Jianfeng Lu

Work place: College of Computer Science and Technology, Huazhong University of Science and Technology, Wuhan 430074, Hubei, P. R. China

E-mail: lujianfeng@smail.hust.edu.cn

Website:

Research Interests: Process Control System, Analysis of Algorithms, Mathematical Analysis

Biography

Jianfeng Lu received the B.S. degree from College of Computer Science and Technology from Wuhan University of Science and Technology in 2005. He is a PhD candidate in the Intelligent and Distributed Computing Lab, College of Computer Science and Technology, Huazhong University of Science and Technology, and is expected to graduate in June 2009. His research interests include access control, security analysis, multidomain interoperation, and separation of duty.

Author Articles
Primary-Backup Access Control Scheme for Securing P2P File-Sharing Systems

By Jianfeng Lu Ruixuan Li Zhengding Lu Xiaopu Ma

DOI: https://doi.org/10.5815/ijitcs.2009.01.02, Pub. Date: 8 Oct. 2009

Peer-to-peer (P2P) file-sharing systems have gained large interests among the internet users. However, wide-scale applications of P2P file-sharing technologies are constrained by the limitations associated with the sophisticated control mechanisms. Moreover, the decentralized and anonymous characteristics of P2P environments make it more difficult to control accesses on the shared resources, especially for using traditional access control methods. To overcome these limitations, we propose a role-based access control architecture for P2P file-sharing systems that supports autonomous decisions and centralized controls. The architecture integrates policies of credential, identity and role-based access control models to provide scalable, efficient and fault-tolerant access control services. Furthermore, we employ the primary-backup (PB) scheme to preserve P2P decentralized structure and peers’ autonomy property while enabling collaboration between peers. In particular, we propose a method for setting up interoperating relationships between domains by role mappings and resolve two kinds of interoperability conflicts while mapping roles from foreign domain to local domain without centralized authority. We believe that the proposed architecture is realistic, efficient and can provide controlled communications between peers.

[...] Read more.
Other Articles