Font Size: a A A

Research And Design Of Athentication And Authorization System In P2P Based On CPK

Posted on:2011-12-28Degree:MasterType:Thesis
Country:ChinaCandidate:Z P LuFull Text:PDF
GTID:2178360305462148Subject:Computer system architecture
Abstract/Summary:PDF Full Text Request
P2P which is as an important distributed technology has more and more applications in many fields with the development of the Internet. These fields including file sharing, peer-to-peer computing, computer supported cooperative work, etc. Although more and more attention is being paid to the P2P networks at present, the security issues are unfortunately one of the most important factors that put off the development of P2P networks, including authentication, authorization, encryption, safe communication and non-repudiation. Authentication and authorization are the most fundamental methods which are the foundation of other security techniques.Compared with C/S System, P2P network has more complexity of the authentication and authorization techniques, meanwhile it has the same weakness and problems as what generic network has. Owing to its particularity and wide connection, authentication and authorization in P2P network are meeting enormous challenges, because a good way to solve those problems has not been developed yet. Communications between peers without strict authentication and authorization threaten the security of networks. Therefore, a better model to solve the two problems must be proposed on the way of P2P development.After analyzing some current protocols of network authentications and the characteristics in P2P networks, we propose a new model named P2PIBAS. This thesis discusses the security requirement of P2P network, and investigates the new authenticating algorithm Combined Public Key and the Role-based access control model. In the end, it designs and implements P2PIBAS, which can solve the authentication and authorization problems in P2P network by rejecting the illegal access. P2PIBAS provides a sample model for solving the security problems of P2P network.
Keywords/Search Tags:P2P network, network security, authentication, authorization, CPK
PDF Full Text Request
Related items