期刊文献+

分布式存储网最小传输开销认证树构建算法

Construction Algorithm of Least Transmission Cost Authentication Tree in Distributed Storage Network
下载PDF
导出
摘要 现有的认证树构建算法忽略认证信息在存储网中的访问距离,导致认证树传输开销过大。为此,提出一种传输开销最小化的认证树构建算法。在利用内容片访问热度的基础上,增加存储网中内容片访问距离,度量各个内容片认证信息的传输开销,并将此映射为赫夫曼编码树中各叶子节点的权重,采用贪心策略逐步合并权重最小的子树,形成最终的认证树。仿真结果表明,该算法构建的认证树在存储网中的传输开销最小,与TFDP和α-leaf树相比,生成的认证树可使传输开销分别降低19.8%和9.5%,更适合于分布式存储网中的文件内容认证。 Current generating algorithms of authentication tree ignore the access distance of authentication information, which leads to high transmission cost in distributed storage network. This paper proposes an authentication tree construction algorithm which minimizes the transmission cost. In addition to content piece's access frequency, the algorithm introduces access distance in distributed storage network, measures the authentication transmission cost of each content piece. It treats this cost as the weight of Huffman tree, uses greedy strategy to merge least subtrees step by step, and formulates the final authentication tree. The least transmission cost of the authentication tree is proved. Simulation results show that the authentication tree of the algorithm costs 19.8% and 9.5% less than TFDP and α-leaf tree. Thus it suits most for the content authentication in distributed storage network.
出处 《计算机工程》 CAS CSCD 2014年第7期13-17,32,共6页 Computer Engineering
基金 国家"863"计划基金资助重大项目(2011AA01A102) 中国科学院战略性先导科技专项子课题基金资助项目(XDA06010302) 国家科技支撑计划基金资助项目(2011BAH11B05)
关键词 分布式存储网 内容认证 认证树 传输开销 赫夫曼编码 访问距离 distributed storage network content authentication authentication tree transmission cost Huffman code access distance
  • 相关文献

参考文献12

  • 1李洋,徐国爱,钮心忻,杨义先.树链混合的组播源认证改进方案[J].华中科技大学学报(自然科学版),2011,39(7):50-53. 被引量:2
  • 2Park Y,Cho Y. The eSAIDA Stream Authentication Scheme[A].IEEE Press,2004.214-222.
  • 3Pannetrat A,Molva R. Efficient Multicast Packet Authentic-ation[A].San Diego,USA,2003.321-329.
  • 4Munoz J,Forne J,Esparza O. Efficient Certificate Revoc-ation System Implementation:Huffman Merkle Hash Tree(HuffMHT)[A].IEEE Press,2005.119-127.
  • 5Tamassia R,Triandopoulos N. Efficient Content Authentication in Peer-to-peer Networks[A].Zhuhai,China,2007.223-228.
  • 6Habib A,Xu D,Atallah M. A Tree-based Forward Digest Protocol to Verify Data Integrity in Distributed Media Streaming[J].IEEE Transactions on Knowledge and Data Engineering,2005,(07):1010-1014.
  • 7Merkle R. A Certified Digital Signature[A].IEEE Press,1989.267-274.
  • 8Kandappu T,Sivaraman V,Boreli R. A Novel Unbalanced Tree Structure for Low-cost Authentication of Streaming Content on Mobile and Sensor Devices[A].Seoul,Korea,2012.368-376.
  • 9Li Liangbin,Wang Jinlin,Niu Erli. Improving Content Authentication Efficiency of Online Multimedia Service[A].Wuhan,China,2010.158-262.
  • 10Hefeeda M. Authentication Schemes for Multimedia Streams:Quantitative Analysis and Comparison[J].ACM Transactions on Multimedia Computing Communications and Applications,2010,(01):1-24.

二级参考文献8

  • 1Canetti R, Garay J, Itkis G, et al. Multicast security;a taxonomy and some efficient constructions[C]// Proceedings of the INFOCOMM'99. New York: IEEE Press, 1999:708-716.
  • 2Gennaro R, Rohatgi P. How to sign digital streams [C]// Proceedings of the ICCAC' 97. London: Springer, 1997: 180-197.
  • 3Wang C K, Lam S S. Digital signature for flows and multicasts[J]. IEEE/ACM Transactions on Networking, 1999, 7(4): 502-513.
  • 4Park J M, Chong E K P, Siegel H J. Efficient multicast packet authentication using signature amortization[C]// Proceedings of the ISSP' 02. Oakland: IEEE Press, 2002: 227-240.
  • 5Perrig R C A, Song D, Tygar D. Effcient and secure source authentication for multicast[C] // Proceedings of the NDSS'01. San Diego: Internet Society, 2001: 35-46.
  • 6Perrig A, Tygar J D, Song D, Canetti R. Efficient authentication and signing of multicast streams over lossy channels[C] //Proceedings of the ISSP'00. Washington: IEEE Press, 2000: 56-73.
  • 7Perrig A, Song D, Canetti R, et al. RFC 4082 the tesla broadcast authentication protocol Timed Efficient Stream Loss-Tolerant Authentication (TESIRA): Multicast Source Authentication Transform Introduction[S]. Fremont: IETF, 2005.
  • 8Challal Y, Bouabdallah A, Bettahar H. Hybrid and adaptive hash-chaining scheme for data streaming source authentication [C]// Proceedings of the HSNMC'04. Berlin: Springer, 2004: 1056-1067.

共引文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部