Font Size: a A A

Research And Implementation Of Secure Backup System Based On P2P Network

Posted on:2011-12-29Degree:MasterType:Thesis
Country:ChinaCandidate:W J LiFull Text:PDF
GTID:2178330338485457Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
Backup and recovery are considered as the last line of defence for ensuring information security, and take on very important status in the whole information guarantee architecture. With the prevalence of network technology and the growing scale of network applications, the informationization degree of the enterprise is being enhanced, and enterprises greatly depend on the computer data. This requires a higher storage reliability. The P2P architecture has advantages in reliability, destruction-resistant of whole system, running efficiency, and economy, compared with traditional C/S(client/server) architecture. In this paper, the author design and realize a backup system based on P2P technique. The realization accords to the requirements in backup and recovery, and bases on the theory of distributed backup service. The author makes research on key technologies relevant with backup system. The main work of this dissertation is as follows:The author studies and discusses the basic theory in data backup and recovery type, backup mode, network storage technology, P2P network technology, etc. A total design and initial realization of backup and recovery system is presented.Peer cluster collaboration policy and copy dispatch based on file division are two key problems studied in this paper. To the problems, the author presents a peer cluster collaboration policy based on schedule. Based on peer choice policy relevant with copy dispatch, the author gives a method of choosing candidate peer. Besides, the author also utilizes the PeerSim simulation tool to verify the presented policy and method.Th author analyses the security demand in backup and recovery system, and gives a method to solve the safety problem based on PKI technology to satisfy authentication among peers and RSA-HMAC technique to validate data integrity.
Keywords/Search Tags:Backup, P2P, Schedule, replica, security
PDF Full Text Request
Related items