LiCha a secure and decentralized approach for privacy aware 里岔安全与隐私意识的分散方法.pptVIP

  • 2
  • 0
  • 约2.48千字
  • 约 11页
  • 2018-06-27 发布于福建
  • 举报

LiCha a secure and decentralized approach for privacy aware 里岔安全与隐私意识的分散方法.ppt

LiCha a secure and decentralized approach for privacy aware 里岔安全与隐私意识的分散方法

Secure distributed applications: a case study Luca Maria Aiello, Federica Cesano, Marco Milanesio, Giancarlo Ruffo, Rossano Schifanella Motivations Likir Likir architecture Likir protocol Likir LiCha How LiCha works A possible future? Contacts and Credits Thank you! *Luca Maria Aiello. Università degli Studi di Torino – Dipartimento di Informatica – SecNet Group Speaker: Luca Maria Aiello SecNet Group Dipartimento di Informatica, Università degli Studi di Torino Corso Svizzera, 185 – 10149, Torino, Italy aiello@di.unito.it Italian Networking Workshop In distributed identity-based commercial applications, user data are retained by central servers. Secure infrastructure Loss of user privacy Exploiting DHT systems for data storage could preserve privacy… Respect of user data secrecy Infrastructure prone to common attacks Our contribution: Likir: a secure p2p middleware LiCha: the first Likir application, is a demonstrative Likir service Layered Identity-based Kademlia-like InfRastructure A novel DHT layer Identity: user identity management at middleware level Security: Protection against known overlay attacks (Routing poisoning, Sybil attack, MITM, Pollution…) Many other attempts to secure overlay networks: Myrmic KadSec Maelstrom … By introducing a strong binding between user ID and node ID, Likir solves (or effectively mitigates) DHT security problems Other good features No Single Point Of Failure No additional system constraints (e.g. clock synchronization) Likir middleware is transparent to application developers Ease of developement and integration of id-based applications Limited computational overhead respect to Kademlia Simple API Possible enhancements Replace RSA with IBS … The Likir Chat Fully distributed IM application User data stored in the DHT Personal data are encrypted before being stored Every content is signed by Likir layer LiCha Likir Hi! Cedric Password TCP Application Overlay net DHT storage ID Contact Personal info Dynaer Looku

您可能关注的文档

文档评论(0)

1亿VIP精品文档

相关文档