With the fast development of network and the soaring amount of computational devices, a large number of data has been produced. To cater for the increasing demand to hold the information, P2P mass storage system has been promoted. Data is stored in the terminal server, so that it could be easily accessed, maintained, and shared. Generally speaking, reliability and long term storage of the mass data require the expandability of the server. P2P storage system is considered to be a good solution. However, as a third party for data storage, the system becomes a target for malicious attacks. Therefore, to ensure the integrity and source-reliability of the data, P2P storage system has become a hot research topic in the field.Goodrich et al. has proposed an authenticated data structure model which can solve the authentication problems for the unreliable data source. But it can not be applied to the distributed storage environment. In this thesis, we propose a distributed authenticated skip list (DASL) based on Goodrich's method and hash tree data structure, and solve the authentication problems under distributed storage system. We design and describe in detail the path-searching algorithm, object authentication algorithm as well as object insertion/deletion algorithms based on the distributed object-location algorithm-locate of the distributed system. The thesis also analyzes DASL using probability theory and statistical analysis. The implementation of DASL does not rely on the implementation of locate and achieves simplicity, expandability, and utility. Therefore, we can conclude that DASL can be easily applied to the existing distributed storage system, equips the storage system with content authentication service, and provides a transparent security layer to the application layer. What is more, we put forward a P2P data authentication model based on DASL and an authentication protocol. Finally, we implement a P2P network security prototype system to assure the integrity and authentication of the data. The research and experiments results show that this system is efficient in both space and time, and has its application value. |