Browse > Article
http://dx.doi.org/10.13089/JKIISC.2015.25.4.839

A Efficient Contents Verification Scheme for Distributed Networking/Data Store  

Kim, DaeYoub (Suwon University)
Abstract
To seamlessly provide content through the Internet, it is generally considered to use distributed processing for content requests converged on original content providers like P2P, CDN, and ICN. That is, after other nodes temporally save content, they handle content requests instead of original content providers. However, in this case, it may be possible that a content sender is different from the original provider of the content. In this case, users may be exposed to various risks. To solve such a problem, it is highly recommended to verify received contents before using them, but it can cause network traffic increases as well as a serious service delay. This paper proposes an efficient content verification scheme for distributed networking/data store environments and analyzes its performance.
Keywords
Futur Internet; NDN; Web Caching; Content Verification; MHT;
Citations & Related Records
Times Cited By KSCI : 1  (Citation Analysis)
연도 인용수 순위
1 M. Y. Chen, E. Kiciman, E. Fratkin, A. Fox and E. Brewer, "Pinpoint: Problem Determination in Large, Dynamic Internet Services," Proceedings of the International Conference on Dependable Systems and Networks (DSN'2), pp.595-604, June 23-26, 2002.
2 L. Wang, "Content, Topology and Cooperation in In-network Caching," Series of Publications A Report A-2015-1, Department of Computer Science, University of Helsinki, Finland, 2015.
3 M. Arifuzzaman, K. Yu and T. Sato, "Collaboration between Network Playersof Information Centric Network: An Engineering-Economic Analysis," Journal of ICT, Vol. 2, pp. 201-220, 2015.
4 V. Jacobson, D. K. Smetters, J. D. Thornton, M. F. Plass, N. H. Briggs, and R. L. Braynard, "Networking named content," ACMCoNext, pp. 1-6, Dec. 2009.
5 J. Pan, S. Paul, and R. Jain, "A Survey of the Research on Future Internet Architectures," IEEE Communications Magazine, pp. 26-36, July, 2011.
6 L. Zhang, et al., "Named Data Networking (NDN) Project," NDN-0001, Oct. 2010.
7 R. Merkle, "Protocol for public key cryptosystems," IEEE Sympo. Research in Security and Privacy, Apr.1980.
8 S. Hyun, P. Ning, A. Liu and W. Du, "Seluge: Secure and DoS-Resistant Code Dissemination in Wireless Sensor Network," Proc. Int',l Conf. Information Processing in Sensor Networks (IPSN',08), pp. 445-456, 2008
9 D. Y. Kim, J. S. Park, "Efficient Contents Verification Scheme for Contents-Centric-Networking," The Journal of Korean Institute of Comm. and Inform. Sciences, vol. 39, no. 4, pp. 234-241, April, 2014.
10 Xylomenos, G., Polyzos, G.C., "TCP and UDP performance over a wireless LAN," INFOCOM 99. Eighteenth Annual Joint Conference of the IEEE Computer and Communications Societies. Proceedings. vol. 2, pp. 439 - 446, Mar. 1999.