This preview shows pages 1–2. Sign up to view the full content.
This preview has intentionally blurred sections. Sign up to view the full version.View Full Document
Unformatted text preview: o Anonymity for producers and consumers of information (Privacy) o Deniability for storers of information (Privacy) Topic 2: Architecture Big picture o Cooperative distributed file system o Each node local datastore o Location independence o Lazy replication o Share unused disk space (for users) o Routing (adaptive): Requests -> nodes (local decision about where to send requests next) o Hops-to-live: prevent infinite chains 2 Keys and searching o File IDs: binary file keys o 160-bit SHA-1 o Keyword-signed key (KSK) -Keywords = string -> [generate key pairs] -> public/private key -Public key -> [hash function] -> file key -Private key, file -> [sign the file] (Why? integrity check) -Encryption: file, string -> [encryption] o How to share? Use the string (keywords) o Flat global namespace: problem? Solution? Use personal namespace...
View Full Document
This note was uploaded on 12/07/2011 for the course COMP 7370 taught by Professor Qin,x during the Summer '08 term at Auburn University.
- Summer '08