- 2
- 0
- 约2.48千字
- 约 11页
- 2018-06-27 发布于福建
- 举报
LiCha a secure and decentralized approach for privacy aware 里岔安全与隐私意识的分散方法
Secure distributed applications:a case study Luca Maria Aiello, Federica Cesano, Marco Milanesio, Giancarlo Ruffo, Rossano Schifanella Motivations Likir Likir architecture Likir protocol Likir LiCha How LiCha works A possible future? Contacts and Credits Thank you! *Luca Maria Aiello. Università degli Studi di Torino – Dipartimento di Informatica – SecNet Group Speaker: Luca Maria Aiello SecNet Group Dipartimento di Informatica, Università degli Studi di Torino Corso Svizzera, 185 – 10149, Torino, Italy aiello@di.unito.it Italian Networking Workshop In distributed identity-based commercial applications, user data are retained by central servers. Secure infrastructure Loss of user privacy Exploiting DHT systems for data storage could preserve privacy… Respect of user data secrecy Infrastructure prone to common attacks Our contribution: Likir: a secure p2p middleware LiCha: the first Likir application, is a demonstrative Likir service Layered Identity-based Kademlia-like InfRastructure A novel DHT layer Identity: user identity management at middleware level Security: Protection against known overlay attacks (Routing poisoning, Sybil attack, MITM, Pollution…) Many other attempts to secure overlay networks: Myrmic KadSec Maelstrom … By introducing a strong binding between user ID and node ID, Likir solves (or effectively mitigates) DHT security problems Other good features No Single Point Of Failure No additional system constraints (e.g. clock synchronization) Likir middleware is transparent to application developers Ease of developement and integration of id-based applications Limited computational overhead respect to Kademlia Simple API Possible enhancements Replace RSA with IBS … The Likir Chat Fully distributed IM application User data stored in the DHT Personal data are encrypted before being stored Every content is signed by Likir layer LiCha Likir Hi! Cedric Password TCP Application Overlay net DHT storage ID Contact Personal info Dynaer Looku
您可能关注的文档
- Kinetic and Potential Energy动能与势能.ppt
- Keynes and the Classics凯因斯与经典.ppt
- Key Steps to Market and Capture Federal Business市场与捕捉联邦商业关键步骤.ppt
- Kinetic and thermodynamic studies of the dissolution of溶解的动力学与热力学研究.doc
- KNOLWDGE REPRESENTATION AND INFERENCE - Simpson 知识表示与推理-辛普森.ppt
- KNOWLEDGE AND COHERENCE Paul Thagard, Chris Eliasmith 知识与相干保罗Thagard,克里斯eliasmith.doc
- Knowledge Representation - IDI Computer and Information …知识表示与计算机与信息….ppt
- KM173机体钻扩挺柱孔机床加工示意图与主轴箱设计.doc
- Knowledge Representation and Reasoning - Dublin Institute of 都柏林学院知识表示与推理.ppt
- Knowledge-gaps in the Scaling-up Debate Nora Lustig Director …在扩大的辩论诺拉与导演的知识差距….ppt
- linux防火墙基础与管理设置iptables规则.docx
- Linux网络操作系统配置与管理项目11 安装与配置DNS服务器.ppt
- LRQP03文件与资料管理程序.doc
- LRQP11软件复制交付与安装管理程序.doc
- LRQP14开发.安装与服务工具管理程序.doc
- lxmt时尚泰新马10日(不含小费与马段330.doc
- LS to 3GPP and 3GPP2 on mobility coordination for NGNLS在流动协调3GPP与3GPP2 NGN.doc
- Linux网络操作系统配置与管理项目4 管理用户与用户组.ppt
- Managerial Effort Incentives and Market Collusion管理努力的激励与市场合谋.ppt
- Longleaf Pine Ecosystem Restoration and Hazardous Fuels 长叶松生态系统的恢复与危险的燃料.docx
原创力文档

文档评论(0)