A Secure Chat Application Based on Pure Peer-to-Peer Architecture
نویسندگان
چکیده
Corresponding Author: Mohamad Afendee Mohamed Faculty of Informatics and Computing, Universiti Sultan Zainal Abidin, Kuala Terengganu, Malaysia Email: [email protected] Abstract: Chat application is increasingly used as an alternative to older communication technologies such as telephony and telegraph. Equipped with advanced features, people can use it for education, business and socialize. Basic requirement for chatting is an ability to exchange text messages, however, recent releases include support for audio and video communications. For some reasons, peer-to-peer now turned out to be a popular architecture and as such, it becomes a choice for developing chat applications such as Skype. Skype however, makes use of centralized server for user registration, login and buddy list. Indeed, this idea could be disastrous in the event of a compromise. In this study, we proposed a chat application that is based on pure peer-to-peer architecture that totally rid of centralized or third party elements. The system is controlled by the users and its security is autonomously managed by the communicating parties. Each user will have their own database for peer’s profiles and communication parties authenticate among each other before exchanging messages. The main contribution of this paper is a state-of-the-art chat application having completely been designed with build in security measures.
منابع مشابه
Scalable and Secure Peer-to-Peer Systems with Support for QoS
Secure communication architecture is client-server based and not peer-to-peer based. NATs and firewalls tamper with or inspect data packets and that runs afoul with security protocols, such as IPSec and SSL/TLS. Client-server based architecture is not suitable for very high data rates when the server becomes a bottleneck in the communication. This architecture is not scalable and a single point...
متن کاملApplication of a Heuristic Cybernetic Model in Peer-reviewing Process of Scholarly Papers
Background and Aim: This study attempts to show the cybernetics approach on peer reviewing articles to recommend an appropriate solution for increasing the qualitative level of published articles in scientific journals. Method: Heuristic Cybernetics method is suggested, based on the scientific experiences of related researches and also the mathematical principles that is an appropriate formed s...
متن کاملA generic P2P architecture for anonymous services
Peer-to-peer systems exhibit, due to their decentralized structure, interesting anonymity properties and are therefore often used as a supporting service for anonymous applications. Unfortunately, there is currently no overall framework that captures the various peer-to-peer models and their specific features to guide the development of anonymous applications. This paper presents a generic and ...
متن کاملSecuring Resources in Collaborative Environments: A Peer-to-Peer Approach
We have developed a security model that facilitates control of resources by autonomous peers who act on behalf of collaborating users. This model allows a gradual build-up of trust. It enables secure interactions among users that do not necessarily know each other and allows them to build trust over the course of their collaboration. This paper describes various aspects of our security model an...
متن کاملPOST: A Secure, Resilient, Cooperative Messaging System
POST is a decentralized messaging infrastructure that supports a wide range of collaborative applications, including electronic mail, instant messaging, chat, news, shared calendars and whiteboards. POST is highly resilient, secure, scalable and does not rely on dedicated servers. Instead, POST is built upon a peer-to-peer (p2p) overlay network, consisting of participants’ desktop computers. PO...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- JCS
دوره 11 شماره
صفحات -
تاریخ انتشار 2015