Font Size: a A A

P2p Authentication And Authorization System

Posted on:2007-12-18Degree:MasterType:Thesis
Country:ChinaCandidate:Y B LiFull Text:PDF
GTID:2208360185453563Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
With the development of the Internet, Peer-to-Peer network, which is one of the most important distributed technologies, has increasingly been put into use in many fields such as CSCW(Computer Supported Cooperative Work), file sharing and P2P computing. More and more attention being paid to P2P network, the security issues are unfortunately one of the most important factors that put off the development of P2P network, including authentication, authorization, audition, encryption, safe communication, non-repudiation and so on. Being the most basically methods, authentication and access are laid the foundation of other security techniques. Compared with traditional C/S system, P2P network has more complexity of the two techniques owing to its particularity and widely connection. For it has same weakness and problems as what generic network has, people are trying to find a better way to authenticate to keep away from big troubles of network security.This paper deals mainly with some current protocols of network authentications and characteristics in P2P system. And a new model and its implementation, named P2PATC, isproposed in this paper to offer P2P authentication and authorization. Following are themain achievements:It discusses in detail the advantages and disadvantages of popular authenticationprotocols and access control models, including X.509 Certificate, Kerberos V,challenge-response authentication and Role-based access control (RBAC).It gives the Solution P2PATC, which uses for references of those protocols andmodels. With a RBAC-liked policy and a Granting-Ticket of Kerberos, P2PATC has builtup a secure Peer-To-Peer communication.At last, a simple testing program was put forward to prove in part that the model canprovide stronger security from peer to peer.
Keywords/Search Tags:Peer-to-Peer, Network Security, Identity Authentication, Authorization
PDF Full Text Request
Related items