Secure naming structure and p2p application interaction

Christian Dannewitz, Teemu Rautio, Ove Strandberg

Research output: Contribution to conferenceConference articleProfessional

Abstract

Many P2P applications use their own way to identify and address data relying on host centric addressing, limiting the access to the same data on potentially multiple locations for multiple P2P applications. There are potential benefits in providing a generic way to identify and address data so that multiple P2P systems can use the same data regardless of data location. The proposed secure naming structure provides a potential way to address these challenges with a common naming structure for all data and different needs. The additional feature of the proposal is securing the way data is addressed such that the receiver has the possibility to verify that the correct data is received. The secure naming structure should be beneficial as potential design principle in defining the two protocols identified as objectives in the PPSP charter. This document enumerates a number of design considerations to impact the design and implementation of the tracker-peer signaling and peer-peer streaming signaling protocols.
Original languageEnglish
Number of pages12
Publication statusPublished - 2010
MoE publication typeNot Eligible
Event78th Internet Engineering Task Force (IETF) Meeting - Maastricht, Netherlands
Duration: 25 Jul 201030 Jul 2010

Conference

Conference78th Internet Engineering Task Force (IETF) Meeting
CountryNetherlands
CityMaastricht
Period25/07/1030/07/10

Cite this

Dannewitz, C., Rautio, T., & Strandberg, O. (2010). Secure naming structure and p2p application interaction. Paper presented at 78th Internet Engineering Task Force (IETF) Meeting, Maastricht, Netherlands.
Dannewitz, Christian ; Rautio, Teemu ; Strandberg, Ove. / Secure naming structure and p2p application interaction. Paper presented at 78th Internet Engineering Task Force (IETF) Meeting, Maastricht, Netherlands.12 p.
@conference{b23d7e9c58e9485eb791e1c95bdb4e13,
title = "Secure naming structure and p2p application interaction",
abstract = "Many P2P applications use their own way to identify and address data relying on host centric addressing, limiting the access to the same data on potentially multiple locations for multiple P2P applications. There are potential benefits in providing a generic way to identify and address data so that multiple P2P systems can use the same data regardless of data location. The proposed secure naming structure provides a potential way to address these challenges with a common naming structure for all data and different needs. The additional feature of the proposal is securing the way data is addressed such that the receiver has the possibility to verify that the correct data is received. The secure naming structure should be beneficial as potential design principle in defining the two protocols identified as objectives in the PPSP charter. This document enumerates a number of design considerations to impact the design and implementation of the tracker-peer signaling and peer-peer streaming signaling protocols.",
author = "Christian Dannewitz and Teemu Rautio and Ove Strandberg",
year = "2010",
language = "English",
note = "78th Internet Engineering Task Force (IETF) Meeting ; Conference date: 25-07-2010 Through 30-07-2010",

}

Dannewitz, C, Rautio, T & Strandberg, O 2010, 'Secure naming structure and p2p application interaction' Paper presented at 78th Internet Engineering Task Force (IETF) Meeting, Maastricht, Netherlands, 25/07/10 - 30/07/10, .

Secure naming structure and p2p application interaction. / Dannewitz, Christian; Rautio, Teemu; Strandberg, Ove.

2010. Paper presented at 78th Internet Engineering Task Force (IETF) Meeting, Maastricht, Netherlands.

Research output: Contribution to conferenceConference articleProfessional

TY - CONF

T1 - Secure naming structure and p2p application interaction

AU - Dannewitz, Christian

AU - Rautio, Teemu

AU - Strandberg, Ove

PY - 2010

Y1 - 2010

N2 - Many P2P applications use their own way to identify and address data relying on host centric addressing, limiting the access to the same data on potentially multiple locations for multiple P2P applications. There are potential benefits in providing a generic way to identify and address data so that multiple P2P systems can use the same data regardless of data location. The proposed secure naming structure provides a potential way to address these challenges with a common naming structure for all data and different needs. The additional feature of the proposal is securing the way data is addressed such that the receiver has the possibility to verify that the correct data is received. The secure naming structure should be beneficial as potential design principle in defining the two protocols identified as objectives in the PPSP charter. This document enumerates a number of design considerations to impact the design and implementation of the tracker-peer signaling and peer-peer streaming signaling protocols.

AB - Many P2P applications use their own way to identify and address data relying on host centric addressing, limiting the access to the same data on potentially multiple locations for multiple P2P applications. There are potential benefits in providing a generic way to identify and address data so that multiple P2P systems can use the same data regardless of data location. The proposed secure naming structure provides a potential way to address these challenges with a common naming structure for all data and different needs. The additional feature of the proposal is securing the way data is addressed such that the receiver has the possibility to verify that the correct data is received. The secure naming structure should be beneficial as potential design principle in defining the two protocols identified as objectives in the PPSP charter. This document enumerates a number of design considerations to impact the design and implementation of the tracker-peer signaling and peer-peer streaming signaling protocols.

M3 - Conference article

ER -

Dannewitz C, Rautio T, Strandberg O. Secure naming structure and p2p application interaction. 2010. Paper presented at 78th Internet Engineering Task Force (IETF) Meeting, Maastricht, Netherlands.