Sciweavers

Share
P2P
2005
IEEE

Trusted Computing: Providing Security for Peer-to-Peer Networks

10 years 10 months ago
Trusted Computing: Providing Security for Peer-to-Peer Networks
In this paper, we demonstrate the application of Trusted Computing to securing Peer-to-Peer (P2P) networks. We identify a central challenge in providing many of the security services within these networks, namely the absence of stable verifiable peer identities. We employ the functionalities provided by Trusted Computing technology to establish a pseudonymous authentication scheme for peers and extend this scheme to build secure channels between peers for future communications. In support of our work, we illustrate how commands from the Trusted Computing Group (TCG) specifications can be used to implement our approach in P2P networks.
Shane Balfe, Amit D. Lakhani, Kenneth G. Paterson
Added 25 Jun 2010
Updated 25 Jun 2010
Type Conference
Year 2005
Where P2P
Authors Shane Balfe, Amit D. Lakhani, Kenneth G. Paterson
Comments (0)
books