Font Size: a A A

Library Management System Design And Implementation

Posted on:2014-01-23Degree:MasterType:Thesis
Country:ChinaCandidate:K YangFull Text:PDF
GTID:2268330401466827Subject:Software engineering
Abstract/Summary:PDF Full Text Request
Because of its center-less and dynamic character, P2P network becomes the mostpopular choice for network applications such as file-sharing systems and distributedcomputing. It is also a hot spot for network research. However, P2P network alsotriggered many new problems about network security. For example, malicious nodes inP2P network could attack the network with fraud, slander and imposture, which couldseriously threaten the operation of the network. Therefore, research on P2P networkinformation security is focusing on how to restrain malicious nodes and guarantee thevalidity and security of P2P network. Generally, a trusted node is considered tradable.Thus, a trust model should be constructed according to the actual situation of thenetwork. Credit calculated based on the model is the criterion for assessing nodes.Our model runs a closer simulation of nodes in real network and provides extendedformula to calculate their real-time credit. In the formula, factors in network context areused to support credit calculation and node valuation, enabling a more accurate result ofcalculation, and a more reliable and secure network.Specific method for calculating credit of node is introduced and integrated, makingcomputational resource consumption reasonable; and, DHT method is used to storecredit value in nodes distributively, which has greater openness and redundancy. Atrust model of P2P network is put forward in this paper. It evaluates a node by its credit,and estimates whether the node would act maliciously in future transactions. Aftercomparing existing trust models, a computational formula for credit is devised, and anew system structure is established for the model. Then, complete simulation of actualnodes’ malicious actions is conducted considering various influencing factors, andreliable computation of credit is attempted. Lastly, experiment is performed to test themodel.
Keywords/Search Tags:P2P Networks, Malicious Nodes, Creditworthiness, Trust Model
PDF Full Text Request
Related items