dc.contributor.author |
Haraty, Ramzi A. |
|
dc.contributor.author |
Zantout, Bassem |
|
dc.date.accessioned |
2017-02-01T07:51:16Z |
|
dc.date.available |
2017-02-01T07:51:16Z |
|
dc.date.copyright |
2015 |
en_US |
dc.date.issued |
2017-02-01 |
|
dc.identifier.issn |
0747-5632 |
en_US |
dc.identifier.uri |
http://hdl.handle.net/10725/5132 |
|
dc.description.abstract |
The paper introduces a new collaborative technique for assuring data integrity while avoiding traffic
analysis and other types of similar attacks (e.g., man-in-the-middle, data source fingerprinting, etc.).
The new technique utilizes a quorum based approach to allow the client to validate the authenticity of
the received data at his/her end by comparing different copies of the data. Similar to a reputation system,
the new approach relies on the feedback of end-user communication experiences as well as a centralized
entity to determine the trustfulness of nodes in the system. The new approach also is a hybrid of centralized
and decentralized system that will help in keeping the system ‘alive’ to prevent different types of
attacks that are carried out on centralized and decentralized peer-to-peer systems. The technique also
accomplishes data transfer from source to destination using a distributed system, encryption, and a relatively
new way for communication amongst system components. |
en_US |
dc.language.iso |
en |
en_US |
dc.title |
A collaborative-based approach for avoiding traffic analysis and assuring data integrity in anonymous system |
en_US |
dc.type |
Article |
en_US |
dc.description.version |
Published |
en_US |
dc.author.school |
SAS |
en_US |
dc.author.idnumber |
199729410 |
en_US |
dc.author.department |
Computer Science and Mathematics |
en_US |
dc.description.embargo |
N/A |
en_US |
dc.relation.journal |
Computers in Human Behavior |
en_US |
dc.journal.volume |
51 |
en_US |
dc.article.pages |
780-791 |
en_US |
dc.keywords |
Data integrity |
en_US |
dc.keywords |
Traffic analysis |
en_US |
dc.keywords |
Collaboration |
en_US |
dc.identifier.doi |
http://dx.doi.org/10.1016/j.chb.2014.09.031 |
en_US |
dc.identifier.ctation |
Haraty, R. A., & Zantout, B. (2015). A collaborative-based approach for avoiding traffic analysis and assuring data integrity in anonymous systems. Computers in Human Behavior, 51, 780-791. |
en_US |
dc.author.email |
rharaty@lau.edu.lb |
en_US |
dc.identifier.tou |
http://libraries.lau.edu.lb/research/laur/terms-of-use/articles.php |
en_US |
dc.identifier.url |
http://ac.els-cdn.com/S074756321400483X/1-s2.0-S074756321400483X-main.pdf?_tid=a1e09394-e852-11e6-b638-00000aab0f6c&acdnat=1485935408_366c8e33e206dcbb11a737916f518f37 |
en_US |
dc.orcid.id |
https://orcid.org/0000-0002-6978-3627 |
|
dc.author.affiliation |
Lebanese American University |
en_US |