JISE


  [1] [2] [3] [4] [5] [6] [7] [8] [9] [10] [11] [12] [13] [14] [15] [16] [17] [18]


Journal of Information Science and Engineering, Vol. 31 No. 4, pp. 1169-1184


 

Self-destructing Instant Messages by Employing KAD DHT Network


YUHUI DENG1,2, ZHEN ZHANG1, ZHIKE CHEN1 AND LIJUAN LU3 
1Department of Computer Science 
Jinan University 
Guangzhou, 510632 P.R. China 
2State Key Laboratory of Computer Architecture 
Institute of Computing Technology 
Chinese Academy of Sciences 
Beijing, 100190 P.R. China. 
3School of Business Administration 
South China University of Technology 
Guangzhou, 510640 P.R. China 
E-mail: {tyhdeng; zzhang}@jnu.edu.cn


    Privacy protection is becoming more and more important due to the ubiquitous access to information. Distributed Hash Tables (DHTs) are widely used by peer-to-peer networks with more than one million concurrently active users. This paper proposes and designs a web based self-Destructing Instant Messenger (DIM) on eMule KAD DHT network in China without any involvement of users and trusted systems, thus protecting the privacy of instant messages. Comprehensive experiments are performed to evaluate the features of eMule KAD DHT network and analyze the impacts of the features on the DIM. Experimental results reveal that the lifespan of data objects in the eMule KAD network in China is much shorter than that defined by the KAD protocol, and the pattern of eMule peers in China has a significant impact on the behavior of DIM. Furthermore, an approach of prstoring subkeys is designed to eliminate the overhead involved in the distribution and retrieving of subkeys, thus optimizing the performance of DIM.


Keywords: self-destructing, data privacy, instant messages, DHT, P2P

  Retrieve PDF document (JISE_201504_01.pdf)