Previous [ 1] [ 2] [ 3] [ 4] [ 5] [ 6] [ 7] [ 8] [ 9] [ 10] [ 11] [ 12] [ 13] [ 14] [ 15] [ 16] [ 17] [ 18]


Journal of Information Science and Engineering, Vol. 31 No. 4, pp. 1169-1184 (July 2015)

Self-destructing Instant Messages by Employing KAD DHT Network*

1Department of Computer Science
Jinan University
Guangzhou, 510632 P.R. China
2State Key Laboratory of Computer Architecture
Institute of Computing Technology
Chinese Academy of Sciences
Beijing, 100190 P.R. China.
3School of Business Administration
South China University of Technology
Guangzhou, 510640 P.R. China
E-mail: {tyhdeng; zzhang}

Privacy protection is becoming more and more important due to the ubiquitous access to information. Distributed Hash Tables (DHTs) are widely used by peer-to-peer networks with more than one million concurrently active users. This paper proposes and designs a web based self-Destructing Instant Messenger (DIM) on eMule KAD DHT network in China without any involvement of users and trusted systems, thus protecting the privacy of instant messages. Comprehensive experiments are performed to evaluate the features of eMule KAD DHT network and analyze the impacts of the features on the DIM. Experimental results reveal that the lifespan of data objects in the eMule KAD network in China is much shorter than that defined by the KAD protocol, and the pattern of eMule peers in China has a significant impact on the behavior of DIM. Furthermore, an approach of prstoring subkeys is designed to eliminate the overhead involved in the distribution and retrieving of subkeys, thus optimizing the performance of DIM.

Keywords: self-destructing, data privacy, instant messages, DHT, P2P

Full Text () Retrieve PDF document (201507_01.pdf)

Received August 31, 2014; accepted January 15, 2015.
Communicated by Chien-Chang Chen, Chih-Chien Wang and Yean-Fu Wen.