Font Size: a A A

Research On The Application Of Trust Models For P2P Networks With Trusted Computing Technology

Posted on:2012-05-20Degree:MasterType:Thesis
Country:ChinaCandidate:L HuFull Text:PDF
GTID:2218330338963033Subject:Computer software and theory
Abstract/Summary:PDF Full Text Request
In recent years, P2P networks have become a focus in the industry. The P2P network is open and anonymous, providing the opportunity to false documents, malicious attacks and other malicious acts, so its trust and security issues have emerged. Building trust model in the P2P network environment is an effective way to solve these problems but also have some deficiencies now. Trusted computing technology can provide terminal device authentication, data integrity verification, hardware protection of critical information, data encrypted storage and some other security features. Therefore, we introduce it into the trust model to solve the existent problems in P2P networks. The main contributions are as follows.Firstly, without consideration of the legitimacy and integrity in the platforms and applications, recent P2P trust model can not objectively and truly reflect the trust degree about the network nodes. And some nodes can attack maliciously by P2P pseudonym mechanism in the network. Aiming to these problems, we developed identity trust based on trust computing technology, which include platform authentication and platform integrity certification. The platform authentication mechanism is to validate the TPM and confirm the credibility of the target identity by the binding relationship of TPM and the host platform. The integrity certification mechanism is to confirm the credibility of the operation environment through the integrity remote measurement about the terminal platform.Secondly, some P2P trust model is over-reliance on the Hash function to calculate the storage address of the global trust value, which result in that security is vulnerable to malicious attacks. In addition, some P2P trust model can't detect and punish swing node, which firstly establish high trust value, then repeat malicious attacks. Aiming to these problems, we proposed behavior trust based on trust computing technology, which included the following measures. (1)Accord to the hardware protecting function of TPM, we stored the transaction records in the PCR of the local TPM, avoiding to manage the trust data through DHT function, (2) we make use of the time window mechanism which can well improve accuracy and dynamic about the trust evaluation, containing the dynamic rock acts. Finally, this thesis design and implement a trust P2P resource sharing system based on the theory as before, and then we introduce the system simulation test. The results show that the trust mechanism which is proposed by this thesis can well ensure the platform trust, identify malicious nodes and prevent the security risk of swing act and collaborative cheating.
Keywords/Search Tags:Peer-to-Peer Networks, Trusted Computing, Trust Model, Identity Trust, Behavior Trust
PDF Full Text Request
Related items