The present invention relates to a billing method and arrangement in a peer-to-peer network.
A peer-to-peer network based on distributed hash tables (DHTs) is given. An overview relating to such networks is given in [1] for instance. The representation of an exemplary peer-to-peer network can be inferred from
The devices (referred to subsequently as peers or stations) in this network should authenticate and authorize themselves and/or the messages generated by them by means of digital signatures and certificates. These certificates are issued in advance by a trustworthy, central point (Certificate Authority CA) and are introduced into the P2P network as resources [1].
If specific data DAT (own user profile, messages to absent peers, etc.) are introduced into the P2P network as resources, they must be digitally signed by generating PeerA. To this end, PeerA calculates a cryptographic hash value (e.g. with a hash method SHA-1) of the data DAT, and signs this hash value subsequently with its private key PA [1]. This complete data set must also be transmitted to a collection point for billing purposes. Even if a peer wants to receive a specific resource (third party user profile, a message stored for him/her, etc.), from another peer, he must produce a signed request. This enables non-rejectable consumer-related billing to be carried out, provided these signed resources are sent completely to a central collection point, which carries out the evaluations.
This can however result in considerable problems, if these data sets are quite large (several MB). Even if billing information does not need to be collected in real time, the collection points must however receive and evaluate all resources of a large number of peers at least once, for the most part even multiple times.
If the complete resources are not transmitted, but only their hash value with the signature, the following manipulations would be possible:
Case 1: PeerB could collect signatures from PeerA, which has produced these with the same private key PA for other applications or at earlier times, and then store them as resources in the P2P network with PeerA liable to pay costs.
Case 2: On the other hand, PeerA could claim that he would not have ordered the services billed to him and would have produced the signatures for other applications. PeerA could thus reject the billing as faulty.
As it is no longer possible to reconstruct the original message from the hash value, a distinction between case 1 and case 2 is not possible, when the original data set is no longer available. The non-repudiation of the services provided would thus no longer be ensured.
An object underlying the invention is to specify a method and an arrangement which enable non-repudiable billing in a peer-to-peer network.
This object is achieved on the basis of the method and arrangement according to the claims.
The method according to the invention is characterized in that the size of the data to be transmitted to the collection point is considerably reduced, and non-rejectable billing is nevertheless ensured.
To this end, in accordance with the invention, the information INFO required for the billing is firstly extracted from the data set DAT, which is to be stored as a resource or is requested with the data of another peer, for instance the name of the signing peer, type of service, point in time of its performance, size of the stored voice message, realization urgency etc. Furthermore, the hash value of the data set is calculated. This hash value is then hashed once more together with the billing information and only then is this signed. The data set is then stored together with the billing information and the signature, e.g. as a resource in the P2P network. The collection point then no longer requires the data DAT itself, which could be far more detailed than the rest. It only requires the hash value of the data DAT, the billing information INFO as well as the signature over both. A maximum of approximately 500 bytes must thus be transmitted to the collection point. A rejection due to lack of evidence is nevertheless not possible.
If PeerB now sends old billing information from PeerA to the collection point, this can be recognized on the basis of the point in time noted therein. If PeerB has signatures generated by PeerA, PeerB is unable to generate any suitable billing information for these signatures. In the case of all valid signed billing information, it is ensured that only PeerA could itself have generated it. PeerA can then no longer reject the billing as faulty. The computing outlay of the peers increases from 1 hash and 1 signature to 2 hashes and 1 signature. This is however negligible, since a signature calculation is significantly more expensive than a hash value calculation and each peer only carries out very few calculations in comparison with the collection point anyway. The computational outlay of the collection point nevertheless remains unchanged with 1 hash and 1 signature.
Further advantages and details of the invention are explained with reference to an exemplary embodiment based on the FIGS. 1 to 3, in which:
The conventional methods are disadvantageous in that data required for billing features a high byte number, as is shown in
In contrast, data INFO required for the billing is extracted from the station-related data DAT of a station PeerA in accordance with the invention. Finally, a first hash value is formed from the station-related data and a second hash value is generated from this first hash value and the necessary data INFO, said second hash value being available in a signed form for billing with the key PA of the peer PeerA.
The method according to the invention produces an essential advantage in that signed data sets, which must be transmitted to central collection points for billing purposes, are considerably reduced in size. In addition, no additional computational outlay is required for a collection point SV involved in the billing. Finally, only an additional hash value evaluation is needed in each instance for the peers Peer1, Peer2, PeerA . . . PeerB.
The invention should thus not be restricted to the explained exemplary embodiments, but should instead comprise all variations which can be generated within the scope of the ability of the person skilled in the art, said variations comprising the elements essential to the invention—extracting the data needed for carrying out the billing from the station-related data, hashing the station-related data, as well as hash value formation from the necessary data and the hashed station-related data.
[1] Thomas Friese: “Selbstorganisierende Peer-to-Peer Netzwerk” [Self-organizing peer-to-peer networks], Diploma thesis at the Philipps Universität Marburg, March 2002
[2] Petar Maymounkov, David Mazieres: “Kademlia: A Peer to Peer Information System based on the XOR Metric”, New York University
[3] Stoica, Morris, Karger, Kaashoek, Balakrishnan: “Chord: A Scalable Peer-to-Peer Lookup Service for Internet Applications”, MIT Laboratory for Computer Science, 2001.
Number | Date | Country | Kind |
---|---|---|---|
10 2004 040 768.1 | Aug 2004 | DE | national |
This application is the US National Stage of International Application No. PCT/EP2005/053986, filed Aug. 12, 2005 and claims the benefit thereof. The International Application claims the benefits of German application No. 102004040768.1 DE filed Aug. 23, 2004, both of the applications are incorporated by reference herein in their entirety.
Filing Document | Filing Date | Country | Kind | 371c Date |
---|---|---|---|---|
PCT/EP05/53986 | 8/12/2005 | WO | 9/10/2007 |