Home
Research
People
Join Us
Visit Us
Contact Us
|
Protected Client-to-Client Data Sharing
Data sharing under the client-server model can suffer badly
when a large number of clients access a server.
This bottleneck can be addressed by enabling peer-to-peer
data sharing between clients, usually with incentives.
However, in this "hybrid data sharing paradigm,"
it is challenging to find the "right" peer clients to share data with,
and peer clients could be selfish, distrustful, and even malicious.
We designed and developed the mSSL framework that
encompasses a set of security and incentive functionalities
for hybrid data sharing. Earlier we have also invented
the Revere overlay structure that finds
the right peer clients to quickly, reliably, and securely
disseminate security updates (e.g. an early attack warning).
Here are our selected presentations:
Our publications include the following:
mSSL
- Jun Li, "mSSL: A framework for trusted and incentivized peer-to-peer data sharing
between distrusted and selfish clients,"
Peer-to-Peer Networking and Applications (2010): 1-21,, July 13, 2010.
DOI: 10.1007/s12083-010-0087-x.
(Also available at
http://www.springerlink.com/index/U78857X37547568N.pdf.)
- Jun Li and Xun Kang,
"mSSL: Extending SSL to support data sharing among collaborative clients,"
in Annual Computer Security Applications Conference,
Tucson, Arizona, December 2005, pp. 357-368, acceptance rate 22.8% (45/197).
- Jun Li, "Data integrity and proof of service in Bittorrent-like P2P environments,"
IAnewsletter, Information Assurance Technology Analysis Center,
vol. 9, no. 4, pp. 16-19, Winter 2006.
- Jun Li and Xun Kang,
"mSSL: Securely sharing data from a server among clients,"
in Workshop on Information Security Applications,
August 2004, pp. 567-570 (short paper).
- Jun Li and Xun Kang,
"Proof of service in a hybrid P2P environment,"
in Springer LNCS 3759 of the International Workshop on Applications and Economics of Peer to Peer Systems,
November 2005, pp. 64-73, acceptance rate 8% (10/125).
Revere
- Jun Li, Peter Reiher, Gerald Popek.
Disseminating Security Updates at Internet Scale,
Kluwer Academic Publishers, Boston, November 2002, 174 pages, ISBN 1-4020-7305-4.
- Jun Li, Peter Reiher, and Gerald Popek.
"Resilient self-organizing overlay networks for security update delivery,"
IEEE Journal on Selected Areas in Communications, Special Issue on Service Overlay Networks,
vol. 22, no. 1, pp. 189-202, January 2004.
- Jun Li, Revere--Delivering Security Updates At Internet Scale,
Ph.D. thesis, UCLA Computer Science Department, June 2002. Advisors: Peter Reiher and Gerald Popek.
- Jun Li, Peter L. Reiher, and Gerald J. Popek,
"Securing information transmission by redundancy,"
in ACM New Security Paradigms Workshop,
Ontario, Canada, September 1999, pp. 112-117, acceptance rate 35%.
A best paper and selected as a highlight for 22nd National Information Systems Security Conference.
- Peter Reiher, Jun Li, and Gerald Popek,
"Securing information transmission by redundancy,"
in The 22nd National Information Systems Security Conference,
Washington D.C., October 1999, Presentation at the panel
"Themes and Highlights of the New Security Paradigms Workshop 1999."
- Adam Rosenstein, Jun Li, and Siyuan Tong.
"MASH: The multicasting archie server hierarchy,"
ACM SIGCOMM Computer Communication Review, vol. 27, no. 3, pp. 5-13, July 1997.
- Jun Li, Mark D. Yarvis, and Peter L. Reiher,
"Securing distributed adaptation,"
in the Fourth IEEE Conference on Open Architectures and Network Programming (OPENARCH 2001),
Anchorage, Alaska, April 2001, pp. 71-82, acceptance rate 21%.
A best paper and its extended version selected for journal publication.
- Jun Li, Mark D. Yarvis, and Peter L. Reiher.
"Securing distributed adaptation,"
Computer Networks, Special Issue on Programmable Networks,
vol. 38, no. 3, pp. 347-371, February 2002.
|