Title : 
Strategy Optimization for P2P Security Using BloomFilter
         
        
            Author : 
Fu Jian-ming ; Xu Ying ; Xiong Hui-jun ; Wu Wei
         
        
            Author_Institution : 
Sch. of Comput. Sci., Wuhan Univ., Wuhan, China
         
        
        
        
        
        
        
            Abstract : 
Two optimization strategies based on Bloom Filter are proposed for P2P security. In order to protect the privacy of trust information in P2P systems, BFManager using BloomFilter is employed to manager trust information, and builds a structure called trust bucket to store trust value and divides peers with different trust value into different trust buckets. The other is called as BFChecker to optimize current file checking, which integrates all hash value of file pieces into a BloomFilter structure. The experimental results demonstrate their effectiveness and efficiency of both strategies.
         
        
            Keywords : 
data privacy; peer-to-peer computing; security of data; BFChecker; BFManager; BloomFilter; P2P security; P2P system; file checking; hash value; privacy protection; strategy optimization; trust bucket; trust information management; trust value; Analytical models; Computer science; Computer security; Indexing; Information security; Laboratories; Multimedia computing; Peer to peer computing; Privacy; Traffic control; bloomfilter; file check; peer-to-peer systems; privacy; trust model;
         
        
        
        
            Conference_Titel : 
Multimedia Information Networking and Security, 2009. MINES '09. International Conference on
         
        
            Conference_Location : 
Hubei
         
        
            Print_ISBN : 
978-0-7695-3843-3
         
        
            Electronic_ISBN : 
978-1-4244-5068-8
         
        
        
            DOI : 
10.1109/MINES.2009.82