The Shortest Authentication Path for Performance Improvement of MHT Contents Authentication Method in Distributed Network Environment


KIPS Transactions on Computer and Communication Systems, Vol. 7, No. 9, pp. 235-242, Sep. 2018
10.3745/KTCCS.2018.7.9.235,   PDF Download:
Keywords: P2P, CDN, CCN/NDN, Data authentication, Data Integrity, MHT
Abstract

Various technologies have been developed to more efficiently share content such as P2P, CDN, and CCN. These technologies take a common approach that content request packets is responded by distributed network nodes or hosts, not by a single content distributor. Such approaches not only resolve network congestion around content distributors, but also make it possible to distribute content regardless of the system and network status of content distributors. However, when receiving content from distributed nodes/hosts, not from authenticated distributors, users cannot practically identify which node/host sent content to them. Due to this characteristic, various hacking caused by the malicious modification of content is possible. Therefore, to make such approaches more secure, a content authentication technique is required. In this paper, we propose a improved operation of MHT used in CCN for authenticating distributed content. Then we evaluate the proposed method by comparing its performance with the existing technology.


Statistics
Show / Hide Statistics

Statistics (Cumulative Counts from September 1st, 2017)
Multiple requests among the same browser session are counted as one view.
If you mouse over a chart, the values of data points will be shown.


Cite this article
[IEEE Style]
D. Kim, "The Shortest Authentication Path for Performance Improvement of MHT Contents Authentication Method in Distributed Network Environment," KIPS Transactions on Computer and Communication Systems, vol. 7, no. 9, pp. 235-242, 2018. DOI: 10.3745/KTCCS.2018.7.9.235.

[ACM Style]
DaeYoub Kim. 2018. The Shortest Authentication Path for Performance Improvement of MHT Contents Authentication Method in Distributed Network Environment. KIPS Transactions on Computer and Communication Systems, 7, 9, (2018), 235-242. DOI: 10.3745/KTCCS.2018.7.9.235.