Communications of the ACM
Chord: a scalable peer-to-peer lookup protocol for internet applications
IEEE/ACM Transactions on Networking (TON)
Open Problems in Data-Sharing Peer-to-Peer Systems
ICDT '03 Proceedings of the 9th International Conference on Database Theory
Complex Queries in DHT-based Peer-to-Peer Networks
IPTPS '01 Revised Papers from the First International Workshop on Peer-to-Peer Systems
[15] Peer-to-Peer Architecture Case Study: Gnutella Network
P2P '01 Proceedings of the First International Conference on Peer-to-Peer Computing
Data Indexing in Peer-to-Peer DHT Networks
ICDCS '04 Proceedings of the 24th International Conference on Distributed Computing Systems (ICDCS'04)
Modeling and performance analysis of BitTorrent-like peer-to-peer networks
Proceedings of the 2004 conference on Applications, technologies, architectures, and protocols for computer communications
Informed content delivery across adaptive overlay networks
IEEE/ACM Transactions on Networking (TON)
Enhancing Data Authenticity and Integrity in P2P Systems
IEEE Internet Computing
Distributed cache table: efficient query-driven processing of multi-term queries in P2P networks
P2PIR '06 Proceedings of the international workshop on Information retrieval in peer-to-peer networks
Efficient multi-keyword search over p2p web
Proceedings of the 17th international conference on World Wide Web
Service Authenticity in P2P File-Sharing
ICYCS '08 Proceedings of the 2008 The 9th International Conference for Young Computer Scientists
Hi-index | 0.00 |
In a peer-to-peer (P2P) file-sharing system, the faithful delivery of an authentic file depends on the authenticity of the file advertisement as well as the authenticity of the shared file advertised. We present the index authenticity problem in a distributed P2P indexing scheme, and propose to employ a secure index verification scheme , which allows a querying requestor to securely verify the authenticity of file advertisements in the query response from a distrusted index peer with unforgeable proofs of indexing correctness, in order to combat index poisoning attacks targeting index authenticity. A solution based on signature and bloom filter (BF) and its cost-efficiency analysis are given.