search query: @keyword peer-to-peer / total: 21
reference: 4 / 21
« previous | next »
Author:Du, Wei
Title:Securing data authentication with cryptographic signatures in BitTorrent
Publication type:Master's thesis
Publication year:2010
Pages:xi + 58      Language:   eng
Department/School:Tietoliikenne- ja tietoverkkotekniikan laitos
Main subject:Tietoverkkotekniikka   (S-38)
Supervisor:Manner, Jukka
Instructor:Savolainen, Petri
OEVS:
Electronic archive copy is available via Aalto Thesis Database.
Instructions

Reading digital theses in the closed network of the Aalto University Harald Herlin Learning Centre

In the closed network of Learning Centre you can read digital and digitized theses not available in the open network.

The Learning Centre contact details and opening hours: https://learningcentre.aalto.fi/en/harald-herlin-learning-centre/

You can read theses on the Learning Centre customer computers, which are available on all floors.

Logging on to the customer computers

  • Aalto University staff members log on to the customer computer using the Aalto username and password.
  • Other customers log on using a shared username and password.

Opening a thesis

  • On the desktop of the customer computers, you will find an icon titled:

    Aalto Thesis Database

  • Click on the icon to search for and open the thesis you are looking for from Aaltodoc database. You can find the thesis file by clicking the link on the OEV or OEVS field.

Reading the thesis

  • You can either print the thesis or read it on the customer computer screen.
  • You cannot save the thesis file on a flash drive or email it.
  • You cannot copy text or images from the file.
  • You cannot edit the file.

Printing the thesis

  • You can print the thesis for your personal study or research use.
  • Aalto University students and staff members may print black-and-white prints on the PrintingPoint devices when using the computer with personal Aalto username and password. Color printing is possible using the printer u90203-psc3, which is located near the customer service. Color printing is subject to a charge to Aalto University students and staff members.
  • Other customers can use the printer u90203-psc3. All printing is subject to a charge to non-University members.
Location:P1 Ark Aalto  2491   | Archive
Keywords:peer-to-peer
BitTorrent
data authentication
peer
cryptographic signature
hash function
live streaming
Abstract (eng): BitTorrent is a scalable and popular Peer-to-Peer protocol for swapping large files over the Internet since its introduction in 2001.
To validate a source file, which is chopped into small pieces, a traditional approach is to compute a hash for each piece by the SHA-1 hash function and include these hashes as metadata in a torrent file.
The pieces are valid only until they have been verified by the hashes.
However, the size of the torrent file relatively increases by the hashes, when the piece size decreases.
Although, a larger piece size can lead to smaller piece hashes, more bandwidth and time will be consumed for re-transmitting the larger pieces if errors occur during downloading.
In the case of live streaming, the piece hashes cannot be computed because the source contents cannot distribute in advance when the torrent file is created.
Therefore, the lack of piece hashes makes it possible to deliberately attack and spam streaming because the peers cannot authenticate streaming data.

In this thesis, we propose a novel signature-authenticated proposal to facilitate data authentication by replacing the piece hashes in current BitTorrent protocols.
Additionally, new metadata of public keys is included in the torrent file, while the signatures are stored separately in a file.
We implement an open source BitTorrent client using cryptographic signatures to authenticate data.
The experimental results show that signatures in BitTorrent provide strong security while decreasing the size of the torrent file, the overhead of signatures also performs reasonable.
Furthermore, we argue that using cryptographic signatures is a feasible approach for securing data authentication in live streaming.
ED:2010-09-07
INSSI record number: 40717
+ add basket
« previous | next »
INSSI