Font Size: a A A

Access Control Model Research Based On Trust-domain In P2P Environment

Posted on:2007-03-23Degree:MasterType:Thesis
Country:ChinaCandidate:G Z ZhangFull Text:PDF
GTID:2178360185451584Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
As a modern as well as traditional technology, P2P (peer to peer) has showed new application in the fields of resource sharing and cooperation, and has become another starting point in Internet. This technology, however, has serious problems as for Internet security, especially about trust management and access control.Traditional access control based on authentication, while the characteristics of P2P network made this approach impractical, so the access control based on PKI (Public Key Infrastructure) certificates management cannot be applied well in P2P environment. Considering the network environment of P2P, this thesis constructs a model different from the traditional. This model applies present trust evaluation system to evaluate P2P nodes, then based on this result, it divides trust domain. Combined with RBAC (Role based access control), the model assign each trust domain a role, and grant trust authorization to the roles to finish the whole process from user's request to role authorization. The algorithm and methods used in this process are simple and feasible enough to realize complete combination between trust management and access control.This thesis, at first, put forward Trust Authorization Model based on combination of trust domain and RBAC. This model makes up the shortcoming of traditional model, i.e. trust management finding no way to combine with access control, so the realization from trust management and access control has become feasible. This model can be integrated into every application of P2P, and its access control strategies are also flexible and practical. Second, Design the basic frame of trust model, and define trust domain and transition rule. Design the trust model's general frame, each part, and structure and function of each part. Design authorization certificate, role certificate and model's work flow. Last, Analyzing and simulating of the model.
Keywords/Search Tags:P2P, access control, trust management, trust-domain, certificates
PDF Full Text Request
Related items