Font Size: a A A

Research On Security Mechanism In P2P Network

Posted on:2008-10-05Degree:MasterType:Thesis
Country:ChinaCandidate:X F BaiFull Text:PDF
GTID:2178360212974707Subject:Communication and Information System
Abstract/Summary:PDF Full Text Request
With the pervasive deployment of computers, P2P is increasingly receiving more and more attention. In a Peer-to-Peer (P2P) network, participants (peers) cooperate to achieve a desired service. The service can, for example, be distributed computing, file-sharing, distributed storage, communication, or real-time media streaming. Ideally, there is no centralized entity to control, organize, administer, or maintain the entire system.Two fundamental problems that confront P2P applications are to efficiently locate the node that stores a particular data item and organize nodes by themselves. In this paper, a distributed hash Table scheme for resource search based on hybrid P2P network(DHH) is proposed, which combines system self-organization scheme and distributed search Chord protocol. The goals of balance load, efficiency, reliability, scalable, and user anonymity can be well accomplished.We believe that DHH scheme may be a valuable component for peer to-peer, large-scale distributed applications such as cooperative file sharing, distributed storage, distributed indices for document and service discovery, and large-scale distributed computing platforms.
Keywords/Search Tags:P2P, super node, Chord, threshold signature scheme
PDF Full Text Request
Related items