Font Size: a A A

Computational Model Of Trust In P2P Distributed File System And Application

Posted on:2015-12-09Degree:MasterType:Thesis
Country:ChinaCandidate:M ZhangFull Text:PDF
GTID:2298330467452488Subject:Software engineering
Abstract/Summary:PDF Full Text Request
With the extensive application of P2P software, application security issues of P2P network become a focus of user focus. Trust mechanism in P2P network is an important foundation for addressing security issues, so the P2P network security research focused on the design and development of many trusted computing model, enabling the use of P2P network resources in a relatively secure network environment.This paper firstly describes the background of the trust model and typical trust model, and then analyzes the P2P distributed file system trust issues, focusing on analysis of fraud in the commission sharing in the design of a comprehensive reliability-based trust model. In this model, given the evidence and commission trade concepts, from the evidence itself features, evaluation of information between the relevant evidence and user trust three angles to put forward a improved method of trust value calculation between delegation relationship using evidence theory. Also the paper establishes a trust mechanism based on the delegation. Finally, through simulation to verify the reasonableness of trust relationships based on trust model, combined with JXTA framework to achieve a P2P file-sharing system to provide users with a safe and reliable P2P network application scenarios.Simulation results show that trusted computing model based on the comprehensive credibility closer the result of Eigentrust trust model containing both two Asialnfo factor, it indicates that the rationality and validity of the model. The trust model based on the comprehensive credibility realized a P2P file-sharing system and the search for a file from one user to download the file, and download the results was evaluated embodies trust between users.
Keywords/Search Tags:P2P, computational model of trust, delegation sharing, cheat, JXTA
PDF Full Text Request
Related items