首页    期刊浏览 2024年12月12日 星期四
登录注册

文章基本信息

  • 标题:Ensuring Host Security of Data Provenance For Trust Aware P2P Networks
  • 本地全文:下载
  • 作者:R. Jayanthi
  • 期刊名称:International Journal of Innovative Research in Science, Engineering and Technology
  • 印刷版ISSN:2347-6710
  • 电子版ISSN:2319-8753
  • 出版年度:2014
  • 期号:ICETS
  • 页码:575
  • 出版社:S&S Publications
  • 摘要:Malicious software typically residesfurtively on a user’s computer and interacts with theuser’s computing resources. The goal is to improve thetrustworthiness of a host and its data by classifying thedata to secure the file. Specifically, the new mechanismis provided that ensures the provenance of criticalsystem information and prevents bots from utilizinghost resources in peer to peer systems. Data integritydefines the security property which states that thesource where a piece of data is generated cannot bespoofed or tampered. This project describes acryptographic provenance verification approach andapplying classification mechanism to find out the ratioof good and bad word count before rejection oforiginal file. This ensures system properties and thesystem-data integrity, and then the application isdemonstrated in the keystroke integrity verification.Specifically, it first designs and implements anefficient cryptographic protocol that provides dataintegrity. The protocol prevents the imitation of fakekey events by malware under the reasonableassumptions. Then demonstrate the provenanceverification approach by realizing the lightweightframework. If the verification fails each of the contentis compared with trained data set to conclude thecontent must be malicious to the peer so on the attackbasis is just warns the peer, otherwise the file will bereceived successfully and safe.
  • 关键词:Malware; cryptography; provenance;P2P System; classifier
国家哲学社会科学文献中心版权所有