Font Size: a A A

Research And Design Of The P2P Secure Model Based On The Secure Peer Group

Posted on:2008-04-24Degree:MasterType:Thesis
Country:ChinaCandidate:L YuanFull Text:PDF
GTID:2178360272467747Subject:Communication and Information System
Abstract/Summary:PDF Full Text Request
The appearance of the P2P technology enables the free communications between the user peers in the internet. Each user peer could respond to the requests from the other peers, and also could search the resources and services wanted from the other peers, which achieves the widely net computer resources sharing. But with the P2P technology widely used in different areas, the secure problem about it draws the attentions of the most people.In the P2P network, every user peer could join and quit at any time, which brings instabilities. A method to improve this problem is to create a secure peer group. Secure peer group could bring a relative stable environment, area management and the decrease of the cost of the network supervise, which could well improve the secure problem.By analyzing and comparing the architectures of the P2P network, designs an improved network architecture with more security and flexibility, which could creates a good environment for the secure peer group to run in.Because of the well supports to the P2P network and the good effects on the secure part, JXTA is selected to be the platform where the secure model based on. The secure model could be dispersed into two parts: peer group part and peer part. Based on the JXTA, the five modules in the two pars of the secure model, the creation of the peer group, the authentications module, the search of the peer group, the joining into the peer group, communication protocol between the peers in the peer group, could be designed and achieved well. With all the modules worked together, it could create a relative stable environment.To the secure management module in the peer group, from three parts it could be designed and achieved based on the JXTA: message encryption, digital signature, management based on reputation. In the message encryption and digital signature parts, RC4 and RSA arithmetic were used. In the reputation management part, improve the secure by filtering the spam link through the combination of the reputation and the reputation threshold. By simulations and tests, we could find that the secure management module in the peer group is effective and can be used widely.
Keywords/Search Tags:P2P, JXTA, Secure peer group, Network modle
PDF Full Text Request
Related items