ABSTRACT

Given the scalable and flexible distribution solutions enabled by peer-to-peer (P2P) and overlay technologies, we are faced with the question of security risks. The authenticity of data and content needs to be ensured, also taking required levels of anonymity, availability, and access control into account. This chapter examines the security challenges of P2P and overlay technologies and then outlines a number of solutions to mitigate the examined risks. Issues pertaining to identity, trust, reputation, and incentives need to be analyzed as well.