Font Size: a A A

Reputation Mechanism In P2p File-sharing System

Posted on:2010-03-20Degree:MasterType:Thesis
Country:ChinaCandidate:D X YeFull Text:PDF
GTID:2208360275982896Subject:Software engineering
Abstract/Summary:PDF Full Text Request
Due to its distribution, on an equal and features high scalability, P2P networks have been widely welcomed. However, this network and the previous C/S mode have also evident defect, particularly in terms of security, such as routing security, data security, the spread of the virus, a relationship of trust and other fields, these issue have diversity performance .some of them have serious harm to our system.In this paper, we use P2P file-sharing system as the background to explore the P2P security. Nodes lack of trust in their interaction, people want to establish the credibility of the mechanism in the P2P network for better security.The network use node's "behavior" to help the P2P network node in accordance with its "behavior" may determine the future behavior, thus reducing some of the opportunities against malicious nodes.A complete mechanism is a complex whole mode. In recent years, many mechanisms have been put forward. However, most research independent of each other, and not have standardized and systematic which not conducive to future study. Therefore, this article focuses on the credibility of the mechanism, firstly, from the analysis of the working principle, the analysis of the nature of the credibility of the mechanism, and then in the realization of some of the credibility of the mechanism described in detail the design ideas, to discuss how to file-sharing environment in a context of specific research mechanisms to establish credibility. In this paper, innovation is the authentication and authorization mechanisms by adding the credibility of the whole mechanism in the credibility of some of the credibility of the model by adding the credibility of the improved model for the realization of some of the credibility of the work value. More importantly, the majority of us to improve our existing file-sharing system, the overall structure of such a node server set the file-sharing similar three-tier system architecture, in which three-tier architecture based on the credibility of the mechanism. Secondly, this paper, the credibility of the representation of some model, for example, is the role of the past through the analysis of the credibility of these models we use a model leads to the credibility of the model improved the ideas. The article followed by a further part of the simulation verifies the effectiveness of the proposed model. These for future research and practice have considerable reference value.
Keywords/Search Tags:P2P network, Reputation system, Reputation model
PDF Full Text Request
Related items