Zhengding Lu

Work place: College of Computer Science and Technology, Huazhong University of Science and Technology, Wuhan 430074, Hubei, P. R. China

E-mail: zdlu@hust.edu.cn

Website:

Research Interests: Computer Architecture and Organization, Distributed Computing, Multimedia Information System, Process Control System, Data Structures and Algorithms

Biography

Zhengding Lu is currently a professor in College of Computer Science and Technology at Huazhong University of Science and Technology, and is the director of the Intelligent and Distributed Computing Laboratory. His research interests include distributed computing, distributed database, distributed system security, and multimedia information systems. 

Author Articles
Primary-Backup Access Control Scheme for Securing P2P File-Sharing Systems

By Jianfeng Lu Ruixuan Li Zhengding Lu Xiaopu Ma

DOI: https://doi.org/10.5815/ijitcs.2009.01.02, Pub. Date: 8 Oct. 2009

Peer-to-peer (P2P) file-sharing systems have gained large interests among the internet users. However, wide-scale applications of P2P file-sharing technologies are constrained by the limitations associated with the sophisticated control mechanisms. Moreover, the decentralized and anonymous characteristics of P2P environments make it more difficult to control accesses on the shared resources, especially for using traditional access control methods. To overcome these limitations, we propose a role-based access control architecture for P2P file-sharing systems that supports autonomous decisions and centralized controls. The architecture integrates policies of credential, identity and role-based access control models to provide scalable, efficient and fault-tolerant access control services. Furthermore, we employ the primary-backup (PB) scheme to preserve P2P decentralized structure and peers’ autonomy property while enabling collaboration between peers. In particular, we propose a method for setting up interoperating relationships between domains by role mappings and resolve two kinds of interoperability conflicts while mapping roles from foreign domain to local domain without centralized authority. We believe that the proposed architecture is realistic, efficient and can provide controlled communications between peers.

[...] Read more.
Other Articles