Journal of Northeastern University ›› 2012, Vol. 33 ›› Issue (1): 73-76.DOI: -

• OriginalPaper • Previous Articles     Next Articles

Distributed authenticated skip list for secure P2P storage

Xu, Jian (1); Zhou, Fu-Cai (1); Li, Xin-Yang (2); Zhu, Zhi-Liang (1)   

  1. (1) School of Software, Northeastern University, Shenyang 110819, China; (2) School of Information Science and Engineering, Northeastern University, Shenyang 110819, China
  • Received:2013-06-19 Revised:2013-06-19 Published:2013-01-17
  • Contact: Xu, J.
  • About author:-
  • Supported by:
    -

Abstract: Aiming at the problem of data authenticated in P2P storage environments, a distributed authenticated skip list (DASL) based on Goodrich's method was proposed. The path-searching algorithm, object authentication algorithm as well as object insertion/deletion algorithm based on the distributed object location algorithm were also presented. The analysis of DASL cost was given and the employed probability theory and statistical analysis were compared. Such analysis show that the DASL scheme is more efficient than sign-all scheme. The implementation of the DASL does not rely on the location algorithm, which makes it simple, expandable, and feasible. Therefore, the DASL can be easily applied to the existing P2P storage system and fulfills the data authentication requirements.

CLC Number: