A verifiable hierarchical circular shift cipher scheme for P2P chunk exchanges

被引:1
|
作者
Wang, Jian [1 ]
Hu, Xiaoming [1 ]
Xu, Xiaolin [1 ]
Yang, Yinchun [1 ]
机构
[1] Shanghai Second Polytech Univ, Dept Network Engn, Shanghai 201209, Peoples R China
关键词
P2P networks; BitTorrent; Hierarchial circular shift cipher; Verification; Free-riding; BITTORRENT;
D O I
10.1007/s12083-013-0225-3
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
BitTorrent swarms rely on reciprocative chunk exchanges among autonomously participating peers. It has been shown that BitTorrent native tit-for-tat mechanism cannot effectively discourage the peer strategic misbehavior such as free-riding and fake chunk attack. This paper proposes a hierarchical chunk cipher scheme based only on bits circular shifting manipulation. As such, encrypted chunks preserve a fraction of information entropy of original chunks that can be observed by the receiving peers directly, which is used for assuring authenticity of the encrypted chunks. Our hierarchical bits shifting scheme allows more flexibility on the fraction of information entropy exposed directly by the encrypted chunks, when compared to the single layer bits shifting scheme. Further, exact mathematical results between the hierarchical scheme and the single layer scheme are derived and analyzed in detail.
引用
收藏
页码:103 / 110
页数:8
相关论文
共 50 条
  • [31] Hierarchical solution to scalability issues in P2P MMOG
    El Rhalibi, A
    Merabti, M
    GAME-ON 2005: 6TH INTERNATIONAL CONFERENCE ON INTELLIGENT GAMES AND SIMULATION, 2005, : 94 - 98
  • [32] 2 P2P or not 2 P2P?
    Roussopoulos, M
    Baker, M
    Rosenthal, DSH
    Giuli, TJ
    Maniatis, P
    Mogul, J
    PEER-TO-PEER SYSTEMS III, 2004, 3279 : 33 - 43
  • [33] Hierarchical Small-world P2P Networks
    Yin Guisheng
    Shen Jie
    Wang Xianghui
    ICICSE: 2008 INTERNATIONAL CONFERENCE ON INTERNET COMPUTING IN SCIENCE AND ENGINEERING, PROCEEDINGS, 2008, : 452 - 458
  • [34] Oasis: A hierarchical EMST based P2P network
    Ghanshani, P
    Bansal, T
    DISTRIBUTED COMPUTING - IWDC 2005, PROCEEDINGS, 2005, 3741 : 201 - 212
  • [35] Research of Hierarchical P2P Network based on Chord
    Ma, Haibo
    Wang, Deguang
    Zhang, Jiamin
    Shi, Li
    PROCEEDINGS OF THE 14TH YOUTH CONFERENCE ON COMMUNICATION, 2009, : 867 - 871
  • [36] A Scheme of Trust Management System for P2P Network
    BinbinLiang
    LizeGu
    Sun, Bin
    Yang, Yixian
    12TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY: ICT FOR GREEN GROWTH AND SUSTAINABLE DEVELOPMENT, VOLS 1 AND 2, 2010, : 1453 - 1458
  • [37] A Content Authentication Scheme in Hybrid P2P Network
    Shi, Liang
    Li, Zhongwen
    MINES 2009: FIRST INTERNATIONAL CONFERENCE ON MULTIMEDIA INFORMATION NETWORKING AND SECURITY, VOL 2, PROCEEDINGS, 2009, : 486 - +
  • [38] An Efficient Searching Scheme in Unstructured P2P Networks
    Zhang Ming
    Yang Jinqiu
    ADVANCED MEASUREMENT AND TEST, PARTS 1 AND 2, 2010, 439-440 : 865 - 869
  • [39] A Secure DHT Routing Scheme in P2P Networks
    Tan, Yunsong
    Zheng, Zujun
    2009 INTERNATIONAL CONFERENCE ON E-BUSINESS AND INFORMATION SYSTEM SECURITY, VOLS 1 AND 2, 2009, : 441 - +
  • [40] An Anonymity Scheme Based on Pseudonym in P2P Networks
    Peng Hao
    Lu Songnian
    Li Jianhua
    Zhang Aixin
    Zhao Dandan
    CHINA COMMUNICATIONS, 2010, 7 (06) : 157 - 160