Indexed by:
Abstract:
The adoption of protection routing guarantees the existence of a loop-free alternate path for packet forwarding when a single link or node failure occurs. By Tapolcai's method, the presence of two completely independent spanning trees (CISTs for short) suffices to configure a protection routing. This article extends the idea of protection routing to involve more CISTs and attach a secure mechanism in the configuration, which we call the secure multi-protection routing scheme (SMPR-scheme). Then, we use the SMPR-scheme to deal with privacy-preserving data transmissions, such as downloading personal medical records, tax bills, or other private information. To evaluate the effectiveness of the SMPR-scheme, we develop a probabilistic model that allows some malicious nodes to collect information illegally through neighboring access. We experimented with SMPR-scheme on the BCube (i.e., the generalized hypercube) datacenter network. Simulation results show that data transmission using SMPR-scheme ensures confidentiality (i.e., no node other than the recipient can receive the complete message) and effectively resists privacy collection even under malicious infringement. (C) 2022 Elsevier Inc. All rights reserved.
Keyword:
Reprint 's Address:
Version:
Source :
JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING
ISSN: 0743-7315
Year: 2022
Volume: 167
Page: 222-231
3 . 8
JCR@2022
3 . 4 0 0
JCR@2023
ESI Discipline: COMPUTER SCIENCE;
ESI HC Threshold:61
JCR Journal Grade:2
CAS Journal Grade:2
Cited Count:
SCOPUS Cited Count:
ESI Highly Cited Papers on the List: 0 Unfold All
WanFang Cited Count:
Chinese Cited Count:
30 Days PV: 4
Affiliated Colleges: