Skip to main content

Tipp

Weitere Artikel dieser Ausgabe durch Wischen aufrufen

Erschienen in: Peer-to-Peer Networking and Applications 1/2015

01.01.2015

A verifiable hierarchical circular shift cipher scheme for P2P chunk exchanges

verfasst von: Jian Wang, Xiaoming Hu, Xiaolin Xu, Yinchun Yang

Erschienen in: Peer-to-Peer Networking and Applications | Ausgabe 1/2015

Einloggen, um Zugang zu erhalten
share
TEILEN

Abstract

BitTorrent swarms rely on reciprocative chunk exchanges among autonomously participating peers. It has been shown that BitTorrent native tit-for-tat mechanism cannot effectively discourage the peer strategic misbehavior such as free-riding and fake chunk attack. This paper proposes a hierarchical chunk cipher scheme based only on bits circular shifting manipulation. As such, encrypted chunks preserve a fraction of information entropy of original chunks that can be observed by the receiving peers directly, which is used for assuring authenticity of the encrypted chunks. Our hierarchical bits shifting scheme allows more flexibility on the fraction of information entropy exposed directly by the encrypted chunks, when compared to the single layer bits shifting scheme. Further, exact mathematical results between the hierarchical scheme and the single layer scheme are derived and analyzed in detail.

Sie möchten Zugang zu diesem Inhalt erhalten? Dann informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 69.000 Bücher
  • über 500 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt 90 Tage mit der neuen Mini-Lizenz testen!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 50.000 Bücher
  • über 380 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe



 


Jetzt 90 Tage mit der neuen Mini-Lizenz testen!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 58.000 Bücher
  • über 300 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko





Jetzt 90 Tage mit der neuen Mini-Lizenz testen!

Literatur
1.
Zurück zum Zitat Otto JS, Sanchez MA, Choffnes DR, Bustamante FE, Siganos G (2011) On blind mice and the elephant. Proceedings of SIGCOMM’11, pp 110–121 Otto JS, Sanchez MA, Choffnes DR, Bustamante FE, Siganos G (2011) On blind mice and the elephant. Proceedings of SIGCOMM’11, pp 110–121
2.
Zurück zum Zitat Halkes GP, Pouwelse JA (2010) Verifiable encryption for p2p block exchange. Proceedings of IEEE P2P’10, pp 1–4 Halkes GP, Pouwelse JA (2010) Verifiable encryption for p2p block exchange. Proceedings of IEEE P2P’10, pp 1–4
3.
Zurück zum Zitat Levin D, LaCurts K, Spring N, Bhattacharjee B (2008) Bittorrent is an auction: analyzing and improving bittorrent’s incentives. SIGCOMM Comput Commun Rev 38(4):243–254 CrossRef Levin D, LaCurts K, Spring N, Bhattacharjee B (2008) Bittorrent is an auction: analyzing and improving bittorrent’s incentives. SIGCOMM Comput Commun Rev 38(4):243–254 CrossRef
4.
Zurück zum Zitat Shin K, Reeves DS, Rhee I (2009) Treat-before-trick: free-riding prevention for bittorrent-like peer-to-peer networks. Proceedings of 23rd IEEE international parallel and distributed processing symposium, pp 1–12 Shin K, Reeves DS, Rhee I (2009) Treat-before-trick: free-riding prevention for bittorrent-like peer-to-peer networks. Proceedings of 23rd IEEE international parallel and distributed processing symposium, pp 1–12
5.
Zurück zum Zitat Wang J, Shen R, Ullrich C, Luo H, Niu C (2010) Resisting free-riding behavior in bittorrent. Futur Gener Comput Syst 26(8):1285–1299 CrossRef Wang J, Shen R, Ullrich C, Luo H, Niu C (2010) Resisting free-riding behavior in bittorrent. Futur Gener Comput Syst 26(8):1285–1299 CrossRef
6.
Zurück zum Zitat Craig G (2009) Fully homomorphic encryption using ideal lattices. Proceedings of the 41st annual ACM symposium on theory of computing, pp 169–178 Craig G (2009) Fully homomorphic encryption using ideal lattices. Proceedings of the 41st annual ACM symposium on theory of computing, pp 169–178
7.
Zurück zum Zitat Sirivianos M, Park JH, Yang X, Jarecki S (2007) Dandelion: cooperative content distribution with robust incentives. Proceedings of the USENIX annual technical conference, pp 157–170 Sirivianos M, Park JH, Yang X, Jarecki S (2007) Dandelion: cooperative content distribution with robust incentives. Proceedings of the USENIX annual technical conference, pp 157–170
8.
Zurück zum Zitat Jia AL, Rahman R, Vinkó T, Pouwelse JA, Epema DHJ (2011) Fast download but eternal seeding: the reward and punishment of sharing ratio enforcement. Proceedings of IEEE P2P’11, pp 280–289 Jia AL, Rahman R, Vinkó T, Pouwelse JA, Epema DHJ (2011) Fast download but eternal seeding: the reward and punishment of sharing ratio enforcement. Proceedings of IEEE P2P’11, pp 280–289
9.
Zurück zum Zitat Zohar A, Rosenschein JS (2009) Adding incentives to file-sharing systems. Proceedings of the 8th international conference on autonomous agents and multiagent systems, pp 859–866 Zohar A, Rosenschein JS (2009) Adding incentives to file-sharing systems. Proceedings of the 8th international conference on autonomous agents and multiagent systems, pp 859–866
10.
Zurück zum Zitat Feldman M, Lai K, Stoica I, Chuang J (2004) Robust incentive techniques for peer-to-peer networks. Proceedings of the 5th ACM conference on electronic commerce, pp 102–111 Feldman M, Lai K, Stoica I, Chuang J (2004) Robust incentive techniques for peer-to-peer networks. Proceedings of the 5th ACM conference on electronic commerce, pp 102–111
11.
Zurück zum Zitat Sarjaz BS, Abbaspour M (2013) Securing BitTorrent using a new reputation-based trust management system. Peer-to-Peer Netw Appl 6:86–100 CrossRef Sarjaz BS, Abbaspour M (2013) Securing BitTorrent using a new reputation-based trust management system. Peer-to-Peer Netw Appl 6:86–100 CrossRef
12.
Zurück zum Zitat Landa R, Griffin D, Clegg RG, Mykoniati E, Rio M (2009) A sybilproof indirect reciprocity mechanism for peer-to-peer networks. Proceedings of 28th IEEE INFOCOM, pp 343–351 Landa R, Griffin D, Clegg RG, Mykoniati E, Rio M (2009) A sybilproof indirect reciprocity mechanism for peer-to-peer networks. Proceedings of 28th IEEE INFOCOM, pp 343–351
13.
Zurück zum Zitat Shin K (2009) Preventing misbehavior in cooperative distributed systems. Dissertation, North Carolina State University Shin K (2009) Preventing misbehavior in cooperative distributed systems. Dissertation, North Carolina State University
Metadaten
Titel
A verifiable hierarchical circular shift cipher scheme for P2P chunk exchanges
verfasst von
Jian Wang
Xiaoming Hu
Xiaolin Xu
Yinchun Yang
Publikationsdatum
01.01.2015
Verlag
Springer US
Erschienen in
Peer-to-Peer Networking and Applications / Ausgabe 1/2015
Print ISSN: 1936-6442
Elektronische ISSN: 1936-6450
DOI
https://doi.org/10.1007/s12083-013-0225-3

Weitere Artikel der Ausgabe 1/2015

Peer-to-Peer Networking and Applications 1/2015 Zur Ausgabe

Premium Partner