The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
File replication in distributed environment has been discussed by many researchers, but the issues like confidentiality and integrity of files during replication are rarely focused, when deployed in the cloud environment. Distributed computing started with the cluster followed by the grid and is now era of cloud computing, where most of the services are accessed, by few clicks. In cloud, services...
In conventional security mechanism, security services based on symmetric key cryptography assume keys to be distributed prior to secure communications. The core function of exchanging and sharing a secret key between two endpoints are the secure key management methodology which is one of the most critical elements need to be more concerned when integrating cryptographic functions into the system....
Today almost all organizations have improved their performance through allowing more information exchange within their organization as well as between their distributers, suppliers, and customers using web support. Databases are central to the modern websites as they provide necessary data as well as stores critical information such as user credentials, financial and payment information, company statistics...
The emergence of mobile P2P systems is largely due to the evolution of mobile devices into powerful information processing units. The relatively structured context that results from the mapping of mobile patterns of behaviour onto P2P models is however constrained by the vulnerabilities of P2P networks and the inherent limitations of mobile devices. Whilst the implementation of P2P models gives rise...
For future wireless networks, a major challenge is how to efficiently support applications and services to end-users. Currently, most existing solutions attempt to address this issue on the application layer. In this paper, we take a different approach and we present a unified routing algorithm to efficiently enable applications in a Heterogeneous Wireless Mesh Network (HWMN). The algorithm builds...
Online Social Networks (OSNs) are becoming immensely popular nowadays, and they change the ways people think and live. In this paper, we propose a novel reputation system which allows users to find potential connections between unfamiliar people based on the most updated friend list of each user in OSNs. To some extent, our scheme provides a way to judge people in OSNs without real interactions, but...
We present a Peer-To-Peer (P2P) Digital Resource Management (DRM) system for video content in this paper. The encryption arithmetic of our system is flexible and is careless in this paper. Encryption algorithm of high intensity as bilinear mapping is acceptable and Encryption algorithm of low intensity is OK. Meanwhile the security of our system is based on the structure of the system and illegal...
In trading card games (TCGs), players create a deck of cards from a subset of all cards in the game to compete with other players. Each card in the deck has some feature or ability that may be used strategically to help a player defeat her opponent. Recently, trading card games have been moving from physical cards to digital, online versions. We propose a cheat-proof peer-to-peer protocol for implementing...
A peer-to-peer (P2P) architecture for video conferencing has great prospects for development. The security of the system, however, poses a set of significant challenges. In order to ensure the transmission security of the information of the video conferencing system P2P-based, in this paper, we report a set of new security architecture, and establish the corresponding security management strategy...
A secure cross-platform instant messaging software based on de-centralized structure model is designed and implemented. This software establishes a p2p overlay network without any central node, each node in this overlay network is called a peer, identified with an UUID, every connection between two peers in the overlay network is completely peer to peer. Two peers who trust each other utilize asymmetrical...
This work concentrates on the design of an efficient and scalable group rekey method for P2P IPTV DRM system where the minimal division of right is a program. Our group rekey scheme is efficient in two aspects, less number of encryption and less individual transmission. We divide the members into three categories, namely, the fresh members, the rejoined members, and the remaining members, according...
To enable secure content trade between peers with good scalability and efficiency in Peer-to-Peer (P2P) file-sharing systems, we propose a decentralized authorization scheme for Digital Rights Management (DRM). Based on proxy re-encryption mechanism, our scheme deploys authorization functions on semi-trusted authorization proxy peers who re-encrypt the ciphertext of content keys and issue licenses...
This paper presents a simple but resilient method to suppress copyright violations among the content uploaded onto peer-to-peer (P2P) video sharing services, and is especially designed for consumer generated media (CGM). Encryption is a good way to block the circulation of illegal content. However, if the encryption key is caught by a malicious node in the P2P network, the ''denial of deletion'' ability...
Truly ad hoc networks where no prior knowledge of participants to each other creates difficulties in providing encryption key management services to the network members. If the network uses Public Key Infrastructure (PKI) then a Certificate Authority (CA) must be available at all times. Using threshold cryptography for the CA requires several members to act as servers and collaborate to provide these...
Compared with traditional static Client/Server architecture, the P2P architecture is more suitable for anonymous communication systems because it is more flexible and can keep load balance better. However, in order to make the system usable and reliable, some system designs make tradeoffs between anonymity and performance such as reliability, latency and throughput. Tradeoffs are sometimes unavoidable...
Developing P2P programs should be simplified further and the security and controllability of P2P applications should be strengthen. We design a P2P-oriented secure service platform which consists of three modules: Control Center Overlay Network (CCON), Tracker Overlay Network (TON) and Sharing Server Clusters (SSC). CCON and TON are organized by Distribute Hash Table (DHT) and SSC is hided behind...
Ad hoc networking is considered as an inexpensive solution for easy and fast wireless network coverage. However, for real service deployment, security and availability in such networks are still under research even though some experimentation has shown its viability. Additionally, peer-to-peer (P2P) networking has emerged as a key technology to enable resource sharing among users. As a result, the...
The purpose of this article is to discuss an authentication method for peer to peer (P2P)-based streaming media. Methods of encryption of streaming media data and digital signatures were used to improve the safety of the media. The digital certificate publishing service and management services of live streaming media authentication information are expanded in the live stream system based on P2P networks...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.