticity of file advertisements in the query response from a distrusted index peer with unforgeable proofs of indexing correctness, in order to combat index poisoning attacks targeting index authenticity. A solution based on signature and bloom filter (BF) and its cost-efficiency analysis are given.

Keywords

P2P index poisoning authenticity bloom filter 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Liang, J., Naoumov, N., Ross, K.W.: The index poisoning attack in P2P file sharing systems. In: Proc. of INFOCOM, pp. 1–12 (2006)Google Scholar
  2. 2.
    Garces-Erice, L., Felber, P.A., Biersack, E.W., et al.: Data indexing in peer-to-peer DHT networks. In: Proc. of ICDCS, pp. 200–208 (2004)Google Scholar
  3. 3.
    Skobeltsyn, G., Aberer, K.: Distributed cache table: efficient query-driven processing of multi-term queries in P2P networks. In: Proc. of IRP2P, pp. 33–40 (2006)Google Scholar
  4. 4.
    Deng, L., He, Y., Xu, Z.: Service Authenticity in P2P File-Sharing. In: Proc. of ICYCS, pp. 2246–2253 (2008)Google Scholar
  5. 5.
    Liang, J., Kumar, R., Xi, Y., et al.: Pollution in P2P file sharing systems. In: Proc. of INFOCOM, pp. 1174–1185 (2005)Google Scholar
  6. 6.
    Resnick, P., Kuwabara, K., Zeckhauser, R., et al.: Reputation systems. Commun. ACM 43(12), 45–48 (2000)CrossRefGoogle Scholar
  7. 7.
    Daswani, N., Garcia-Molina, H., Yang, B.: Open problems in data-sharing peer-to-peer systems. In: Calvanese, D., Lenzerini, M., Motwani, R. (eds.) ICDT 2003. LNCS, vol. 2572, pp. 1–15. Springer, Heidelberg (2002)CrossRefGoogle Scholar
  8. 8.
    Daswani, N., Golle, P., Marti, S., et al.: Evaluating reputation systems for document authenticity. Technical report, Stanford University (2003)Google Scholar
  9. 9.
    Zhang, X., Chen, S., Sandhu, R.: Enhancing data authenticity and integrity in P2P systems. IEEE Internet Computing 9(6), 42–49 (2005)CrossRefGoogle Scholar
  10. 10.
    Qiu, D., Srikant, R.: Modeling and performance analysis of BitTorrent-like peer-to-peer networks. In: Proc. of SIGCOMM, pp. 367–378 (2004)Google Scholar
  11. 11.
    Ripeanu, M., Foster, I.: Peer-to-peer architecture case study: Gnutella network. In: Proc. of IPTPS, pp. 99–100 (2001)Google Scholar
  12. 12.
    Stoica, I., Morris, R., Liben-Nowell, D., et al.: Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Trans. Netw. 11(1), 17–32 (2003)CrossRefGoogle Scholar
  13. 13.
    Harren, M., Hellerstein, J.M., Huebsch, R., et al.: Complex queries in DHT-based peer-to-peer networks. In: Druschel, P., Kaashoek, M.F., Rowstron, A. (eds.) IPTPS 2002. LNCS, vol. 2429, pp. 242–250. Springer, Heidelberg (2002)CrossRefGoogle Scholar
  14. 14.
    Li, J., Loo, B.T., Hellerstein, J.M., et al.: On the feasibility of peer-to-peer web indexing and search. In: Kaashoek, M.F., Stoica, I. (eds.) IPTPS 2003. LNCS, vol. 2735, pp. 207–215. Springer, Heidelberg (2003)Google Scholar
  15. 15.
    Chen, H., Jin, H., Wang, J., et al.: Efficient multi-keyword search over P2P web. In: Proc. of WWW, pp. 989–998 (2008)Google Scholar
  16. 16.
    Broder, A., Mitzenmacher, M.: Network applications of bloom filters: a survey. J. Internet Mathematics 1(4), 485–509 (2004)MathSciNetCrossRefzbMATHGoogle Scholar
  17. 17.
    Kumar, A., Xu, J., Zegara, E.W.: Efficient and scalable query routing for unstructured peer-to-peer networks. In: Proc. of INFOCOM, pp. 1162–1173 (2005)Google Scholar
  18. 18.
    Byers, J.W., Considine, J., Mitzenmacher, M., et al.: Informed content delivery across adaptive overlay networks. IEEE/ACM Trans. Netw. 12(5), 767–780 (2004)CrossRefGoogle Scholar
  19. 19.
    Jin, X., Yiu, W.P.K., Chan, S.H.: Supporting multiple-keyword dearch in a hybrid structured peer-to-peer network. In: Proc. of ICC, pp. 42–47 (2006)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2009

Authors and Affiliations

  • Lingli Deng
    • 1
    • 2
  • Yeping He
    • 1
  • Ziyao Xu
    • 1
    • 2
  1. 1.Institute of SoftwareChinese Academy of SciencesBeijingP.R. China
  2. 2.Graduate University of Chinese Academy of SciencesBeijingP.R. China

Personalised recommendations