Font Size: a A A

Authentication And Authorization Scheme For P2P System

Posted on:2009-10-29Degree:MasterType:Thesis
Country:ChinaCandidate:N WangFull Text:PDF
GTID:2178360245479869Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
Since P2P networks of their own characteristics, so its security problems are complex. Early application of the P2P network did not consider safety factors. It despite its own security mechanisms, but not universal and limited security features. Nowadays most of good P2P network application development platforms only provide some degreed of support to develop secure applications.Therefore, it is necessary to design more excellent P2P network security model. In order to solve P2P file-sharing system of access control and resources credibility problem, this paper presents a distributed trust and authorization model based on JXTA platform. The mechanism conbination of the JXTA group Authentication, PGP trust mechanisms and SPKI to their respective advantages. In this paper include:Firstly, Research P2P network architecture, features and application. Analyze the security of P2P network applications. Sum up the P2P network application security needs. Research the JXTA platform architecture and JXTA platform security.Secondly, Analysis of the existing P2P trust mechanism and SPKI / SDSI dynamic authorization mechanism and point out it's existing problems.Against P2P network authentication and authorization's inadequacies, the paper adopted the PGP model and the SPKI mechanism to solve the integration of P2P file-sharing system security issues, making the expression based on trust and authority certificate is flexible combination of access control mechanism. This paper is designed for trust calculation and query, specific access control processes and certificate chain distributed query.Thirdly, Designed and implemented file-sharing applications based on the JXTA platform and the design of security solutions.Specially, the implementation of authentication, authentication and trust model is presented in detail: including authentication module, trust module and authorization module, and tested the reasonableness of the trust mechanism.
Keywords/Search Tags:Peer-to-Peer, Distributed Authorization, SPKI/SDSI, Trust Model, JXTA
PDF Full Text Request
Related items