P2P authentication based on durable P2P storage technique

被引:0
|
作者
Wen, Tao [1 ]
Zhang, Yong [1 ]
Guo, Quan [1 ]
Li, Ying-Qiu [1 ]
机构
[1] Software Center, Northeastern University, Shenyang 110004, China
关键词
Peer to peer networks;
D O I
暂无
中图分类号
学科分类号
摘要
Analyzing the security, easy-to-use operation and cost of authentication, introducing the password-based authentication into a P2P system is regarded as necessary. With the durable P2P storage techniques and the ideas about reliable computation and virtual system taken into account to provide a decentralized database for storing users' information and reliable entity for authentication, the two key problems using durable techniques of password-based identity authentication can be solved, i.e., a user's individual information is unable to store and lack of objectively reliable entity for implementing the password-based authentication. The theoretical analysis and prototype both verify the feasibility of the way proposed for authentication, which is a try beneficial to the improvement of authentication.
引用
下载
收藏
页码:1381 / 1384
相关论文
共 50 条
  • [21] P2P and P2P botnet traffic classification in two stages
    Wujian Ye
    Kyungsan Cho
    Soft Computing, 2017, 21 : 1315 - 1326
  • [22] A Content Authentication Scheme in Hybrid P2P Network
    Shi, Liang
    Li, Zhongwen
    MINES 2009: FIRST INTERNATIONAL CONFERENCE ON MULTIMEDIA INFORMATION NETWORKING AND SECURITY, VOL 2, PROCEEDINGS, 2009, : 486 - +
  • [23] A P2P Network Authentication Method Base on CPK
    Jiang, Zhuoming
    Xu, Rongsheng
    PROCEEDINGS OF THE SECOND INTERNATIONAL SYMPOSIUM ON ELECTRONIC COMMERCE AND SECURITY, VOL I, 2009, : 3 - +
  • [24] Hierarchical Erasure Coding for P2P storage
    Charles, Denis
    Puri, Sidd
    2009 IEEE PACIFIC RIM CONFERENCE ON COMMUNICATIONS, COMPUTERS AND SIGNAL PROCESSING, VOLS 1 AND 2, 2009, : 926 - 931
  • [25] Lightweight Authentication for Distributed Mobile P2P Communications
    Lim, Jiyoung
    Doh, Inshil
    Chae, Kijoon
    INNOVATIVE MOBILE AND INTERNET SERVICES IN UBIQUITOUS COMPUTING, IMIS-2017, 2018, 612 : 580 - 589
  • [26] Secure P2P Data Storage andMaintenance
    Oualha, Nouha
    Oenen, Melek
    Roudier, Yves
    INTERNATIONAL JOURNAL OF DIGITAL MULTIMEDIA BROADCASTING, 2010, 2010
  • [27] Data Transfer Scheduling for P2P Storage
    Toka, Laszlo
    Dell'Amico, Matteo
    Michiardi, Pietro
    2011 IEEE INTERNATIONAL CONFERENCE ON PEER-TO-PEER COMPUTING (P2P), 2011, : 132 - 141
  • [28] Improving availability of P2P storage systems
    Shi, SM
    Yang, GW
    Yu, J
    Wu, YW
    Wang, DX
    ADVANCED PARALLEL PROCESSING TECHNOLOGIES, PROCEEDINGS, 2003, 2834 : 446 - 456
  • [29] From P2P to Cloud based P2P for Live Media streaming-A Survey
    Evangeline, Preetha D.
    AnandhaKumar, P.
    2015 SEVENTH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING (ICOAC), 2015,
  • [30] Hierarchically differential P2P storage architecture
    Department of Computer Science and Technology, Peking University, Beijing 100871, China
    Ruan Jian Xue Bao, 2007, 10 (2481-2494): : 2481 - 2494