A secure chat application based on pure peer-to-peer architecture

Bibliographic Details
Format: Restricted Document
_version_ 1860797387129225216
building INTELEK Repository
collection Online Access
collectionurl https://intelek.unisza.edu.my/intelek/pages/search.php?search=!collection407072
date 2015-11-18 10:54:58
format Restricted Document
id 12510
institution UniSZA
internalnotes Al-Riyami, S.S. and K.G. Paterson, 2003. Certificateless public key cryptography. Proceedings of the 9th International Conference on the Theory and Application of Cryptology and Information Security, Nov. 30-Dec. 4, Springer Berlin Heidelberg, Taiwan, pp: 452-473. DOI: 10.1007/978-3-540-40061-5_29 Azab, A., P. Watters and R. Layton, 2012. Characterising Network Traffic for Skype Forensics. Proceedings of the 3rd Cybercrime and Trustworthy Computing Workshop, Oct. 29-30, IEEE Xplore Press, Ballarat, pp: 19-27. DOI: 10.1109/CTC.2012.14 Bardis, N.G. and K. Ntaikos, 2008. Design of a secure chat application based on AES cryptographic algorithm and key management. Proceedings of the 10th WSEAS International Conference on Mathematical Methods, Computational Techniques and Intelligent Systems, (TIS’ 08), ACM, USA, pp: 486-491. Baset, S.A. and H.G. Schulzrinne, 2006. An analysis of the skype peer-to-peer internet telephony protocol. Proceedings of the 25th IEEE International Conference on Computer Communications, (CCC’ 06), IEEE Xplore Press, Spain, pp: 1-11. DOI: 10.1109/INFOCOM.2006.312 Daswani, N., H. Garcia-Molina and B. Yang, 2003. Open problems in data-sharing peer-to-peer systems. Proceedings of the 9th International Conference Siena, Jan.8-10, Springer, Italy, pp: 1-15. DOI: 10.1007/3-540-36285-1_1 Eberspächer, J. and R. Schollmeier, 2005. First and second generation of peer-to-peer systems. Peer-toPeer Syst. Appl., 3485: 35-56. DOI: 10.1007/11530657_5 Kundu, A., 2012. Decentralised indexed based peer to peer chat system. Proceedings of the International Conference on Informatics, Electronics and Vision, May 18-19, Dhaka, IEEE Xplore Press, pp: 416-419. DOI: 10.1109/ICIEV.2012.6317378 Li, Z., X. Xu, L. Shi, J. Liu and C. Liang, 2009. Authentication in peer-to-peer network: Survey and research directions. Proceedings of the 3rd International Conference on Network and System Security, Oct. 19-21, IEEE Xplore Press, Gold Coast, pp: 115-122. DOI: 10.1109/NSS.2009.30 Michail, H., A. Milidonis, A. Kakarountas and C. Goutis, 2005. Novel high throughput implementation of SHA-256 hash function through pre-computation technique. Proceedings of the 12th IEEE International Conference on Electronics, Circuits and Systems, Dec. 11-14, IEEE Xplore Press, Gammarth, pp: 1-4. DOI: 10.1109/ICECS.2005.4633433 Vestola, M., 2010. Security issues in structured P2P overlay networks. Helsinki University of Technology. Xu, Z.B. and Z.W. Li, 2010. Efficient and secure certificateless authentication and key agreement protocol for hybrid P2P Network. Proceedings of the 2nd IEEE International Conference on Information Management and Engineering, Apr. 16-18, IEEE Xplore Press, Chengdu, pp: 272-276. DOI: 10.1109/ICIME.2010.5477831
originalfilename 6817-01-FH02-FIK-15-04147.jpg
person norman
recordtype oai_dc
resourceurl https://intelek.unisza.edu.my/intelek/pages/view.php?ref=12510
spelling 12510 https://intelek.unisza.edu.my/intelek/pages/view.php?ref=12510 https://intelek.unisza.edu.my/intelek/pages/search.php?search=!collection407072 Restricted Document Article Journal image/jpeg inches 96 96 norman 771 1431 88 88 2015-11-18 10:54:58 1431x771 6817-01-FH02-FIK-15-04147.jpg UniSZA Private Access A secure chat application based on pure peer-to-peer architecture Journal of Computer Science Chat application is increasingly used as an alternative to older communication technologies such as telephony and telegraph. Equipped with advanced features, people can use it for education, business and socialize. Basic requirement for chatting is an ability to exchange text messages, however, recent releases include support for audio and video communications. For some reasons, peer-to-peer now turned out to be a popular architecture and as such, it becomes a choice for developing chat applications such as Skype. Skype however, makes use of centralized server for user registration, login and buddy list. Indeed, this idea could be disastrous in the event of a compromise. In this study, we proposed a chat application that is based on pure peer-to-peer architecture that totally rid of centralized or third party elements. The system is controlled by the users and its security is autonomously managed by the communicating parties. Each user will have their own database for peer’s profiles and communication parties authenticate among each other before exchanging messages. The main contribution of this paper is a state-of-the-art chat application having completely been designed with build in security measures. 11 5 Science Publications Science Publications 723-729 Al-Riyami, S.S. and K.G. Paterson, 2003. Certificateless public key cryptography. Proceedings of the 9th International Conference on the Theory and Application of Cryptology and Information Security, Nov. 30-Dec. 4, Springer Berlin Heidelberg, Taiwan, pp: 452-473. DOI: 10.1007/978-3-540-40061-5_29 Azab, A., P. Watters and R. Layton, 2012. Characterising Network Traffic for Skype Forensics. Proceedings of the 3rd Cybercrime and Trustworthy Computing Workshop, Oct. 29-30, IEEE Xplore Press, Ballarat, pp: 19-27. DOI: 10.1109/CTC.2012.14 Bardis, N.G. and K. Ntaikos, 2008. Design of a secure chat application based on AES cryptographic algorithm and key management. Proceedings of the 10th WSEAS International Conference on Mathematical Methods, Computational Techniques and Intelligent Systems, (TIS’ 08), ACM, USA, pp: 486-491. Baset, S.A. and H.G. Schulzrinne, 2006. An analysis of the skype peer-to-peer internet telephony protocol. Proceedings of the 25th IEEE International Conference on Computer Communications, (CCC’ 06), IEEE Xplore Press, Spain, pp: 1-11. DOI: 10.1109/INFOCOM.2006.312 Daswani, N., H. Garcia-Molina and B. Yang, 2003. Open problems in data-sharing peer-to-peer systems. Proceedings of the 9th International Conference Siena, Jan.8-10, Springer, Italy, pp: 1-15. DOI: 10.1007/3-540-36285-1_1 Eberspächer, J. and R. Schollmeier, 2005. First and second generation of peer-to-peer systems. Peer-toPeer Syst. Appl., 3485: 35-56. DOI: 10.1007/11530657_5 Kundu, A., 2012. Decentralised indexed based peer to peer chat system. Proceedings of the International Conference on Informatics, Electronics and Vision, May 18-19, Dhaka, IEEE Xplore Press, pp: 416-419. DOI: 10.1109/ICIEV.2012.6317378 Li, Z., X. Xu, L. Shi, J. Liu and C. Liang, 2009. Authentication in peer-to-peer network: Survey and research directions. Proceedings of the 3rd International Conference on Network and System Security, Oct. 19-21, IEEE Xplore Press, Gold Coast, pp: 115-122. DOI: 10.1109/NSS.2009.30 Michail, H., A. Milidonis, A. Kakarountas and C. Goutis, 2005. Novel high throughput implementation of SHA-256 hash function through pre-computation technique. Proceedings of the 12th IEEE International Conference on Electronics, Circuits and Systems, Dec. 11-14, IEEE Xplore Press, Gammarth, pp: 1-4. DOI: 10.1109/ICECS.2005.4633433 Vestola, M., 2010. Security issues in structured P2P overlay networks. Helsinki University of Technology. Xu, Z.B. and Z.W. Li, 2010. Efficient and secure certificateless authentication and key agreement protocol for hybrid P2P Network. Proceedings of the 2nd IEEE International Conference on Information Management and Engineering, Apr. 16-18, IEEE Xplore Press, Chengdu, pp: 272-276. DOI: 10.1109/ICIME.2010.5477831
spellingShingle A secure chat application based on pure peer-to-peer architecture
summary Chat application is increasingly used as an alternative to older communication technologies such as telephony and telegraph. Equipped with advanced features, people can use it for education, business and socialize. Basic requirement for chatting is an ability to exchange text messages, however, recent releases include support for audio and video communications. For some reasons, peer-to-peer now turned out to be a popular architecture and as such, it becomes a choice for developing chat applications such as Skype. Skype however, makes use of centralized server for user registration, login and buddy list. Indeed, this idea could be disastrous in the event of a compromise. In this study, we proposed a chat application that is based on pure peer-to-peer architecture that totally rid of centralized or third party elements. The system is controlled by the users and its security is autonomously managed by the communicating parties. Each user will have their own database for peer’s profiles and communication parties authenticate among each other before exchanging messages. The main contribution of this paper is a state-of-the-art chat application having completely been designed with build in security measures.
title A secure chat application based on pure peer-to-peer architecture
title_full A secure chat application based on pure peer-to-peer architecture
title_fullStr A secure chat application based on pure peer-to-peer architecture
title_full_unstemmed A secure chat application based on pure peer-to-peer architecture
title_short A secure chat application based on pure peer-to-peer architecture
title_sort secure chat application based on pure peer-to-peer architecture