A Sample Chat Application Based on JXTA Mekki, R.; Fezza, R.
Journal of applied sciences (Asian Network for Scientific Information),
11/2009, Volume:
9, Issue:
21
Journal Article
In this study, the application aims use Peer-to-Peer technology to perform bidirectional communication. As the web continues to grow in both content and the number of connected devices, Peer-to-Peer ...computing is becoming increasingly prevalent. JXTA is a set of open, generalized Peer-to-Peer (P2P) protocols that allow any networked device (sensors, cell phones, PDAs, laptops, workstations, servers and supercomputers) to communicate and collaborate mutually as peers. The JXTA protocols are programming language independent and multiple implementations, also known as bindings, exist for different environments. Their common use of the JXTA protocols means that they are all fully interoperable. Therefore, in this study we introduce the Peer-to-Peer architecture that distribute the resources responsibility among all the connecting peers, the JXTA concepts, protocols and structure, so finally we can be able to implement a chat with sharing files application in JXTA. Unlike other projects that exist in the literature, we use bidirectional pipe that offer a reliable and bidirectional communication between peers.
Mutual authentication protocol to share files in cloud storage Nezhad, Seyed Farshad Hosseini; Parsamehr, Reza
2016 International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT),
2016-Dec.
Conference Proceeding
Nowadays, with deployment of Cloud Computing and its facilities, many users are absorbed in it. People are not satisfied with Cloud's Security and they are afraid to migrate to Cloud environment. We ...propose a new protocol that allows users to share their data securely on an insecure cloud servers. Our new protocol assures users that their data and information will stay secure. We focused on sharing data, among users in cloud servers. Users can share their data with other users in an encrypted way. We will encrypt their data and send it to Private or Public cloud servers so that servers cannot manipulate or read the content. Users can search specific file names in cloud storage then request it from server. Cloud Server cannot identify users to gain their identification so users can join cloud without jeopardizing their privacy and Ticket Grant Server will keep user's privacy securely. We encrypt all exchange information to prevent MITM and with two level encryption we achieve mutual authentication. Existing protocols are focused on group activities and communications, so they are not optimized and compatible with individual activities and communications. Hence, we are dealing with individual activities and communications and it can extend to group activities and communications.
As an essential component on Android devices, External Storage is frequently used for sharing files between different apps. Therefore, compared to Internal Storage, the access control on the External ...Storage is usually very loose. However, a lot of sensitive files might be stored on the External Storage, which makes it an attractive target for the attackers. Since Android 10, a security mechanism named Scoped Storage has been introduced to protect the sensitive files on the External Storage. However, this mechanism is mainly used to protect the app-specific files, and can't support the sharing of sensitive files between trusted apps in a secure and flexible way. In this paper, we present a secure External Storage sensitive file sharing solution named SecureESFS. It first extends a Linux kernel security mechanism named ACL on the SDCardFS filesystem to protect the External Storage. With different ACL policy settings, the user can dynamically share sensitive files between trusted apps according to specific business needs. We also enforce the integrity protection on the ACL policies by checking the hash message authentication codes (HMAC) of these policies. Moreover, we design a transparent encryption mechanism in SecureESFS to protect the sensitive files on the External Storage, when the Android devices are physically accessed by the attackers, such as removing the SD card. For versions lower than Android 10, SecureESFS can provide independent protection and secure sharing for the sensitive files on the External Storage. For versions higher than Android 10, SecureESFS can achieve the secure sharing of sensitive files while Scoped Storage provides protection for the app-specific files. SecureESFS may also be used to enhance the security of the Scoped Storage mechanism. Experiments conducted on a prototype show that SecureESFS works well and incurs acceptable overhead.
Recently malicious code is spreading rapidly due to the use of P2P(peer to peer) file sharing. The malicious code distributed mostly transformed the infected PC as a botnet for various attacks by ...attackers. This can take important information from the computer and cause a large-scale DDos attack. Therefore it is extremely important to detect and block the malicious code in early stage. However a centralized security monitoring system widely used today cannot detect a sharing file on a P2P network. In this paper, to compensate the defect, P2P file sharing events are obtained and the behavior is analyzed. Based on the analysis a malicious file detecting system is proposed and synchronized with a security monitoring system on a virtual machine. In application result, it has been detected such as botnet malware using P2P. It is improved by 12 % performance than existing security monitoring system. The proposed system can detect suspicious P2P sharing files that were not possible by an existing system. The characteristics can be applied for security monitoring to block and respond to the distribution of malicious code through P2P.