Browse > Article
http://dx.doi.org/10.14400/JDC.2014.12.2.335

The Dynamic Group Authentication for P2P based Mobile Commerce  

Yun, Sunghyun (Div. of Information & Communication Engineering, Baekseok University)
Publication Information
Journal of Digital Convergence / v.12, no.2, 2014 , pp. 335-341 More about this Journal
Abstract
To play the networked video contents in a client's mobile device in real time, the contents should be delivered to it by the contents server with streaming technology. Generally, in a server-client based commerce model, the server is in charge of both the authentication of the paid customer and distribution of the contents. The drawback of it is that if the customers' requests go on growing rapidly, the service quality would be degraded results from the problems of overloaded server or restricted network bandwidth. On the contrary, in P2P based networks, more and more the demand for service increasing, the service quality is upgraded since a customer can act as a server. But, in the P2P based network, there are too many servers to manage, it's possible to distribute illegal contents because the P2P protocol cannot control distributed servers. Thus, it's not suitable for commercial purposes. In this paper, the dymanic group authentication scheme is proposed which is suited to P2P based applications. The proposed scheme consists of group based key generation, key update, signature generation and verification protocols. It can control the seeder's state whether the seeder is joining or leaving the network, and it can be applied to hybrid P2P based commerce model where sales transactions are covered by the index server and the contents are distributed by the P2P protocol.
Keywords
Dynamic Group Authentication; Hybrid P2P; Server Overload; Group Signature; Key Update;
Citations & Related Records
연도 인용수 순위
  • Reference
1 Streaming media, http://en.wikipedia.org/wiki/Streaming_media
2 E. Setton, B. Girod, Peer-to-Peer Video Streaming, Springer, e-ISBN-13:978-0-387-74115-4, 2007.
3 Q. H. Vu, M. Lupu, B. C. Ooi, Peer-to-Peer Computing, Principles and Applications, Springer, DOI 10.1007/978-3-642-03514-2, 2010.   DOI
4 E. Buyukkaya, M. Abdallah, G. Simon, A survey of peer-to-peer overlay approaches for networked virtual environments, Peer-to-Peer Networking and Applications, Springer, http://dx.doi.org/10.1007/s12083-013-0231-5, pp. 1-25, 2013.   DOI   ScienceOn
5 V. Darlagiannis, Hybrid Peer-to-Peer Systems, Peer-to-Peer Systems and Applications, Springer, ISBN 9783540291923, 2005.
6 P. Janbandhu, M. Siyal, Novel biometric digital signatures for Internet-based applications, Information Management & Computer Security, Vol. 9, No. 5, pp. 205-212, 2001.   DOI   ScienceOn
7 ITU-T X.1088, A Framework for biometric digital key generation, ITU-T, 2008.
8 N. K. Ratha, J. H. Connell, R. M. Bolle, Enhancing security and privacy in biometric-based authentication systems, IBM Systems Journal, Vol. 40, No. 3, pp. 614-634, 2001.   DOI   ScienceOn
9 W. Diffie, M. Hellman, New Directions in Cryptography, IEEE Transactions on Information Theory, Vol. 22, No. 6, pp. 644-654, 1976.   DOI
10 D. M. Burton, Elementary Number Theory, McGraw-Hill Science/Engineering/Math, 2010.