Xiaopu Ma

Work place: College of Computer Science and Technology, Huazhong University of Science and Technology, Wuhan 430074, Hubei, P. R. China

E-mail: xpma@hust.edu.cn

Website:

Research Interests: Distributed Computing, Multimedia Information System, Process Control System, Data Structures and Algorithms

Biography

Xiaopu Ma received his M.S. degree in School of Computer Science and Engineering from University of Electronic Science and Technology of China in 2004. Now he is a Ph.D. candidate in the Intelligent and Distributed Computing Lab, College of Computer Science and Technology, Huazhong University of Science and Technology. His research interests include access control, multidomain interoperation, and distributed system security.

Author Articles
Primary-Backup Access Control Scheme for Securing P2P File-Sharing Systems

By Jianfeng Lu Ruixuan Li Zhengding Lu Xiaopu Ma

DOI: https://doi.org/10.5815/ijitcs.2009.01.02, Pub. Date: 8 Oct. 2009

Peer-to-peer (P2P) file-sharing systems have gained large interests among the internet users. However, wide-scale applications of P2P file-sharing technologies are constrained by the limitations associated with the sophisticated control mechanisms. Moreover, the decentralized and anonymous characteristics of P2P environments make it more difficult to control accesses on the shared resources, especially for using traditional access control methods. To overcome these limitations, we propose a role-based access control architecture for P2P file-sharing systems that supports autonomous decisions and centralized controls. The architecture integrates policies of credential, identity and role-based access control models to provide scalable, efficient and fault-tolerant access control services. Furthermore, we employ the primary-backup (PB) scheme to preserve P2P decentralized structure and peers’ autonomy property while enabling collaboration between peers. In particular, we propose a method for setting up interoperating relationships between domains by role mappings and resolve two kinds of interoperability conflicts while mapping roles from foreign domain to local domain without centralized authority. We believe that the proposed architecture is realistic, efficient and can provide controlled communications between peers.

[...] Read more.
Other Articles