Skip Navigation

Graduate Research Forum Details

Policy Control for Peer-to-Peer Data Distribution

Author:Eric Anderson
Date:January 13, 2004
Time:16:00
Location:220 Deschutes

Abstract

This talk will describe the "Q" framework for distributing and applying access control and integrity policies in peer-to-peer networks.

Many network applications (such as file sharing, swarming downloads, and peer-to-peer video streaming) use large groups of peers to distribute and process data. This often requires not just data originators, but also those ``distributors,'' to enforce access control, verify integrity, or make other content-specific security decisions for the replicated or adapted data in transit.

Every data object may have different security requirements. Nodes serving or adapting a data object may have no knowledge of those requirements, unless they are explicitly represented and distributed with the data. Recipients may not trust the nodes from which they request objects, and may not know how to verify data authenticity when both benign and malicious adaptation are possible.