DocumentCode :
509543
Title :
Strategy Optimization for P2P Security Using BloomFilter
Author :
Fu Jian-ming ; Xu Ying ; Xiong Hui-jun ; Wu Wei
Author_Institution :
Sch. of Comput. Sci., Wuhan Univ., Wuhan, China
Volume :
1
fYear :
2009
fDate :
18-20 Nov. 2009
Firstpage :
403
Lastpage :
406
Abstract :
Two optimization strategies based on Bloom Filter are proposed for P2P security. In order to protect the privacy of trust information in P2P systems, BFManager using BloomFilter is employed to manager trust information, and builds a structure called trust bucket to store trust value and divides peers with different trust value into different trust buckets. The other is called as BFChecker to optimize current file checking, which integrates all hash value of file pieces into a BloomFilter structure. The experimental results demonstrate their effectiveness and efficiency of both strategies.
Keywords :
data privacy; peer-to-peer computing; security of data; BFChecker; BFManager; BloomFilter; P2P security; P2P system; file checking; hash value; privacy protection; strategy optimization; trust bucket; trust information management; trust value; Analytical models; Computer science; Computer security; Indexing; Information security; Laboratories; Multimedia computing; Peer to peer computing; Privacy; Traffic control; bloomfilter; file check; peer-to-peer systems; privacy; trust model;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Multimedia Information Networking and Security, 2009. MINES '09. International Conference on
Conference_Location :
Hubei
Print_ISBN :
978-0-7695-3843-3
Electronic_ISBN :
978-1-4244-5068-8
Type :
conf
DOI :
10.1109/MINES.2009.82
Filename :
5371019
Link To Document :
بازگشت