Font Size: a A A

Research On Resource Location Technology Of Peer-to-peer File System

Posted on:2011-10-29Degree:MasterType:Thesis
Country:ChinaCandidate:X C MoFull Text:PDF
GTID:2178330332960258Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
With the popularization of Internet, by its low cost and excellent performance, the P2P technology is getting more and more attention. Until now, although many types of system based on P2P has been developed, but the most popular P2P application is still in the domain of P2P file system. As one of the most important technology of P2P file system, the resource location technology has been the focal point of researches in a long time.Now the P2P file system has been evolution into third generation, the full distributed structured network based on DHT. Based on the pervious research result, in this thesis we analyzed the kademlia resource location model in the aspect of security. The main content of this thesis are as follows.The first part of this thesis analyzes the weakness of kademlia's resource location model, and studies various kinds of attacks toward the kademlia network, and classified these attacks by the vulnerability they used. Including node inserting attack, resource publishing attack, sybil attack, eclipse attack, churn attack, and the DDoS attack. Based on the study of attacks, we discussed about the solutions now existed.The second part we present a comprehensive solution to the kademlia resource location model. Improved the security level of the protocol from the aspect of id assignment and secure routing table. Experiments show that the solution can effectively improve the ratio of look up operation, and enhance the resistance to the routing table position attack.To sum up, based on researching and summarizing the analysis technology of P2P file system resource location model, we focused studied the kademlia on the aspect of security, analyzed various attack may happing in the resource location procedure, and present a security improvement solution. Finally in experiments we validate the feasibility of our solution and point out its weakness.
Keywords/Search Tags:Kademlia, P2PResource Location, DHT Routing Attacking, Secure ID Assignment, Disjoint Redundant Path
PDF Full Text Request
Related items