Font Size: a A A

Distributed Authenticated Skip List And Its Application In P2P Distributed Storage System

Posted on:2010-04-19Degree:MasterType:Thesis
Country:ChinaCandidate:X Y LiFull Text:PDF
GTID:2218330368499854Subject:Computer software and theory
Abstract/Summary:PDF Full Text Request
With the fast development of network and the soaring amount of computational devices, a large number of data has been produced. To cater for the increasing demand to hold the information, P2P mass storage system has been promoted. Data is stored in the terminal server, so that it could be easily accessed, maintained, and shared. Generally speaking, reliability and long term storage of the mass data require the expandability of the server. P2P storage system is considered to be a good solution. However, as a third party for data storage, the system becomes a target for malicious attacks. Therefore, to ensure the integrity and source-reliability of the data, P2P storage system has become a hot research topic in the field.Goodrich et al. has proposed an authenticated data structure model which can solve the authentication problems for the unreliable data source. But it can not be applied to the distributed storage environment. In this thesis, we propose a distributed authenticated skip list (DASL) based on Goodrich's method and hash tree data structure, and solve the authentication problems under distributed storage system. We design and describe in detail the path-searching algorithm, object authentication algorithm as well as object insertion/deletion algorithms based on the distributed object-location algorithm-locate of the distributed system. The thesis also analyzes DASL using probability theory and statistical analysis. The implementation of DASL does not rely on the implementation of locate and achieves simplicity, expandability, and utility. Therefore, we can conclude that DASL can be easily applied to the existing distributed storage system, equips the storage system with content authentication service, and provides a transparent security layer to the application layer. What is more, we put forward a P2P data authentication model based on DASL and an authentication protocol. Finally, we implement a P2P network security prototype system to assure the integrity and authentication of the data. The research and experiments results show that this system is efficient in both space and time, and has its application value.
Keywords/Search Tags:Authenticated Data Structure, DASL, P2P, Distributed Storage System, Authentication
PDF Full Text Request
Related items