
SECURE NET: ENSURING PRIVACY AND TRUST THROUGH ANONYMOUS AND DISTRIBUTED AUTHENTICATION IN PEER-TO-PEER NETWORKS
Janaka Lavakumar , Department of Computer Engineering, University of Peradeniya, Sri LankaAbstract
In peer-to-peer (P2P) networks, ensuring privacy and trust is of utmost importance due to the decentralized nature of the communication. Traditional authentication methods often fall short in providing anonymity and robustness against malicious attacks. To address these challenges, we propose Secure Net, a novel framework that combines anonymous and distributed authentication mechanisms. Secure Net employs cryptographic techniques to protect user identities while enabling secure and reliable communication in P2P networks. By distributing the authentication process across multiple nodes, Secure Net mitigates the risk of single points of failure and enhances the overall resilience of the network. Through extensive evaluations, we demonstrate the effectiveness of Secure Net in safeguarding privacy, maintaining trust, and providing seamless authentication in P2P environments.
Keywords
Peer-to-Peer Networks, Authentication, Privacy
References
Ahmed, R., & Boutaba, R. (2010). A survey of distributed search techniques in large scale distributed systems. IEEE Communications Surveys & Tutorials, 13(2), 150-167. https://ieeexplore.ieee.org/abstract/document/5473882
Alawatugoda, J. (2017). Generic construction of an eCK- secure key exchange protocol in the standard model. International Journal of Information Security, 16(5), 541-557. https://doi.org/10.1007/s10207-016-0346-9
Alilwit, N. (2020). Authentication based on blockchain. Doctoral Dissertations and Master’s Theses, EmbryRiddle Aeronautical University, (548).
Asif, M., Aziz, Z., Bin Ahmad, M., Khalid, A., Waris, H. A., & Gilani, A. (2022). Blockchain-Based Authentication and Trust Management Mechanism for Smart Cities. Sensors, 22(7), 2604. https://doi.org/10.3390/s22072604
Backx, P., Wauters, T., Dhoedt, B., & Demeester, P. (2002, October). A comparison of peer-to-peer architectures. In Eurescom Summit (Vol. 2). Citeseer.
Beverly Yang, B., & Garcia-Molina, H. (2003). Design a super-peer network. Data Engineering, 2003. Proceedings. 19th International Conference on, p, 49-60.
Bob, A., David, A., Greg, B., & Fred, E. (2005). The PGP trust model.
Bresson, E., Stern, J., & Szydlo, M. (2002, August). Threshold ring signatures and applications to ad-hoc groups. In Annual International Cryptology Conference (pp. 465-480). Springer, Berlin, Heidelberg.https://link.springer.com/chapter/10.1007/3-540-45708-9_ 30
Cramer, R., & Damgård, I. (1997, May). Linear zero- knowledge-A note on efficient zero-knowledge proofs and arguments. In Proceedings of the twenty- ninth annual ACM symposium on Theory of computing (pp. 436-445). https://dl.acm.org/doi/pdf/10.1145/258533.258635
Article Statistics
Downloads
Copyright License
Copyright (c) 2023 Janaka Lavakumar

This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.
Copyright and Ethics:
- Authors are responsible for obtaining permission to use any copyrighted materials included in their manuscript.
- Authors are also responsible for ensuring that their research was conducted in an ethical manner and in compliance with institutional and national guidelines for the care and use of animals or human subjects.
- By submitting a manuscript to International Journal of Computer Science & Information System (IJCSIS), authors agree to transfer copyright to the journal if the manuscript is accepted for publication.