P2P authentication based on durable P2P storage technique

被引:0
|
作者
Wen, Tao [1 ]
Zhang, Yong [1 ]
Guo, Quan [1 ]
Li, Ying-Qiu [1 ]
机构
[1] Software Center, Northeastern University, Shenyang 110004, China
关键词
Peer to peer networks;
D O I
暂无
中图分类号
学科分类号
摘要
Analyzing the security, easy-to-use operation and cost of authentication, introducing the password-based authentication into a P2P system is regarded as necessary. With the durable P2P storage techniques and the ideas about reliable computation and virtual system taken into account to provide a decentralized database for storing users' information and reliable entity for authentication, the two key problems using durable techniques of password-based identity authentication can be solved, i.e., a user's individual information is unable to store and lack of objectively reliable entity for implementing the password-based authentication. The theoretical analysis and prototype both verify the feasibility of the way proposed for authentication, which is a try beneficial to the improvement of authentication.
引用
下载
收藏
页码:1381 / 1384
相关论文
共 50 条
  • [1] Authentication with P2P agents
    Ghanea-Hercock, R
    BT TECHNOLOGY JOURNAL, 2003, 21 (04) : 146 - 152
  • [2] 2 P2P or not 2 P2P?
    Roussopoulos, M
    Baker, M
    Rosenthal, DSH
    Giuli, TJ
    Maniatis, P
    Mogul, J
    PEER-TO-PEER SYSTEMS III, 2004, 3279 : 33 - 43
  • [3] P2P file sharing for P2P computing
    Briquet, Cyril
    Dalem, Xavier
    Jodogne, Sebastien
    de Marneffe, Pierre-Arnoul
    MULTIAGENT AND GRID SYSTEMS, 2009, 5 (02) : 137 - 164
  • [4] P2P is dead - Long live P2P
    McGarvey, R
    ECONTENT, 2002, 25 (03) : 19 - +
  • [5] A new P2P identity authentication method based on zero-knowledge under hybrid P2P network
    Pang, X. (xiyupang@126.com), 1600, Universitas Ahmad Dahlan, Jalan Kapas 9, Semaki, Umbul Harjo,, Yogiakarta, 55165, Indonesia (11):
  • [6] Research of P2P Offline Download based on Hybrid P2P Network
    Lin, Zhengzhong
    Yan, Jianfeng
    Urano, Yoshinori
    12TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY: ICT FOR GREEN GROWTH AND SUSTAINABLE DEVELOPMENT, VOLS 1 AND 2, 2010, : 89 - 92
  • [7] Survey of anonymity and authentication in P2P networks
    Wang X.
    Yang L.
    Sun X.
    Han J.
    Liang W.
    Huang L.
    Information Technology Journal, 2010, 9 (06) : 1165 - 1171
  • [8] Authentication with controlled anonymity in P2P systems
    Wierzbicki, A
    Zwierko, A
    Kotulski, Z
    PDCAT 2005: Sixth International Conference on Parallel and Distributed Computing, Applications and Technologies, Proceedings, 2005, : 871 - 875
  • [9] Authentication and access control in P2P network
    Zhang, YQ
    Zhang, DH
    GRID AND COOPERATIVE COMPUTING, PT 1, 2004, 3032 : 468 - 470
  • [10] Redundancy management for P2P storage
    Williams, Chris
    Huibonhoa, Philippe
    Holliday, JoAnne
    Hospodor, Andy
    Schwarz, Thomas
    CCGRID 2007: SEVENTH IEEE INTERNATIONAL SYMPOSIUM ON CLUSTER COMPUTING AND THE GRID, 2007, : 15 - +