CFiTT -腐败免费文件传输技术

A. Sultana, M.F. Bashir, M. Qadir
{"title":"CFiTT -腐败免费文件传输技术","authors":"A. Sultana, M.F. Bashir, M. Qadir","doi":"10.1109/ICIET.2007.4381319","DOIUrl":null,"url":null,"abstract":"Communication is one of the basic necessities of human beings. File transfer is one of the basic forms of communication. Reliability is the key issue raised due to complex nature of network and growth of computer science. In this paper we have devised a technique for file transfer which identifies whether some portion of the file is received corrupt or not, and if yes then exactly what portion is corrupt. This technique provides reliability by eliminating the corruption from a file, hence requiring less bandwidth of the network by reducing the amount of data to be re-sent in case of corruption. The reliability is ensured with the help of file signature generation method which we have devised in this paper. The beauty of this technique that it generates hashes which are not easy to break, hence ensuring security of the file. We have used TCP as the underlying protocol, whereas TCP is already considered to be reliable, but the fact is that it does not ensure the reliable transfer over the network due to the fact that it uses CRC which is still vulnerable to network conditions and malicious attacks. Our technique operates at the application layer and tries to finish the cope up with the reliability over the file transfer. We have also developed a prototype to test the integrity of our technique. Empirical results ensure the reliability of our technique. The emphasis of this paper is to provide users with the corrupt free file transfer over the network, so that their time and valuable resources might be saved.","PeriodicalId":167980,"journal":{"name":"2007 International Conference on Information and Emerging Technologies","volume":"38 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2007-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"CFiTT - corrupt free file transfer technique\",\"authors\":\"A. Sultana, M.F. Bashir, M. Qadir\",\"doi\":\"10.1109/ICIET.2007.4381319\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Communication is one of the basic necessities of human beings. File transfer is one of the basic forms of communication. Reliability is the key issue raised due to complex nature of network and growth of computer science. In this paper we have devised a technique for file transfer which identifies whether some portion of the file is received corrupt or not, and if yes then exactly what portion is corrupt. This technique provides reliability by eliminating the corruption from a file, hence requiring less bandwidth of the network by reducing the amount of data to be re-sent in case of corruption. The reliability is ensured with the help of file signature generation method which we have devised in this paper. The beauty of this technique that it generates hashes which are not easy to break, hence ensuring security of the file. We have used TCP as the underlying protocol, whereas TCP is already considered to be reliable, but the fact is that it does not ensure the reliable transfer over the network due to the fact that it uses CRC which is still vulnerable to network conditions and malicious attacks. Our technique operates at the application layer and tries to finish the cope up with the reliability over the file transfer. We have also developed a prototype to test the integrity of our technique. Empirical results ensure the reliability of our technique. The emphasis of this paper is to provide users with the corrupt free file transfer over the network, so that their time and valuable resources might be saved.\",\"PeriodicalId\":167980,\"journal\":{\"name\":\"2007 International Conference on Information and Emerging Technologies\",\"volume\":\"38 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2007-07-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2007 International Conference on Information and Emerging Technologies\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICIET.2007.4381319\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2007 International Conference on Information and Emerging Technologies","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICIET.2007.4381319","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1

摘要

交流是人类的基本必需品之一。文件传输是通信的基本形式之一。由于网络的复杂性和计算机科学的发展,可靠性问题日益突出。在本文中,我们设计了一种文件传输技术,该技术可以识别文件的某些部分是否收到损坏,如果是,则确切地确定哪些部分损坏。这种技术通过消除文件的损坏提供了可靠性,从而减少了在损坏情况下需要重新发送的数据量,从而减少了网络带宽。利用本文设计的文件签名生成方法,保证了系统的可靠性。这种技术的美妙之处在于它生成的哈希值不易被破坏,从而确保了文件的安全性。我们已经使用TCP作为底层协议,而TCP已经被认为是可靠的,但事实是,它并不能保证在网络上可靠的传输,因为它使用的是CRC,这仍然容易受到网络条件和恶意攻击。我们的技术在应用层操作,并试图完成处理文件传输的可靠性。我们还开发了一个原型来测试我们技术的完整性。实证结果保证了该方法的可靠性。本文的重点是为用户提供免费的网络文件传输,从而节省用户的时间和宝贵资源。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
CFiTT - corrupt free file transfer technique
Communication is one of the basic necessities of human beings. File transfer is one of the basic forms of communication. Reliability is the key issue raised due to complex nature of network and growth of computer science. In this paper we have devised a technique for file transfer which identifies whether some portion of the file is received corrupt or not, and if yes then exactly what portion is corrupt. This technique provides reliability by eliminating the corruption from a file, hence requiring less bandwidth of the network by reducing the amount of data to be re-sent in case of corruption. The reliability is ensured with the help of file signature generation method which we have devised in this paper. The beauty of this technique that it generates hashes which are not easy to break, hence ensuring security of the file. We have used TCP as the underlying protocol, whereas TCP is already considered to be reliable, but the fact is that it does not ensure the reliable transfer over the network due to the fact that it uses CRC which is still vulnerable to network conditions and malicious attacks. Our technique operates at the application layer and tries to finish the cope up with the reliability over the file transfer. We have also developed a prototype to test the integrity of our technique. Empirical results ensure the reliability of our technique. The emphasis of this paper is to provide users with the corrupt free file transfer over the network, so that their time and valuable resources might be saved.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信