Articles | Open Access |

SECURE NET: ENSURING PRIVACY AND TRUST THROUGH ANONYMOUS AND DISTRIBUTED AUTHENTICATION IN PEER-TO-PEER NETWORKS

Janaka Lavakumar , Department of Computer Engineering, University of Peradeniya, Sri Lanka

Abstract

In peer-to-peer (P2P) networks, ensuring privacy and trust is of utmost importance due to the decentralized nature of the communication. Traditional authentication methods often fall short in providing anonymity and robustness against malicious attacks. To address these challenges, we propose Secure Net, a novel framework that combines anonymous and distributed authentication mechanisms. Secure Net employs cryptographic techniques to protect user identities while enabling secure and reliable communication in P2P networks. By distributing the authentication process across multiple nodes, Secure Net mitigates the risk of single points of failure and enhances the overall resilience of the network. Through extensive evaluations, we demonstrate the effectiveness of Secure Net in safeguarding privacy, maintaining trust, and providing seamless authentication in P2P environments.

Keywords

Peer-to-Peer Networks, Authentication, Privacy

References

Ahmed, R., & Boutaba, R. (2010). A survey of distributed search techniques in large scale distributed systems. IEEE Communications Surveys & Tutorials, 13(2), 150-167. https://ieeexplore.ieee.org/abstract/document/5473882

Alawatugoda, J. (2017). Generic construction of an eCK- secure key exchange protocol in the standard model. International Journal of Information Security, 16(5), 541-557. https://doi.org/10.1007/s10207-016-0346-9

Alilwit, N. (2020). Authentication based on blockchain. Doctoral Dissertations and Master’s Theses, EmbryRiddle Aeronautical University, (548).

Asif, M., Aziz, Z., Bin Ahmad, M., Khalid, A., Waris, H. A., & Gilani, A. (2022). Blockchain-Based Authentication and Trust Management Mechanism for Smart Cities. Sensors, 22(7), 2604. https://doi.org/10.3390/s22072604

Backx, P., Wauters, T., Dhoedt, B., & Demeester, P. (2002, October). A comparison of peer-to-peer architectures. In Eurescom Summit (Vol. 2). Citeseer.

Beverly Yang, B., & Garcia-Molina, H. (2003). Design a super-peer network. Data Engineering, 2003. Proceedings. 19th International Conference on, p, 49-60.

Bob, A., David, A., Greg, B., & Fred, E. (2005). The PGP trust model.

Bresson, E., Stern, J., & Szydlo, M. (2002, August). Threshold ring signatures and applications to ad-hoc groups. In Annual International Cryptology Conference (pp. 465-480). Springer, Berlin, Heidelberg.https://link.springer.com/chapter/10.1007/3-540-45708-9_ 30

Cramer, R., & Damgård, I. (1997, May). Linear zero- knowledge-A note on efficient zero-knowledge proofs and arguments. In Proceedings of the twenty- ninth annual ACM symposium on Theory of computing (pp. 436-445). https://dl.acm.org/doi/pdf/10.1145/258533.258635

Article Statistics

Downloads

Download data is not yet available.

Copyright License

Download Citations

How to Cite

Janaka Lavakumar. (2023). SECURE NET: ENSURING PRIVACY AND TRUST THROUGH ANONYMOUS AND DISTRIBUTED AUTHENTICATION IN PEER-TO-PEER NETWORKS. International Journal of Computer Science & Information System, 8(06), 13–16. Retrieved from https://scientiamreearch.org/index.php/ijcsis/article/view/36