期刊文献+

面向P2P存储的分布式认证跳表

Distributed Authenticated Skip List for Secure P2P Storage
下载PDF
导出
摘要 针对已有认证数据结构方案不能很好地解决P2P环境下的数据认证问题,在Goodrich认证跳表基础上,提出了分布式认证跳表(distributed authenticated skip list,DASL)并给出其设计思想及其在P2P环境下的存储方案.在仅利用分布式系统中最基本的分布对象定位算法locate的基础上,设计了对象查询路径获取算法、对象验证算法以及对象插入和删除算法,并应用概率论和数理统计的方法对DASL的代价进行了理论分析和比较,结果表明DASL方案优于全签方案.由于DASL的实现不依赖于分布式系统中locate操作的实现细节,从而具有简单性、可扩展性和可用性,因此易于应用到现有的P2P存储系统中,以满足其数据认证需求. Aiming at the problem of data authenticated in P2P storage environments, a distributed authenticated skip list (DASL) based on Goodrich's method was proposed. The path- searching algorithm, object authentication algorithm as well as object insertion/deletion algorithm based on the distributed object location algorithm were also presented. The analysis of DASL cost was given and the employed probability theory and statistical analysis were compared. Such analysis show that the DASL scheme is more efficient than sign-all scheme. The implementation of the DASL does not rely on the location algorithm, which makes it simple, expandable, and feasible. Therefore, the DASL can be easily applied to the existing P2P storage system and fulfills the data authentication requirements.
出处 《东北大学学报(自然科学版)》 EI CAS CSCD 北大核心 2012年第1期73-76,共4页 Journal of Northeastern University(Natural Science)
基金 国家高技术研究发展计划项目(2009AA01Z122) 国家自然科学基金资助项目(60872040) 沈阳市自然科学基金资助项目(F10-205-1-12)
关键词 P2P存储 认证数据结构 数据认证 分布式认证跳表 签名摊销 peer-to-peer storage authenticated data structures data authentication distributed authenticated skip list signature amortization
  • 相关文献

参考文献8

  • 1温涛,张永,郭权,李迎秋.基于P2P持久存储技术的P2P认证方案[J].东北大学学报(自然科学版),2010,31(10):1381-1384. 被引量:1
  • 2Vlachos V, Androutsellis -Theotokis S, Spinellis D. Security applications of peer-to-peer networks [ J ]. Computer Networks, 2004,45(2) :195 205.
  • 3Ratnasamy S, Francis P, Handley M, et al. A scalable content-addressable network [C] //SIGCOMM 2001. San Diego; ACM Press, 2001 : 161 - 172.
  • 4Rhea S, Godfrey B, Karp B, et al. OpenDHT: a public DHT service and its uses [C]//SIGCOMM 2005. Philadelphia: ACM Press, 2005:73 - 84.
  • 5Papamanthou C, Roberto T, Triandopoulos N. Optimal authenticated data structures with multilinear forms [C] // Pairing 2010. Ishikawa: Springer-Verlag, 2010 : 246 - 264.
  • 6徐剑,周福才,陈旭,朱志良.云计算中基于认证数据结构的数据外包认证模型[J].通信学报,2011,32(7):153-160. 被引量:10
  • 7Battista G D, Palazzi B. Authenticated relational tables and authenticated skip lists [C]//Data and Applications Security 2007. Redondo Beach: Springer-Verlag, 2007 ; 31 - 46.
  • 8Martel C, Nuckolls G, Devanbu P, et al. A general model for authenticated data structures [J]. Algorithmica, 2004, 39 (1):21-41.

二级参考文献21

  • 1卿斯汉,周永彬,张振峰,刘娟.认证字典及其在PKI中的应用研究[J].电子学报,2004,32(8):1356-1359. 被引量:2
  • 2Zhao B, Kubiatowicz J, Joseph A. Tapestry: infrastructure for fault-tolerant wide-area location and routing [ R ]. California: Berkeley Computer Science Division, 2001.
  • 3Ratnasamy S, Francis P, Handley M, et al. A scalable content-addressable network [ C] //Proceedings of the ACM SIGCOMM Symposium on Communication, Architecture, and Protocols. San Diego: ACM Press, 2001 : 161 - 172.
  • 4Stoica I, Morris R, Karger D, et al. Chord: a scalable peer-to-peer lookup service for Intemet applications [ C ] // Proceedings of the 2001 SIGCOMM Conference. San Diego: ACM Press, 2001 : 149 160.
  • 5Rowstron A, Druschel P. Lecture notes in computer science [M]. Berlin: Springer, 2001:329 - 350.
  • 6Rhea S, Godfrey P B, Karp B, et al. OpenDHT: a public DHT service and its uses[C] //ACM SIGCOMM Computer Communication Review. New York: ACM Press, 2005:73.
  • 7Stribling J. OverCite: lecture notes in computer science [M]. Berlin: Springer, 2005:69 - 79.
  • 8Zhang Z, Lian Q, Lin S, et al. BitVault: a highly reliable distributed data retention platform [ C ]//ACM SIC, OPS Operating Systems Review. New York: ACM Press, 2005: 27 - 36.
  • 9Kubiatowicz J, Bindel D, Chen Y, et al. OceanStore: an architecture for global-scale persistent storage [ C ] // Proceedings of the Ninth International Conference on Architectural Support for Programming Languages and Operating Systems. Boson, 2000:190 - 201.
  • 10Lee H, Kim K. An adaptive authentication protocol based on reputation for peer-to-peer system[C]// The 2003 Symposium on Cryptography and Information Security. Hamamatsu: SCIS, 2003:661-666.

共引文献9

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部