By Topic

A New Security Architecture for BitTorrent

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$33 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

3 Author(s)
Firas Bader ; Sch. of Comput., Univ. of Kent, Canterbury, UK ; Andra Radoveneanu ; Hani Ragab-Hassen

With the proliferation of the use of Internet for distributing multimedia and software content, there is an increasing need for efficient and secure data distribution mechanisms that can scale to large numbers of users. The peer-to-peer protocol BitTorrent is scalable and is widely used to share unprotected files. The lack of security in BitTorrent obstructs its deployment for business applications. P2P systems have developed up to a point where their use in a business context is hampered by the lack of security. We propose to add the missing security services, widening the range of use of P2P systems. In this paper we propose a new and scalable security architecture for BitTorrent that provides reliable mechanisms for authentication, authorization, and confidentiality. The security architecture we propose for BitTorrent could be used in both personal and business contexts, and its comparison to existing architectures shows its efficiency.

Published in:

2011IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications

Date of Conference:

16-18 Nov. 2011