Title
A Two-Key Agreement Based Supervising Mechanism for Cluster-Based Peer-to-Peer Applications
Abstract
Peer-to-Peer (P2P) technologies are developing rapidly and have gained popularity. The application of P2P to areas such as file sharing, collaborative business environment, and distributed computing requires secure communication among the nodes. Cluster-based P2P structure provides an efficient way to do file sharing and distributed computing. A key agreement protocol is a set of communication rules whereby two users establish a shared common key. The shared key is used by users in future secure communications. Supervising services for governing communications between two nodes is an important topic, especially in the area of government affairs. The proposed paper provides a framework for supporting a supervising mechanism in cluster-based P2P networks based on the concept of two-key agreement protocol. This mechanism uses the idea of hash-based two-key agreement protocol to help the nodes in higher level supervise the nodes in lower level for cluster-based P2P communication environment. In the proposed paper, a global cluster head supervises the whole network, cluster heads in each cluster supervise their own clusters' communications. Security analyses show that the proposed mechanism is secure enough for P2P. Any two nodes within the same cluster generate their common session key by themselves. In the same cluster, no nodes gain this session key except the cluster head. Moreover, there are only two kinds of operations, hash operation and XOR operation, in the proposed mechanism. Hence, the proposed mechanism provides an efficient way to supervise the P2P network.
Year
DOI
Venue
2010
10.1109/ICPADS.2010.51
ICPADS
Keywords
Field
DocType
peer-to-peer technologies,p2p structure,peer-to-peer technology,global cluster head,file sharing,proposed paper,two-key agreement protocol,cluster-based p2p structure,proposed mechanism,shared key,own cluster,cluster head,hash operation,two-key agreement,cluster-based peer-to-peer applications,collaborative business environment,computer network security,communication rule,supervising mechanism,secure communication,p2p network,xor operation,hash-based two-key agreement protocol,p2p communication environment,workstation clusters,cryptographic protocols,distributed computing,cluster-based p2p communication environment,security analysis,peer-to-peer computing,cluster-based p2p,p2p technology,nodes gain,public key,nickel,key agreement protocol,protocols,p2p
Cryptographic protocol,Peer-to-peer,Computer science,Network security,Computer network,File sharing,Key-agreement protocol,Public-key cryptography,Session key,Secure communication,Distributed computing
Conference
ISSN
ISBN
Citations 
1521-9097 E-ISBN : 978-0-7695-4307-9
978-0-7695-4307-9
0
PageRank 
References 
Authors
0.34
4
2
Name
Order
Citations
PageRank
Chun-Chieh Huang115116.52
Chi-Chun Lo259354.99