Font Size: a A A

The P2P Searching Technology And Security Research Based On The JXTA

Posted on:2008-07-01Degree:MasterType:Thesis
Country:ChinaCandidate:M Y ZhuFull Text:PDF
GTID:2178360215972093Subject:Computer software and theory
Abstract/Summary:PDF Full Text Request
Since the lawsuit of Napster and the USA disc bring the P2P to people's eyeshot, P2P develops quickly. No need of server is convenient for people, so many applications based on P2P grows quickly. But there are some problems stunting the P2P, i.e. no communications between the applications based on the P2P, they can't share data resource, which leads many repeated work on the same modules.JXTA is a cooperate study project proposed by Sun Microsystems Company in February 2001.It is used to create an common P2P platform, the developers can create some applications and services based on the generic block buildings specified by JXTA, thus the developers needn't repeat the work on the common feature modules of P2P, then they can concentrate on designing high-level application with high expandability, interoperability and usability. JXTA is independent of program language,system platform and network platform, and is hopeful to be a common P2P standard platform in the future.The paper describes the concepts, history, features, applications and the platform of JXTA, and analyzes its advantages. Then the system architecture, the abstract concepts and six basic protocols is introduced. At last, this paper illustrates the discovery mechanism, and discusses the security mechanism.JXTA search network uses the DHT(distributed hashing table) method, which is very complex, low efficiency and difficult to implement. In order to change it and make sufficient use of the rendezvous peer, we proposed a discovery method, which creates a confidence relationship among the peers in the peergroup, search the services Service_Relevance table to find the higher relevant services of the keywords, the search the Peer_Confidence table to find the higher confident peers, then send the requests to these peers.The security of the security mechanism in JXTA is analyzed. In JXTA, the peer can join and leave the network freely, which leads the confidence relationship between pees hard to build, so the CA of the JXTA peergroup is not trusted by the peers in the peergroup. We evaluate the confidence of peers according to the Peer_Confidence table, and choose the peers with the higher public Confidence value as the CA to assure the confidence of the CA.
Keywords/Search Tags:peer-to-peer, JXTA, RPV, search, CA, security
PDF Full Text Request
Related items