SlideShare une entreprise Scribd logo
1  sur  9
Télécharger pour lire hors ligne
International Journal of Engineering Science Invention
ISSN (Online): 2319 – 6734, ISSN (Print): 2319 – 6726
www.ijesi.org Volume 2 Issue 9 ǁ September. 2013 ǁ PP.10-18

Secured Key Partition for a Peer-To-Peer Network Using Identity
based cryptography
1

Suneeta peddireddy, 2 Lokesh A, 3Prapulla C

1

Asst.Professor, Rajiv Gandhi Institute of Technology, Bengaluru-560032.
2
Asst.Professor, M S Engineering College, Bengaluru-560064
3
M.Tech III SEM CS&E, M S Engineering College, Bengaluru-560064.

ABSTRACT: For identity verification and authentication purposes we introduced an Identity based
cryptography (IBC) into peer-to-peer (P2P) . However problems on secure private key issuing could not be
addressed by current IBC-based solution. In this paper we present a IBC infrastructure setup phase, a peer
registration solution using Shamir’s (k, n) secret sharing scheme, and a secure key issuing scheme, which
adopts key generate center (KGC) and key privacy authorities (KPAs) to issue private keys to peers securely in
order to enable the IBC systems to be more acceptable and applicable in real-world P2P networks. We use
Byzantine fault tolerance protocol to develop a scheme to authenticate KPAs and to maintain a security of
KPAs. This has theoretical analysis and experimental results that shows performance is effective and is able to
support large scale network.

KEYWORDS: Peer-to-Peer, Secured key issuing, Secrete key sharing, fault tolerance
I. BACKGROUND
P2P networks are extremely vulnerable to large spectrum of attacks , with its self-organized and selfmaintenance nature. This is mainly due to the lack of certification service responsible for identity verification
and for authentication purposes.
We can solve some of the problems by verifying the authenticated nodes identities and by issusing
public keys to the nodes for certification using traditional certificate-based public key infrastructure.PKI based
on security protocol is difficult to deployed as many nodes that store certificates to each node may become
invalid quickly as node churn is highly frequent in P2P network. Practically it is difficult to implement as each
node requires more space to store public key certificates. If overlay nodes have a common shared key for secure
communication then secured P2P overlay communication is efficient. In dynamic P2P overlay network
achieving such an efficiency is difficult as a new key must be generated every time a node membership changes
occurs in order to preserve secrecy.

II. INTRODUCTION
In Securing Key issuing trust level that is to be placed on third party is important .In regular
transmission of data that the users supplies information must be blinded which is also called as blinding. The
third party provides a partial private key which is called as blinded. That key is passed on many other third
party. Once the users gets the key the users can unblind the keys and retrieve the information. Here the secured
key is divided into several parts and any three of the key part can be used by the user to retrieve the information

III. SYSTEM DESIGN
We have four section namely system setup,peer registration, secure keying and system maintenance. In
system setup phase we describe how KGC and KPA work in the beginning of the system. In Peer Registration
phase and secure keying phase we describe how a peer joins the system . In system maintenance phase the
maintenance of KPAs takes place
The requirements of the system are :






Secure peer registration:
It must be able to a methodology to mitigate attacks such as man-in-middle attack, collusion attacks during
peer registration phase.
Robust system maintenance :
The system must provide a online method to add new subtitutional KPAs remove,
identify malicious KPAs.

www.ijesi.org

10 | Page
Secured Key Partition For A Peer-To-Peer Network Using...



Secure key issuing :
The key that is being issued must be secure that will secure the keys without secure channel and defend
attacks of all types.

The software requirements analysis (SRA) step of a software development process yields specifications that
are used in software engineering. If the software is "semi automated" or user centered, software design may
involve user experience design yielding a story board to help determine those specifications. If the software is
completely automated (meaning no user or user interface), a software design may be as simple as a flow chart or
text describing a planned sequence of events. There are also semi-standard methods like Unified Modeling
Language and Fundamental modeling concepts. In either case some documentation of the plan is usually the
product of the design.
A software design may be platform-independent or platform-specific, depending on the availability of the
technology called for by the design
Design Considerations
There are many aspects to consider in the design of a piece of software. The importance of each should
reflect the goals the software is trying to achieve. Some of these aspects are:
 Compatibility –The software is able to operate with other products that are designed for interoperability
with another product. Since our software is developed on java it is compatible with other products.
 Packaging - In java many packages are available. Thus we have used various packages which made coding
simpler.
 Reliability - The software is able to perform a required function under stated conditions for a specified
period of time. Hence the software reliable.
 Reusability -The modular components designed capture the essence of the functionality expected out of
them and hence the modules are reusable.
 Robustness - The software is able to tolerate unpredictable or invalid input.
 Usability - The software has user friendly interface which makes its usability easy.

IV. RESULT
4.1 Creating Peer Node

4.1: Creating Peer Node
4.2 Register The Peer Node

www.ijesi.org

11 | Page
Secured Key Partition For A Peer-To-Peer Network Using...
4.2.1: Register The Peer Node

4.2.2: Giving name to peer node

4.2.3: ID is received
4.3 Key Generation Centre

4.3.1: Key Generation Center waiting for request
4.4 Key Generation Process

www.ijesi.org

12 | Page
Secured Key Partition For A Peer-To-Peer Network Using...
4.4.1: Key Generation Process
4.5 Key Privacy Authority

4.5.1 : Key Privacy Authority

www.ijesi.org

13 | Page
Secured Key Partition For A Peer-To-Peer Network Using...
4.6 Key generation centre with key parts

4.6.1: Key generation centre with key parts
4.7 KPA with a key part

4.7: KPA with a key part
4.8 Get Key from KPAs

4.8.1: Get Key from KPAs
4.9 Retrieving the key

www.ijesi.org

14 | Page
Secured Key Partition For A Peer-To-Peer Network Using...
4.9.1: Retrieving the key
4.10 Entering ID of the peer node

4.10.1: Entering ID of the peer node
4.11 Using the key parts

4.11.1: Using the key parts
4.12 Sending Message to Receiver Peer

4.12.1: Sending Message to Receiver Peer
4.13Confirmation

www.ijesi.org

15 | Page
Secured Key Partition For A Peer-To-Peer Network Using...
4.13.1: Confirmation
4.14 Receiving a Message

4.14.1: Receiving a Message
4.15 Selection of KPAs

4.15.1: Selection of KPAs
4.16 Entering the peer’s ID

4.16.1: Entering the peer’s ID
4.17 Decryption

4.17.1: Decryption

www.ijesi.org

16 | Page
Secured Key Partition For A Peer-To-Peer Network Using...
4.18 Key display

4.18 Key display
4.19 Disconnected from KGC

6.19.1: Disconnected from KGC
4.20 KGC after disconnection

4.20.1: KGC after disconnection

V. CONCLUSION & ENHANCEMENT
We have developed a secure key issuing scheme for P2P networks using IBC, SKIP. SKIP provides a
peer registration service using Shamir’s (k,n) secret sharing scheme. We develop a secure key issuing protocol,
which adopts KGC and KPAs to issue private keys to peers securely.
Our future work includes developing a scheme to authenticate KPAs, remove malicious ones and
finding out alternate ones to join in the system using the BFT protocol.

www.ijesi.org

17 | Page
Secured Key Partition For A Peer-To-Peer Network Using...
REFERENCES
[1].
[2].
[3].
[4].
[5].
[6].
[7].
[8].
[9].
[10].
[11].
[12].
[13].
[14].

Cong Tang, Ruichuan Chen, Zhuhua Cai, Anming Xie, Jianbin Hu ∗ , Liyong Tang, Zhong Chen, “SKIP: A Secure Key Issuing
Scheme for Peer-to-Peer Networks”, in Institute of Software, Peking University, China,2010,
E. Sit and R. Morris, “Security considerations for peer-to-peer distributed hash tables,” in IPTPS, 2002, pp. 261–269.
Shamir, “Identity-based cryptosystems and signature schemes,” in CRYPTO, 1984, pp. 47–53.
D. Boneh and M. K. Franklin, “Identity-based encryption from the weil pairing,” in CRYPTO, 2001, pp. 213–229.
Lee, C. Boyd, E. Dawson, K. Kim, J. Yang, and S. Yoo, “Secure key issuing in id-based cryptography,” in ACSW Frontiers,
2004, pp. 69–74.
R. Gangishetti, M. C. Gorantla, M. L. Das, A. Saxena, and V. P. Gulati, “An efficient secure key issuing protocol in idbased
cryptosystems,” in ITCC (1), 2005, pp. 674–678.
Saxena, “Threshold ski protocol for id-based cryptosystems,” in IAS, 2007, pp. 65–70.
Z.-L. Lu, G.-H.; Zhang, “Wheel of trust: A secure framework for overlay-based services,” ICC, pp. 1148–1153, 2007.
Stoica, R. Morris, D. R. Karger, M. F. Kaashoek, and H. Balakrishnan, “Chord: A scalable peer-to-peer lookup service for
internet applications,” in SIGCOMM, 2001, pp. 149–160.
E. K. Lua, “Securing peer-to-peer overlay networks from Sybil attack,” in ISCIT’07, Sydney, Australia, 2007.
S. Ryu, K. R. B. Butler, P. Traynor, and P. D. McDaniel, “Leveraging identity-based cryptography for node id assignment in
structured p2p systems,” in AINA Workshops (1),
2007, pp. 519–524.
L. M. Aiello, M. Milanesio, G. Ruffo, and R. Schifanella, “Tempering kademlia with a robust identity based system,” in Peer-toPeer Computing, 2008, pp. 30–39.
Shamir, “How to share a secret,” Commun. ACM, vol. 22, no. 11, pp. 612–613, 1979.

Suneeta peddireddy, is with Asst.Professor RajivGandhi Institute of Technology Bengaluru-560032.

Lokesh A is with Asst.Professor, M S Engineering College, Bengaluru-560064.

Prapulla C is with M.Tech III SEM CS&E, M S Engineering College, Bengaluru-560064.

www.ijesi.org

18 | Page

Contenu connexe

Tendances

5.[29 38]a practical approach for implementation of public key infrastructure...
5.[29 38]a practical approach for implementation of public key infrastructure...5.[29 38]a practical approach for implementation of public key infrastructure...
5.[29 38]a practical approach for implementation of public key infrastructure...
Alexander Decker
 
Efficient and Enhanced Proxy Re Encryption Algorithm for Skyline Queries
Efficient and Enhanced Proxy Re Encryption Algorithm for Skyline QueriesEfficient and Enhanced Proxy Re Encryption Algorithm for Skyline Queries
Efficient and Enhanced Proxy Re Encryption Algorithm for Skyline Queries
ijtsrd
 
Antony's Final Draft v7
Antony's Final Draft v7Antony's Final Draft v7
Antony's Final Draft v7
Antony Law
 
IS Unit 7_Network Security
IS Unit 7_Network SecurityIS Unit 7_Network Security
IS Unit 7_Network Security
Sarthak Patel
 
Searchable symmetric encryption security definitions
Searchable symmetric encryption security definitionsSearchable symmetric encryption security definitions
Searchable symmetric encryption security definitions
Conference Papers
 

Tendances (17)

Ijcnc050205
Ijcnc050205Ijcnc050205
Ijcnc050205
 
IRJET- Cryptography Encryption and Decryption File Protection based on Mo...
IRJET-  	  Cryptography Encryption and Decryption File Protection based on Mo...IRJET-  	  Cryptography Encryption and Decryption File Protection based on Mo...
IRJET- Cryptography Encryption and Decryption File Protection based on Mo...
 
Identity based encryption with outsourced revocation in cloud computing
Identity based encryption with outsourced revocation in cloud computingIdentity based encryption with outsourced revocation in cloud computing
Identity based encryption with outsourced revocation in cloud computing
 
Certificate less key management scheme in
Certificate less key management scheme inCertificate less key management scheme in
Certificate less key management scheme in
 
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITYCOST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
 
5.[29 38]a practical approach for implementation of public key infrastructure...
5.[29 38]a practical approach for implementation of public key infrastructure...5.[29 38]a practical approach for implementation of public key infrastructure...
5.[29 38]a practical approach for implementation of public key infrastructure...
 
Efficient and Enhanced Proxy Re Encryption Algorithm for Skyline Queries
Efficient and Enhanced Proxy Re Encryption Algorithm for Skyline QueriesEfficient and Enhanced Proxy Re Encryption Algorithm for Skyline Queries
Efficient and Enhanced Proxy Re Encryption Algorithm for Skyline Queries
 
Antony's Final Draft v7
Antony's Final Draft v7Antony's Final Draft v7
Antony's Final Draft v7
 
International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)
 
IS Unit 7_Network Security
IS Unit 7_Network SecurityIS Unit 7_Network Security
IS Unit 7_Network Security
 
Searchable symmetric encryption security definitions
Searchable symmetric encryption security definitionsSearchable symmetric encryption security definitions
Searchable symmetric encryption security definitions
 
A New Pairing Free ID Based Certificate Less Digital Signature (CL-DS) Scheme...
A New Pairing Free ID Based Certificate Less Digital Signature (CL-DS) Scheme...A New Pairing Free ID Based Certificate Less Digital Signature (CL-DS) Scheme...
A New Pairing Free ID Based Certificate Less Digital Signature (CL-DS) Scheme...
 
Identity based encryption with cloud revocation authority and its applications
Identity based encryption with cloud revocation authority and its applicationsIdentity based encryption with cloud revocation authority and its applications
Identity based encryption with cloud revocation authority and its applications
 
766 a secure-data-sharing-in-cloud-storage-with-independent-key-generation-ce...
766 a secure-data-sharing-in-cloud-storage-with-independent-key-generation-ce...766 a secure-data-sharing-in-cloud-storage-with-independent-key-generation-ce...
766 a secure-data-sharing-in-cloud-storage-with-independent-key-generation-ce...
 
IDENTITY-BASED ENCRYPTION WITH OUTSOURCED REVOCATION IN CLOUD COMPUTING
 IDENTITY-BASED ENCRYPTION WITH OUTSOURCED REVOCATION IN CLOUD COMPUTING IDENTITY-BASED ENCRYPTION WITH OUTSOURCED REVOCATION IN CLOUD COMPUTING
IDENTITY-BASED ENCRYPTION WITH OUTSOURCED REVOCATION IN CLOUD COMPUTING
 
Email security
Email securityEmail security
Email security
 
[Cluj] Turn SSL ON
[Cluj] Turn SSL ON[Cluj] Turn SSL ON
[Cluj] Turn SSL ON
 

En vedette

Media Analysis of Films - Task 4
Media Analysis of Films - Task 4Media Analysis of Films - Task 4
Media Analysis of Films - Task 4
Parasko
 
Totally agreed with the statements by cikgu phaik see
Totally agreed with the statements by cikgu phaik seeTotally agreed with the statements by cikgu phaik see
Totally agreed with the statements by cikgu phaik see
cikgusyahril
 
CCM2426 Oct 13 Information skills for projects
CCM2426 Oct 13 Information skills for projectsCCM2426 Oct 13 Information skills for projects
CCM2426 Oct 13 Information skills for projects
EISLibrarian
 

En vedette (20)

Role of Tv Programs in Dissiminating Agricultural Information By Ecological R...
Role of Tv Programs in Dissiminating Agricultural Information By Ecological R...Role of Tv Programs in Dissiminating Agricultural Information By Ecological R...
Role of Tv Programs in Dissiminating Agricultural Information By Ecological R...
 
Ways of professionalizing language education in the technological scenario
Ways of professionalizing language education in the technological scenarioWays of professionalizing language education in the technological scenario
Ways of professionalizing language education in the technological scenario
 
Media Analysis of Films - Task 4
Media Analysis of Films - Task 4Media Analysis of Films - Task 4
Media Analysis of Films - Task 4
 
Documentos primaria-sesiones-unidad06-quinto grado-matematica-5g-u6-mat-sesion13
Documentos primaria-sesiones-unidad06-quinto grado-matematica-5g-u6-mat-sesion13Documentos primaria-sesiones-unidad06-quinto grado-matematica-5g-u6-mat-sesion13
Documentos primaria-sesiones-unidad06-quinto grado-matematica-5g-u6-mat-sesion13
 
Gripe Española
Gripe  EspañolaGripe  Española
Gripe Española
 
강남오피™청주오피※다솜넷※영통오피방㏇부천오피걸
강남오피™청주오피※다솜넷※영통오피방㏇부천오피걸강남오피™청주오피※다솜넷※영통오피방㏇부천오피걸
강남오피™청주오피※다솜넷※영통오피방㏇부천오피걸
 
Totally agreed with the statements by cikgu phaik see
Totally agreed with the statements by cikgu phaik seeTotally agreed with the statements by cikgu phaik see
Totally agreed with the statements by cikgu phaik see
 
CCM2426 Oct 13 Information skills for projects
CCM2426 Oct 13 Information skills for projectsCCM2426 Oct 13 Information skills for projects
CCM2426 Oct 13 Information skills for projects
 
동탄오피™부평오피※다솜넷※평촌오피방㏇논현오피걸
동탄오피™부평오피※다솜넷※평촌오피방㏇논현오피걸동탄오피™부평오피※다솜넷※평촌오피방㏇논현오피걸
동탄오피™부평오피※다솜넷※평촌오피방㏇논현오피걸
 
CURICULUM VITAE HARSONO
CURICULUM VITAE HARSONOCURICULUM VITAE HARSONO
CURICULUM VITAE HARSONO
 
diapositiva
diapositivadiapositiva
diapositiva
 
ICT ENABLED LESSON TEMPLATE1
ICT ENABLED LESSON TEMPLATE1ICT ENABLED LESSON TEMPLATE1
ICT ENABLED LESSON TEMPLATE1
 
일산오피™천안오피※다솜넷※수원오피방㏇인천오피걸
일산오피™천안오피※다솜넷※수원오피방㏇인천오피걸일산오피™천안오피※다솜넷※수원오피방㏇인천오피걸
일산오피™천안오피※다솜넷※수원오피방㏇인천오피걸
 
선릉오피™일산오피※다솜넷※천안오피방㏇수원오피걸
선릉오피™일산오피※다솜넷※천안오피방㏇수원오피걸선릉오피™일산오피※다솜넷※천안오피방㏇수원오피걸
선릉오피™일산오피※다솜넷※천안오피방㏇수원오피걸
 
역삼오피™분당오피※다솜넷※동탄오피방㏇부평오피걸
역삼오피™분당오피※다솜넷※동탄오피방㏇부평오피걸역삼오피™분당오피※다솜넷※동탄오피방㏇부평오피걸
역삼오피™분당오피※다솜넷※동탄오피방㏇부평오피걸
 
논현오피™강남오피※다솜넷※청주오피방㏇영통오피걸
논현오피™강남오피※다솜넷※청주오피방㏇영통오피걸논현오피™강남오피※다솜넷※청주오피방㏇영통오피걸
논현오피™강남오피※다솜넷※청주오피방㏇영통오피걸
 
분당오피™동탄오피※다솜넷※부평오피방㏇평촌오피걸
분당오피™동탄오피※다솜넷※부평오피방㏇평촌오피걸분당오피™동탄오피※다솜넷※부평오피방㏇평촌오피걸
분당오피™동탄오피※다솜넷※부평오피방㏇평촌오피걸
 
People / Ludzie
People / LudziePeople / Ludzie
People / Ludzie
 
International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)
 
Jubileusz 90-lecia Muzeum
Jubileusz 90-lecia MuzeumJubileusz 90-lecia Muzeum
Jubileusz 90-lecia Muzeum
 

Similaire à International Journal of Engineering and Science Invention (IJESI)

5.[29 38]a practical approach for implementation of public key infrastructure...
5.[29 38]a practical approach for implementation of public key infrastructure...5.[29 38]a practical approach for implementation of public key infrastructure...
5.[29 38]a practical approach for implementation of public key infrastructure...
Alexander Decker
 
sweeney_brendan-css527-20141118-research_proposal
sweeney_brendan-css527-20141118-research_proposalsweeney_brendan-css527-20141118-research_proposal
sweeney_brendan-css527-20141118-research_proposal
Brendan Sweeney
 

Similaire à International Journal of Engineering and Science Invention (IJESI) (20)

Advanced Data Protection and Key Organization Framework for Mobile Ad-Hoc Net...
Advanced Data Protection and Key Organization Framework for Mobile Ad-Hoc Net...Advanced Data Protection and Key Organization Framework for Mobile Ad-Hoc Net...
Advanced Data Protection and Key Organization Framework for Mobile Ad-Hoc Net...
 
A securing symmetric key distribution
A securing symmetric key distributionA securing symmetric key distribution
A securing symmetric key distribution
 
Protection Saving Positioned Multi-Keyword Scan for Different Information in ...
Protection Saving Positioned Multi-Keyword Scan for Different Information in ...Protection Saving Positioned Multi-Keyword Scan for Different Information in ...
Protection Saving Positioned Multi-Keyword Scan for Different Information in ...
 
Mutual query data sharing protocol for public key encryption through chosen-c...
Mutual query data sharing protocol for public key encryption through chosen-c...Mutual query data sharing protocol for public key encryption through chosen-c...
Mutual query data sharing protocol for public key encryption through chosen-c...
 
www.ijerd.com
www.ijerd.comwww.ijerd.com
www.ijerd.com
 
Secure 3 kany-vanda
Secure 3 kany-vandaSecure 3 kany-vanda
Secure 3 kany-vanda
 
SECURE SENSITIVE DATA SHARING ON BIG DATA PLATFORM
SECURE SENSITIVE DATA SHARING ON BIG DATA PLATFORMSECURE SENSITIVE DATA SHARING ON BIG DATA PLATFORM
SECURE SENSITIVE DATA SHARING ON BIG DATA PLATFORM
 
Identity based proxy-oriented data uploading and
Identity based proxy-oriented data uploading andIdentity based proxy-oriented data uploading and
Identity based proxy-oriented data uploading and
 
Enabling Secure Data Sharing Scheme in the Cloud Storage Groups
Enabling Secure Data Sharing Scheme in the Cloud Storage GroupsEnabling Secure Data Sharing Scheme in the Cloud Storage Groups
Enabling Secure Data Sharing Scheme in the Cloud Storage Groups
 
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...
 
5.[29 38]a practical approach for implementation of public key infrastructure...
5.[29 38]a practical approach for implementation of public key infrastructure...5.[29 38]a practical approach for implementation of public key infrastructure...
5.[29 38]a practical approach for implementation of public key infrastructure...
 
An efficient distributed group key management using hierarchical approach wit...
An efficient distributed group key management using hierarchical approach wit...An efficient distributed group key management using hierarchical approach wit...
An efficient distributed group key management using hierarchical approach wit...
 
MULTI-FACTOR AUTHENTICATION SECURITY FRAMEWORK USING BlOCKCHAIN IN CLOUD COMP...
MULTI-FACTOR AUTHENTICATION SECURITY FRAMEWORK USING BlOCKCHAIN IN CLOUD COMP...MULTI-FACTOR AUTHENTICATION SECURITY FRAMEWORK USING BlOCKCHAIN IN CLOUD COMP...
MULTI-FACTOR AUTHENTICATION SECURITY FRAMEWORK USING BlOCKCHAIN IN CLOUD COMP...
 
Cn36539543
Cn36539543Cn36539543
Cn36539543
 
Improving Efficiency of Security in Multi-Cloud
Improving Efficiency of Security in Multi-CloudImproving Efficiency of Security in Multi-Cloud
Improving Efficiency of Security in Multi-Cloud
 
IJSRED-V2I2P10
IJSRED-V2I2P10IJSRED-V2I2P10
IJSRED-V2I2P10
 
Identity based cryptography for client side security in web applications (web...
Identity based cryptography for client side security in web applications (web...Identity based cryptography for client side security in web applications (web...
Identity based cryptography for client side security in web applications (web...
 
Identity-Based Key Management in MANETs Using Public Key Cryptography
Identity-Based Key Management in MANETs Using Public Key CryptographyIdentity-Based Key Management in MANETs Using Public Key Cryptography
Identity-Based Key Management in MANETs Using Public Key Cryptography
 
sweeney_brendan-css527-20141118-research_proposal
sweeney_brendan-css527-20141118-research_proposalsweeney_brendan-css527-20141118-research_proposal
sweeney_brendan-css527-20141118-research_proposal
 
IRJET- Secure and Efficient File Sharing and Shared Ownership in Cloud Systems
IRJET- Secure and Efficient File Sharing and Shared Ownership in Cloud SystemsIRJET- Secure and Efficient File Sharing and Shared Ownership in Cloud Systems
IRJET- Secure and Efficient File Sharing and Shared Ownership in Cloud Systems
 

Dernier

Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 

Dernier (20)

Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Cyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfCyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdf
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 

International Journal of Engineering and Science Invention (IJESI)

  • 1. International Journal of Engineering Science Invention ISSN (Online): 2319 – 6734, ISSN (Print): 2319 – 6726 www.ijesi.org Volume 2 Issue 9 ǁ September. 2013 ǁ PP.10-18 Secured Key Partition for a Peer-To-Peer Network Using Identity based cryptography 1 Suneeta peddireddy, 2 Lokesh A, 3Prapulla C 1 Asst.Professor, Rajiv Gandhi Institute of Technology, Bengaluru-560032. 2 Asst.Professor, M S Engineering College, Bengaluru-560064 3 M.Tech III SEM CS&E, M S Engineering College, Bengaluru-560064. ABSTRACT: For identity verification and authentication purposes we introduced an Identity based cryptography (IBC) into peer-to-peer (P2P) . However problems on secure private key issuing could not be addressed by current IBC-based solution. In this paper we present a IBC infrastructure setup phase, a peer registration solution using Shamir’s (k, n) secret sharing scheme, and a secure key issuing scheme, which adopts key generate center (KGC) and key privacy authorities (KPAs) to issue private keys to peers securely in order to enable the IBC systems to be more acceptable and applicable in real-world P2P networks. We use Byzantine fault tolerance protocol to develop a scheme to authenticate KPAs and to maintain a security of KPAs. This has theoretical analysis and experimental results that shows performance is effective and is able to support large scale network. KEYWORDS: Peer-to-Peer, Secured key issuing, Secrete key sharing, fault tolerance I. BACKGROUND P2P networks are extremely vulnerable to large spectrum of attacks , with its self-organized and selfmaintenance nature. This is mainly due to the lack of certification service responsible for identity verification and for authentication purposes. We can solve some of the problems by verifying the authenticated nodes identities and by issusing public keys to the nodes for certification using traditional certificate-based public key infrastructure.PKI based on security protocol is difficult to deployed as many nodes that store certificates to each node may become invalid quickly as node churn is highly frequent in P2P network. Practically it is difficult to implement as each node requires more space to store public key certificates. If overlay nodes have a common shared key for secure communication then secured P2P overlay communication is efficient. In dynamic P2P overlay network achieving such an efficiency is difficult as a new key must be generated every time a node membership changes occurs in order to preserve secrecy. II. INTRODUCTION In Securing Key issuing trust level that is to be placed on third party is important .In regular transmission of data that the users supplies information must be blinded which is also called as blinding. The third party provides a partial private key which is called as blinded. That key is passed on many other third party. Once the users gets the key the users can unblind the keys and retrieve the information. Here the secured key is divided into several parts and any three of the key part can be used by the user to retrieve the information III. SYSTEM DESIGN We have four section namely system setup,peer registration, secure keying and system maintenance. In system setup phase we describe how KGC and KPA work in the beginning of the system. In Peer Registration phase and secure keying phase we describe how a peer joins the system . In system maintenance phase the maintenance of KPAs takes place The requirements of the system are :      Secure peer registration: It must be able to a methodology to mitigate attacks such as man-in-middle attack, collusion attacks during peer registration phase. Robust system maintenance : The system must provide a online method to add new subtitutional KPAs remove, identify malicious KPAs. www.ijesi.org 10 | Page
  • 2. Secured Key Partition For A Peer-To-Peer Network Using...   Secure key issuing : The key that is being issued must be secure that will secure the keys without secure channel and defend attacks of all types. The software requirements analysis (SRA) step of a software development process yields specifications that are used in software engineering. If the software is "semi automated" or user centered, software design may involve user experience design yielding a story board to help determine those specifications. If the software is completely automated (meaning no user or user interface), a software design may be as simple as a flow chart or text describing a planned sequence of events. There are also semi-standard methods like Unified Modeling Language and Fundamental modeling concepts. In either case some documentation of the plan is usually the product of the design. A software design may be platform-independent or platform-specific, depending on the availability of the technology called for by the design Design Considerations There are many aspects to consider in the design of a piece of software. The importance of each should reflect the goals the software is trying to achieve. Some of these aspects are:  Compatibility –The software is able to operate with other products that are designed for interoperability with another product. Since our software is developed on java it is compatible with other products.  Packaging - In java many packages are available. Thus we have used various packages which made coding simpler.  Reliability - The software is able to perform a required function under stated conditions for a specified period of time. Hence the software reliable.  Reusability -The modular components designed capture the essence of the functionality expected out of them and hence the modules are reusable.  Robustness - The software is able to tolerate unpredictable or invalid input.  Usability - The software has user friendly interface which makes its usability easy. IV. RESULT 4.1 Creating Peer Node 4.1: Creating Peer Node 4.2 Register The Peer Node www.ijesi.org 11 | Page
  • 3. Secured Key Partition For A Peer-To-Peer Network Using... 4.2.1: Register The Peer Node 4.2.2: Giving name to peer node 4.2.3: ID is received 4.3 Key Generation Centre 4.3.1: Key Generation Center waiting for request 4.4 Key Generation Process www.ijesi.org 12 | Page
  • 4. Secured Key Partition For A Peer-To-Peer Network Using... 4.4.1: Key Generation Process 4.5 Key Privacy Authority 4.5.1 : Key Privacy Authority www.ijesi.org 13 | Page
  • 5. Secured Key Partition For A Peer-To-Peer Network Using... 4.6 Key generation centre with key parts 4.6.1: Key generation centre with key parts 4.7 KPA with a key part 4.7: KPA with a key part 4.8 Get Key from KPAs 4.8.1: Get Key from KPAs 4.9 Retrieving the key www.ijesi.org 14 | Page
  • 6. Secured Key Partition For A Peer-To-Peer Network Using... 4.9.1: Retrieving the key 4.10 Entering ID of the peer node 4.10.1: Entering ID of the peer node 4.11 Using the key parts 4.11.1: Using the key parts 4.12 Sending Message to Receiver Peer 4.12.1: Sending Message to Receiver Peer 4.13Confirmation www.ijesi.org 15 | Page
  • 7. Secured Key Partition For A Peer-To-Peer Network Using... 4.13.1: Confirmation 4.14 Receiving a Message 4.14.1: Receiving a Message 4.15 Selection of KPAs 4.15.1: Selection of KPAs 4.16 Entering the peer’s ID 4.16.1: Entering the peer’s ID 4.17 Decryption 4.17.1: Decryption www.ijesi.org 16 | Page
  • 8. Secured Key Partition For A Peer-To-Peer Network Using... 4.18 Key display 4.18 Key display 4.19 Disconnected from KGC 6.19.1: Disconnected from KGC 4.20 KGC after disconnection 4.20.1: KGC after disconnection V. CONCLUSION & ENHANCEMENT We have developed a secure key issuing scheme for P2P networks using IBC, SKIP. SKIP provides a peer registration service using Shamir’s (k,n) secret sharing scheme. We develop a secure key issuing protocol, which adopts KGC and KPAs to issue private keys to peers securely. Our future work includes developing a scheme to authenticate KPAs, remove malicious ones and finding out alternate ones to join in the system using the BFT protocol. www.ijesi.org 17 | Page
  • 9. Secured Key Partition For A Peer-To-Peer Network Using... REFERENCES [1]. [2]. [3]. [4]. [5]. [6]. [7]. [8]. [9]. [10]. [11]. [12]. [13]. [14]. Cong Tang, Ruichuan Chen, Zhuhua Cai, Anming Xie, Jianbin Hu ∗ , Liyong Tang, Zhong Chen, “SKIP: A Secure Key Issuing Scheme for Peer-to-Peer Networks”, in Institute of Software, Peking University, China,2010, E. Sit and R. Morris, “Security considerations for peer-to-peer distributed hash tables,” in IPTPS, 2002, pp. 261–269. Shamir, “Identity-based cryptosystems and signature schemes,” in CRYPTO, 1984, pp. 47–53. D. Boneh and M. K. Franklin, “Identity-based encryption from the weil pairing,” in CRYPTO, 2001, pp. 213–229. Lee, C. Boyd, E. Dawson, K. Kim, J. Yang, and S. Yoo, “Secure key issuing in id-based cryptography,” in ACSW Frontiers, 2004, pp. 69–74. R. Gangishetti, M. C. Gorantla, M. L. Das, A. Saxena, and V. P. Gulati, “An efficient secure key issuing protocol in idbased cryptosystems,” in ITCC (1), 2005, pp. 674–678. Saxena, “Threshold ski protocol for id-based cryptosystems,” in IAS, 2007, pp. 65–70. Z.-L. Lu, G.-H.; Zhang, “Wheel of trust: A secure framework for overlay-based services,” ICC, pp. 1148–1153, 2007. Stoica, R. Morris, D. R. Karger, M. F. Kaashoek, and H. Balakrishnan, “Chord: A scalable peer-to-peer lookup service for internet applications,” in SIGCOMM, 2001, pp. 149–160. E. K. Lua, “Securing peer-to-peer overlay networks from Sybil attack,” in ISCIT’07, Sydney, Australia, 2007. S. Ryu, K. R. B. Butler, P. Traynor, and P. D. McDaniel, “Leveraging identity-based cryptography for node id assignment in structured p2p systems,” in AINA Workshops (1), 2007, pp. 519–524. L. M. Aiello, M. Milanesio, G. Ruffo, and R. Schifanella, “Tempering kademlia with a robust identity based system,” in Peer-toPeer Computing, 2008, pp. 30–39. Shamir, “How to share a secret,” Commun. ACM, vol. 22, no. 11, pp. 612–613, 1979. Suneeta peddireddy, is with Asst.Professor RajivGandhi Institute of Technology Bengaluru-560032. Lokesh A is with Asst.Professor, M S Engineering College, Bengaluru-560064. Prapulla C is with M.Tech III SEM CS&E, M S Engineering College, Bengaluru-560064. www.ijesi.org 18 | Page