By Topic

Secure Communication Setup for a P2P-Based JXTA-Overlay Platform

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

4 Author(s)
Arnedo-Moreno, J. ; Dept. of Comput. Sci., Open Univ. of Catalonia, Barcelona, Spain ; Matsuo, K. ; Barolli, L. ; Xhafa, F.

At present, the maturity of the peer-to-peer (P2P) research field has pushed through new problems such as those related with security. For that reason, it is important to provide security mechanisms to P2P systems since security is one of the key issues when evaluating them. The JXTA-Overlay project is an effort to use JXTA technology to cater to a generic set of functionalities that can be used by developers to deploy P2P applications. However, since its design focused on issues such as scalability or overall performance, it did not take security into account. This paper proposes a security framework specifically suited to JXTA-Overlay's idiosyncrasies. The main features of the proposal presented in this paper include a completely modular approach which may cater to a broad set of scenarios, an effective secure key distribution method, and a hybrid key-authenticity scheme which balances the need for meaningful information at the end-user level and simplicity at the lower middleware layers.

Published in:

Industrial Electronics, IEEE Transactions on  (Volume:58 ,  Issue: 6 )