Font Size: a A A

A Secure P2p Shared Resources Model And Its Implementation Strategy

Posted on:2007-04-19Degree:MasterType:Thesis
Country:ChinaCandidate:B Z GaoFull Text:PDF
GTID:2208360182496977Subject:Computer software and theory
Abstract/Summary:PDF Full Text Request
Peer-to-Peer Network is very popular in the recent years, and is now the focus ofresearches and attentions. It is applied in many fields, and will be prosperous in thefuture. However, many problems that need to research and resolve earnestly havehappened with the development of Peer-to-Peer Network, security has becoming oneof the most important questions. Because of the own features of Peer-to-peer network,solving the problem becomes much complicated. The early peer-to-peer network didnot consider the question of security seriously;and later the application systems ofsome Peer-to-peer networks do not have the general program, and their functions ofsecurity are great limited, though they have their own security applications. Thepresent development platforms are only to provide some support for the applicationsystems. Authorization management is an important method to realize the TrustManagement. The question of realizing the trust management in the relation ofPeer-to-peer network can be resolved through the effective authority management.The granularity and complexity of the distributed system in peer-to-peer networkmake the design of these security applications of systems and source more difficultand complicated. Thus the thesis focuses on the design of authorization managementmodel of supporting these access control strategies.The main results and innovation are as follows: 1. This thesis explores the system and architecture, characteristics andapplications. It also analyses the security of major functions in peer-to-peer network,infers the general needs of peer-to-peer network applications, and proves that the trustrelation of Peer-to-peer network is the key security needs.2. This thesis comprehensively analyzes the current model of authoritymanagement, explores the systemic structure, algorithm and the relative techniques.3. This thesis raises a new kind of Uniform Authorization Model---P2P-UAM.4. On the platform of JXTA, this model uses the method of Object–Oritented, andrealizes the security model on the base of the trust management system of peer-to-peernetwork. The characters are as following:1) As Its advantage, the model can deal with all kinds of authorizationmanagement and access control, and solve the security questions of dispersiveAuthorization Model in order to realize the Uniform Authorization concerning theuniform authorization questions of database and resource management.2) The peer-to-peer point can dynamically enact the trust management throughadding or quitting, and establishing or destroying the peer-to-peer group, whichdemonstrates the dynamic characteristics of peer-to-peer network.3) Through the effective trust and transmit mechanism, the trust relation can beestablished between the peer-to-peer points even without the direct relation, so as totransfer the authority in the complicated peer-to-peer network environment.4) The free trust management strategy of peer-to-peer points can establish thetrust strategy by itself;it also suits the dynamic characteristics of peer-to-peernetwork.This security model attempts to solve the security questions existing in thepeer-to-peer network, and then acquires certain development. It can also be applied inmany kinds of peer-to-peer network systems. This model can effectively ensure thesecurity of systemic strategies deployments, and succeed in sharing the secureresources.
Keywords/Search Tags:P2P network, Resource Sharing, JXTA platform, uniform authorization model
PDF Full Text Request
Related items