By Topic

Cryptographic methods for securing the YML framework

Sign In

Full text access may be available.

To access full text, please use your member or institutional sign in.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

5 Author(s)
Xin Lv ; Lab. d'Inf. Fondamentale de Lille (LIFL), Univ. of Sci. & Technol. of Lille, Lille, France ; Petiton, S.G. ; Ling Shang ; Zhijian Wang
more authors

YML framework is a well-adapted advanced tool to support designing and executing portable parallel applications over large scale peer to peer and grid middlewares. We believe that it is necessary to consider the crucial security concerns for the improvement and extension of the framework. In this paper, two security mechanisms were introduced for the first time. To ensure the computing resources being utilized properly and legitimately, a lightweight authentication protocol was proposed, enabling the user to log in YML with 2 XOR and 1 HASH operation, meanwhile, a splitting way was adopted to distribute the secret key, making only the application requester can obtain the result. To safeguard the process of data exchanging, an efficient threshold encryption scheme was proposed. By generating a set of matched pieces of key, the data can be transformed into efficiently-recoverable half-ciphertext, which is able to transfer in public channel securely. Furthermore, dynamical addition of peers is supported in the scheme.

Published in:

Systems and Computer Science (ICSCS), 2012 1st International Conference on

Date of Conference:

29-31 Aug. 2012