Secure Data Synchronization over a Mobile Peer-to-Peer Network

2015 ◽  
Vol 764-765 ◽  
pp. 950-954
Author(s):  
Chih Kun Ke ◽  
Zheng Hua Lin

In previous work, we have proposed a service mechanism which automatically syncs the file resources among discrete mobile devices. The mechanism includes four modules. The role-based access control module (RBAC) defined an organization policy which constructs some rules for file resources accessing. The user identification module dispatches a user some specific role (s) with relevant permission (s) and constraint (s) to access organization file resources. The en-capsulation/de-capsulation module enforces the JXTA protocol to sync the file resource synchronization over a mobile peer-to-peer network. The knowledge base module stores various organization file resources in the proposed service mechanism. However, the service mechanism faces an important challenge about data security. How to securely sync organization file resources among discrete mobile devices is worth exploring. In this study, we enforces some cryptographic techniques, including advanced encryption standard (AES), Triple data encryption standards (Triple-DES), and data encryption standards (DES), to examine secure synchronization of organization file resources among discrete mobile devices. The experiment results show the proposed mechanism is secure to automatically sync file resources among discrete mobile devices. The contribution of this work is to solve data security issue in syncing organization file resources among discrete mobile devices. We also strengthen an organization mobility to acquire the file resources by a mobile device in anywhere.

2013 ◽  
Vol 664 ◽  
pp. 1076-1081
Author(s):  
Xin Chen

Recently, some proposals suggest to use a peer-to-peer network instead of servers to facilitate SIP user registration and location in IMS communication systems. Due to the lack of central authority, security issue becomes one of the main problems in such P2P IMS systems. In this paper, we propose a novel security architecture for P2P IMS system. By using this architecture, our P2P IMS system becomes a fully distributed secure system in which there is not a central server indeed. Furthermore, our system is a scalable system which is capable of anonymous yet accountable real time communication based on SIP protocol which enables the system compatible with any existing IMS systems.


2014 ◽  
Vol 24 (8) ◽  
pp. 2132-2150
Author(s):  
Hong-Yan MEI ◽  
Yu-Jie ZHANG ◽  
Xiang-Wu MENG ◽  
Wen-Ming MA

2013 ◽  
Vol 9 ◽  
pp. 215-225 ◽  
Author(s):  
Tadeu Classe ◽  
Regina Braga ◽  
Fernanda Campos ◽  
José Maria N. David

2018 ◽  
Vol 26 ◽  
pp. 1180-1192 ◽  
Author(s):  
Atin Angrish ◽  
Benjamin Craver ◽  
Mahmud Hasan ◽  
Binil Starly

Sign in / Sign up

Export Citation Format

Share Document