Authors: Joan Arnedo-Moreno, Jordi Herrera-Joancomarti
Addresses: Estudis d'Informatica, Multimedia i Telecomunicacio, Universitat Oberta de Catalunya, Rb. Poblenou 156 08018 Barcelona, Spain. ' Escola Tecnica Superior d'Enginyeria, Universitat Autonoma de Barcelona, Campus de Bellaterra, Spain
Abstract: JXTA defines a set of six core protocols specifically suited for ad hoc, pervasive, multi-hop, peer-to-peer (P2P) computing. These protocols allow peers to cooperate and form autonomous peer groups. This paper presents a satisfactory method that provides security services to the core protocols: privacy, authenticity, integrity and non-repudiation. The presented mechanisms are fully distributed and based on a pure peer-to-peer model, not requiring the arbitration of a trusted third party or a previously established trust relationship between peers, which is one of the main challenges under this kind of environments.
Keywords: peer-to-peer; P2P computing; security; peer group; JXTA; XMLdsig; XMLenc; peer resolver protocol; PRP; XML; ad hoc computing; pervasive computing; multi-hop computing; privacy; authenticity; integrity; non-repudiation.
International Journal of Autonomic Computing, 2010 Vol.1 No.4, pp.447 - 469
Published online: 15 Dec 2010 *Full-text access for editors Access for subscribers Purchase this article Comment on this article