Indexed by:
Abstract:
The adoption of protection routing guarantees the existence of a loop-free alternate path for packet forwarding when a single link or node failure occurs. By Tapolcai's method, the presence of two completely independent spanning trees (CISTs for short) suffices to configure a protection routing. This article extends the idea of protection routing to involve more CISTs and attach a secure mechanism in the configuration, which we call the secure multi-protection routing scheme (SMPR-scheme). Then, we use the SMPR-scheme to deal with privacy-preserving data transmissions, such as downloading personal medical records, tax bills, or other private information. To evaluate the effectiveness of the SMPR-scheme, we develop a probabilistic model that allows some malicious nodes to collect information illegally through neighboring access. We experimented with SMPR-scheme on the BCube (i.e., the generalized hypercube) datacenter network. Simulation results show that data transmission using SMPR-scheme ensures confidentiality (i.e., no node other than the recipient can receive the complete message) and effectively resists privacy collection even under malicious infringement. © 2022 Elsevier Inc.
Keyword:
Reprint 's Address:
Email:
Source :
Journal of Parallel and Distributed Computing
ISSN: 0743-7315
Year: 2022
Volume: 167
Page: 222-231
3 . 8
JCR@2022
3 . 4 0 0
JCR@2023
ESI HC Threshold:61
JCR Journal Grade:2
CAS Journal Grade:2
Cited Count:
WoS CC Cited Count: 0
SCOPUS Cited Count: 5
ESI Highly Cited Papers on the List: 0 Unfold All
WanFang Cited Count:
Chinese Cited Count:
30 Days PV: 2
Affiliated Colleges: