Ruixuan Li

Work place: College of Computer Science and Technology, Huazhong University of Science and Technology, Wuhan 430074, Hubei, P. R. China

E-mail: rxli@hust.edu.cn

Website:

Research Interests: Information Security, Distributed Computing, Database Management System, Multimedia Information System, World Wide Web

Biography

Ruixuan Li received the B.S., M.S., and Ph.D. degrees from College of Computer Science and Technology from Huazhong University of Science and Technology in 1997, 2000, and 2004, respectively. Since 2004, He has been an Associate Professor of College of Computer Science and Technology from Huazhong University of Science and Technology. His research interests include distributed system security, heterogeneous information integration, peer-to-peer computing, web data management, semantic web and ontology.

Author Articles
Primary-Backup Access Control Scheme for Securing P2P File-Sharing Systems

By Jianfeng Lu Ruixuan Li Zhengding Lu Xiaopu Ma

DOI: https://doi.org/10.5815/ijitcs.2009.01.02, Pub. Date: 8 Oct. 2009

Peer-to-peer (P2P) file-sharing systems have gained large interests among the internet users. However, wide-scale applications of P2P file-sharing technologies are constrained by the limitations associated with the sophisticated control mechanisms. Moreover, the decentralized and anonymous characteristics of P2P environments make it more difficult to control accesses on the shared resources, especially for using traditional access control methods. To overcome these limitations, we propose a role-based access control architecture for P2P file-sharing systems that supports autonomous decisions and centralized controls. The architecture integrates policies of credential, identity and role-based access control models to provide scalable, efficient and fault-tolerant access control services. Furthermore, we employ the primary-backup (PB) scheme to preserve P2P decentralized structure and peers’ autonomy property while enabling collaboration between peers. In particular, we propose a method for setting up interoperating relationships between domains by role mappings and resolve two kinds of interoperability conflicts while mapping roles from foreign domain to local domain without centralized authority. We believe that the proposed architecture is realistic, efficient and can provide controlled communications between peers.

[...] Read more.
Other Articles