Font Size: a A A

Research On The Security Management In P2P Network Based On JXTA

Posted on:2009-06-08Degree:MasterType:Thesis
Country:ChinaCandidate:W H LiuFull Text:PDF
GTID:2178360248454790Subject:Computer applications
Abstract/Summary:PDF Full Text Request
P2P network technology is one of the new four applications in future internet, which also is one the computer networks research in hotspot field. The highly dynamic, autonomy and heterogeneity of P2P conduce to unreliable quality of service and numbers of frauds. Especially, the security issues of P2P networks restrict its broad application.To solve P2P security issues, Intel, Microsoft, SUN and other international well-known companies have put forward different solutions. Intel provides the tool kit "Trusted Library kit" which can facilitate the use of traditional C/C++ languages developers; Microsoft's security tools limit to .Net framework, which is mainly for the development of portable applications of P2P; the "JXTA" technology, developed by SUN, is based on Java platform. With interoperability, platform-independent and universality, "JXTA" provides core support to the P2P services and applications.Based on P2P networks security models' study, a P2P security model, JXTA technology used and on the basis of Trust and reputation, is brought forward.. The simulation experiments show the correctness and effectiveness of this model.This paper's major work includes the followings:Firstly, Study P2P network architecture, features and applications; sum up the general application of P2P network security requirements by analysis of P2P networks safe mode.Secondly, lucubrate the architecture, core technology and security agreement of JXTA platform; analyze the JXTA platform in security on the edge; conclude the characteristics of P2P networks in the trust relations.Thirdly, after in-depth study of theory, put forward a P2P network security model based on trust and reputation; list the details of the entire structure and function illustration of the model; carry out the main features of the model in JXTA platform.Fourthly, constructing simulation environment, analyze the performance of the model for network security issues in different settings.
Keywords/Search Tags:P2P Network, JXTA, Security Model, Trust and Reputation
PDF Full Text Request
Related items