How to keep cloud data intact and available to users is a problem to be solved. Authenticated skip list is an important data structure used in cloud data integrity verification. How to get the membership proof of the ...How to keep cloud data intact and available to users is a problem to be solved. Authenticated skip list is an important data structure used in cloud data integrity verification. How to get the membership proof of the element in authenticated skip list efficiently is an important part of authentication. Kaouthar Blibech and Alban Gabillon proposed a head proof and a tail proof algorithms for the membership proof of elements in the authenticated skip list. However, the proposed algorithms are uncorrelated each other and need plateau function. We propose a new algorithm for computing the membership proof for elements in the authenticated skip list by using two stacks, one is for storing traversal chain of leaf node, the other is for storing authentication path for the leaf. The proposed algorithm is simple and effective without needing plateau function. It can also be applicable for other similar binary hash trees.展开更多
In this paper, we present the resuks of the BitTorrent measurement study. Two sources of BitTorrent data were utilised: meta- data files and the logs of one of the currently most popular BitTorrent clients--gTorrent....In this paper, we present the resuks of the BitTorrent measurement study. Two sources of BitTorrent data were utilised: meta- data files and the logs of one of the currently most popular BitTorrent clients--gTorrent. Experimental data were collected for fifteen days from the popular torrent-discovery site thepiratebay.org (more than 30 000 torrents were captured and analysed). During this pe- riod the activity and logs of an unmodified version of μTorrent client downloading ses- sions were also captured. The obtained ex- perimental results are swarm-oriented, which allows us to look at BitTorrent and its users from an exchanged resources perspective. Moreover, comparative analysis of the clients' connections with and without the μTP proto- col is carried out to verify the extent to which μTP improves BitTorrent transmissions. To the authors' best knowledge, none of the previous studies have addressed these issues.展开更多
基金partially supported by the Fundamental Research Funds for the Central Universities of China under Grant No.2015JBM034the China Scholarship Council Funds under File No.201407095023
文摘How to keep cloud data intact and available to users is a problem to be solved. Authenticated skip list is an important data structure used in cloud data integrity verification. How to get the membership proof of the element in authenticated skip list efficiently is an important part of authentication. Kaouthar Blibech and Alban Gabillon proposed a head proof and a tail proof algorithms for the membership proof of elements in the authenticated skip list. However, the proposed algorithms are uncorrelated each other and need plateau function. We propose a new algorithm for computing the membership proof for elements in the authenticated skip list by using two stacks, one is for storing traversal chain of leaf node, the other is for storing authentication path for the leaf. The proposed algorithm is simple and effective without needing plateau function. It can also be applicable for other similar binary hash trees.
基金partially supported by the Polish National Science Center under Grant No.2011/01/D/ST7/05054
文摘In this paper, we present the resuks of the BitTorrent measurement study. Two sources of BitTorrent data were utilised: meta- data files and the logs of one of the currently most popular BitTorrent clients--gTorrent. Experimental data were collected for fifteen days from the popular torrent-discovery site thepiratebay.org (more than 30 000 torrents were captured and analysed). During this pe- riod the activity and logs of an unmodified version of μTorrent client downloading ses- sions were also captured. The obtained ex- perimental results are swarm-oriented, which allows us to look at BitTorrent and its users from an exchanged resources perspective. Moreover, comparative analysis of the clients' connections with and without the μTP proto- col is carried out to verify the extent to which μTP improves BitTorrent transmissions. To the authors' best knowledge, none of the previous studies have addressed these issues.