期刊文献+

P2P文件完整性校验延迟隐藏算法 被引量:5

Latency Hiding Algorithm for P2P File Integrity Verification
下载PDF
导出
摘要 P2P下载中文件完整性校验会影响下载性能,针对该问题,提出一种校验延迟的隐藏算法。利用文件完整性校验中使用的哈希算法的流式特性和TCP异步接收缓冲区的特点,将大文件块的哈希计算分成多次对较小的子数据块的计算,收到一个子数据块后,就开始计算哈希。由于计算每一个子数据块的哈希的时间开销很小,保证了计算延迟可以被TCP异步接收缓冲区所隐藏,使哈希计算与数据接收几乎可以并行进行,消除其对P2P文件下载性能的影响,提高了下载效率。 A latency hiding algorithm,called HASH-Latency Hiding(HASH-LH),is promoted.By leveraging the streaming process characteristics of the Hash algorithms used for P2P file integrity verification and the asynchronous receiving buffer of TCP,it is reasonable for HASH-LH to divide a big file block into multiple smaller sub-blocks,which makes the latency much shorter for calculating Hash values on each sub-block.Furthermore,the Hash calculation starts just after the first sub-block is received.As the latency of each sub-block Hash calculation becomes as short as it can be hidden by the asynchronous receiving buffer of TCP,it makes calculation and receiving processed nearly at the same time.As a result,all the latency from file verification is hidden and performance boosts up.
出处 《计算机工程》 CAS CSCD 北大核心 2010年第15期29-31,共3页 Computer Engineering
基金 国家"863"计划基金资助项目(2008AA01A317)
关键词 P2P下载 文件校验 延迟隐藏 SHA1算法 MD4算法 P2P downloading file verification latency hiding SHA1 algorithm MD4 algorithm
  • 相关文献

参考文献6

  • 1Habib A,Xu Dongyan,Atallah M J,et al.Verifying Data Integrity in Peer-to-Peer Media Streaming[C]//Proc.of the 12th Annual Conference on Multimedia Computing and Networking.San Jose,CA,USA:[s.n.],2005:1-12.
  • 2Cai Zhuhua,Chen Ruichuan,Feng Jiangqiao,et al.A Holistic Mechanism Against File Pollution in Peer-to-Peer Networks[C]// Proc.of 2009 ACM Symposium on Applied Computing.New York,NY,USA:ACM Press,2009:28-34.
  • 3Yoram K D B.The eMule Protocol Specification[EB/OL].(2005-09-05).http://www.cs.huji.ac.il/labs/danss/presentations/emule.pdf.
  • 4Cohen B.The BitTorrent Protocol Specification[EB/OL].(2009-03-18).http://www.bittorrent.org/beps/bep_0003.html.
  • 5Rivest R.The MD4 Message-digest Algorithm[S].RFC 1320,1992.
  • 6Eastlake E.US Secure Hash Algorithm 1(SHA1)[S].RFC 3174,2001.

同被引文献38

  • 1王进,顾乃杰,田舟贤.一种P2P网络中的隐蔽搜索模型[J].计算机研究与发展,2008,45(z1):370-374. 被引量:3
  • 2Yulin WANG, Yang SHEN, Jian PAN. Usage Control Based on Windows Kernel Hook [ C ]//2009 International Conference on Information and Multimedia Technology. 2009:264-267.
  • 3Grey Hoglund. Loading Rootkit using SystemLoadAndCalllmage~ EB/OL]. [ 2000-08-29 ]. http://seclists, org/bugtraq/2000/ aug/408.
  • 4字文.MigBot代码补丁技术的源代码过程讲解[EB/OL].[2008-06—11].http://www.51cto.com/atr/200808/76358.htm.
  • 5Mj0011.高级Bootkit:Tophet.a[J/OL].[2009-01-30].http://www.hackbase.com/tech/2009-01.30/43503—1.html.
  • 6Mark Russinovich. Inside Windows 7 User Account Control [ EB/OL ]. [ 2009-07-01 ]. http://technet, microsoft, com/en-us/ magazine/2009.07, uac. aspx.
  • 7李月峰.基于行为监测的Anti-R/Bootkit的研究与实现[D].合肥:中国科学技术大学,2009:6—7.
  • 8Greg Hoglund ,James Butler. Rootkits :Subverting the Windows Kernel[ M ]. Massachusetts:Addison Wesley Professional ,2005: 3,74-87,173-183,210-214.
  • 9Mark E Russinovich,David A Solomon. Microsoft Windows Internals( Foutrh Edition)[ M 1. Beijing: Publishing House of Elec- tronics industry ,2007:423-424,694-696,584.
  • 10AGILENT Technologies Inc. Qos Management Solution for MPLS Virtual Private Network Managed Services[J]. IEEECommunications Magazine, 2004, 42(8) : 14-14.

引证文献5

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部