Title | ||
---|---|---|
A Two-Key Agreement Based Supervising Mechanism for Cluster-Based Peer-to-Peer Applications |
Abstract | ||
---|---|---|
Peer-to-Peer (P2P) technologies are developing rapidly and have gained popularity. The application of P2P to areas such as file sharing, collaborative business environment, and distributed computing requires secure communication among the nodes. Cluster-based P2P structure provides an efficient way to do file sharing and distributed computing. A key agreement protocol is a set of communication rules whereby two users establish a shared common key. The shared key is used by users in future secure communications. Supervising services for governing communications between two nodes is an important topic, especially in the area of government affairs. The proposed paper provides a framework for supporting a supervising mechanism in cluster-based P2P networks based on the concept of two-key agreement protocol. This mechanism uses the idea of hash-based two-key agreement protocol to help the nodes in higher level supervise the nodes in lower level for cluster-based P2P communication environment. In the proposed paper, a global cluster head supervises the whole network, cluster heads in each cluster supervise their own clusters' communications. Security analyses show that the proposed mechanism is secure enough for P2P. Any two nodes within the same cluster generate their common session key by themselves. In the same cluster, no nodes gain this session key except the cluster head. Moreover, there are only two kinds of operations, hash operation and XOR operation, in the proposed mechanism. Hence, the proposed mechanism provides an efficient way to supervise the P2P network. |
Year | DOI | Venue |
---|---|---|
2010 | 10.1109/ICPADS.2010.51 | ICPADS |
Keywords | Field | DocType |
peer-to-peer technologies,p2p structure,peer-to-peer technology,global cluster head,file sharing,proposed paper,two-key agreement protocol,cluster-based p2p structure,proposed mechanism,shared key,own cluster,cluster head,hash operation,two-key agreement,cluster-based peer-to-peer applications,collaborative business environment,computer network security,communication rule,supervising mechanism,secure communication,p2p network,xor operation,hash-based two-key agreement protocol,p2p communication environment,workstation clusters,cryptographic protocols,distributed computing,cluster-based p2p communication environment,security analysis,peer-to-peer computing,cluster-based p2p,p2p technology,nodes gain,public key,nickel,key agreement protocol,protocols,p2p | Cryptographic protocol,Peer-to-peer,Computer science,Network security,Computer network,File sharing,Key-agreement protocol,Public-key cryptography,Session key,Secure communication,Distributed computing | Conference |
ISSN | ISBN | Citations |
1521-9097 E-ISBN : 978-0-7695-4307-9 | 978-0-7695-4307-9 | 0 |
PageRank | References | Authors |
0.34 | 4 | 2 |
Name | Order | Citations | PageRank |
---|---|---|---|
Chun-Chieh Huang | 1 | 151 | 16.52 |
Chi-Chun Lo | 2 | 593 | 54.99 |