Font Size: a A A

Based On Jxta P2p Security Model And Its Applications

Posted on:2007-04-05Degree:MasterType:Thesis
Country:ChinaCandidate:Y LiFull Text:PDF
GTID:2208360185969768Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
The technology of Peer to Peer(P2P)is a new network model risen recently. Comparing with the traditional network model of C/S, P2P network can perfectly realize the share of computer resources and services and increase their utilities and make for their low cost to publish quickly.The flexibility that constructed in P2P application platform and the freedom that entity can join and leave at lead that the application platform can't ask the entity to provide the pivotal authentication information. It can only login in and register the entity but not certify it strictly. These applications don't fit to the authentication technology based on PKI and digital certificate. Therefore, one mode that adopted at large is based on a recommendation mechanism that group information can share the evaluation and feedback.JXTA is one of developed platform for P2P application. It is a set of protocols separated on programming language, systemic platform and network platform. The secure model in my paper is a service system based on sets of JXTA protocols and applied in distribution of peergroup. On the base of evaluation and feedback mechanism, it accedes to the JXTA membership protocol and mechanism of trust relationship model in Poblano so that this secure model can be improved. It consists of three parts: membership authentication, selection of trust node and evaluate feedback. Firstly, apply for the membership protocol to the node who wants to join the service group and use the service. Then the node described at upper step compares the credence value of all of the nodes in this group and choose one node which owns better credence value to communicate with for service. At last, after completing the service usage, the node has to give a feedback value to the service provider about its service quality. This feedback must integrate the previous activities of the entity.
Keywords/Search Tags:JXTA, P2P, secure, credence value
PDF Full Text Request
Related items