Research on Distributed Trust Storage Scheme Based on Certificateless Signature

Article Preview

Abstract:

The existing storage schemes cannot provide the secure mechanism to ensure the trust data integrity in distributed environments. Based on a bilinear mapping, a certificateless signature scheme was proposed and implemented in this paper, and it was introduced into trust management system to realize the distributed secure trust data storage, solving such problems as destruction of trust integrity, failure to get trust information, and failure of trust updating, due to the offline of local storage nodes. Performance analysis shows that the new distributed trust storage scheme effectively achieves secure trust storage with relatively low overhead.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

398-402

Citation:

Online since:

September 2013

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2013 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] I. Stoica, R. Morris, D. Karger, et al.: Chord: A Scalable Peer-to-peer Lookup Service for Internet Applications. ACM SIGCOMM Computer Communication Review, Proceedings of the 2001 SIGCOMM conference, Vol. 31(4), October 2001: 149-160.

DOI: 10.1145/964723.383071

Google Scholar

[2] F. G. Marmol, G. M. Perez: TRIP: a trust and reputation infrastructure-based proposal for vehicular ad hoc networks. Journal of Network and Computer Applications, 2012, 35: 934-941.

DOI: 10.1016/j.jnca.2011.03.028

Google Scholar

[3] M. Li, X. Sun, H. Wang, et al.: Privacy-aware access control with trust management in web service. World Wide Web, 2011, 14: 407-430.

DOI: 10.1007/s11280-011-0114-8

Google Scholar

[4] M. Omar, Y. Challal, A. Bouabdallah: Certification-based trust models in mobile ad hoc networks: A survey and taxonomy. Journal of Network and Computer Applications, 2012, 35: 268-286.

DOI: 10.1016/j.jnca.2011.08.008

Google Scholar

[5] S. Bahtiyar, C. M. Ufuk: Extracting trust information from security system of a service. Journal of Network and Computer Applications, 2012, 35: 480-490.

DOI: 10.1016/j.jnca.2011.10.002

Google Scholar

[6] Y. A. Kim, R. Phalak: A trust prediction framework in rating-based experience sharing social networks without a Web of Trust, Information Sciences, 2012, 191: 128-145.

DOI: 10.1016/j.ins.2011.12.021

Google Scholar

[7] Y. Yu, K. Li, W. Zhou, et al.: Trust mechanisms in wireless sensor networks: Attack analysis and countermeasures. Journal of Network and Computer Applications, 2012, 35: 867-880.

DOI: 10.1016/j.jnca.2011.03.005

Google Scholar

[8] H. Xia, Z. Jia, X. Li, et al.: Trust prediction and trust-based source routing in mobile ad hoc networks. Ad Hoc Networks, 2012, 2: 1-19.

DOI: 10.1016/j.adhoc.2012.02.009

Google Scholar

[9] J. H. Cho, A. Swami, I. R. Chen: Modeling and analysis of trust management with trust chain optimization in mobile ad hoc networks. Journal of Network and Computer Applications, 2012, 35: 1001-1012.

DOI: 10.1016/j.jnca.2011.03.016

Google Scholar