Font Size: a A A

Research On Security Mechanism Of The P2P Network Based On TPM

Posted on:2012-03-11Degree:MasterType:Thesis
Country:ChinaCandidate:B ZhuFull Text:PDF
GTID:2178330335468506Subject:Computer software and theory
Abstract/Summary:PDF Full Text Request
The P2P technology already has become a principal mean of information exchange in network's fast development and the popularization. It is a kind of new network construction model based on distributed computing, the main goal of its design exchanges information resources with direct communication between individuals, without relying on a central server as a bridge. P2P technology has been widely used, mainly because it has great advantages about the low-cost,scalability,load balancing autonomy of resolved network in distributed network environment. Due to recognition of certification programs about establishing mutual recognition of reliable information between the network terminals can not be applied to P2P network model, so the authenticity of information can not be guaranteed. Due to autonomous characteristics of P2P network allow any node join and leave, which would be likely to affect the security of the network. Therefore, safe and effective measures should be taken to reduce the harm of malicious nodes on the system. How to build a security P2P network environment is still hot and difficult.In recent years, trusted computing technology is valued by domestic and foreign scholars, especially its remote attestation mechanism issues a new idea to protect the safety of end hosts. The introduction of identity anonymity and integrity proof can effectively solute privacy leaks of the P2P network user node and unreliable of operating platform environment.This paper propos a kind of remote automated trust negotiation attestation mechanism based on trusted computing technology and the ring signature technology. It is used in P2P network model to improve its security and privacy and efficient between network entities mutual authentication. one hand, The hardware level of trusted computing technology and ring signature technology joins the user node in the P2P network can guarantee the information come from the real user entity-Integrity of the entities and authentication protection. The other hand, mutual sharing information between entities also can not be arbitrarily altered. So, a safe efficient and harmonious network environment is created.
Keywords/Search Tags:P2P network, Security, Trusted computing, Ring signature, Remote, attestation, Automated trust negotiation
PDF Full Text Request
Related items