Research on P2P security overlay network model

To improve the security of software developing and the use of trust mechanism in P2P, a mathematical model of P2P security overlay network was proposed. As the core of the model, overlay network was divided into four parts, including data confirmation layer, data capture layer, trust mechanism layer...

Full description

Saved in:
Bibliographic Details
Main Authors: SUN Zhi-xin1, ZHANG Zhen-wei1, GONG Jing2
Format: Article
Language:zho
Published: Editorial Department of Journal on Communications 2009-01-01
Series:Tongxin xuebao
Subjects:
Online Access:http://www.joconline.com.cn/zh/article/74653260/
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:To improve the security of software developing and the use of trust mechanism in P2P, a mathematical model of P2P security overlay network was proposed. As the core of the model, overlay network was divided into four parts, including data confirmation layer, data capture layer, trust mechanism layer and routing layer. In the matter of functions, data confirmation layer filtered untrustworthy data; data capture layer run the vectorization of the exchanging data between logic nodes and processed relevant statistics and analysis; trust mechanism layer realized trust mechanism via identifying whether a logic node was trustworthy or not; routing layer build up mapping relationship on logic nodes and physical nodes. To enhance the security of P2P software and the convenience in the use of trust mechanism, simple vector distance classifications and kademlia algorithm were adopted on the basis of the global trust model. Simulating results show that P2P software developing can be more safe and easier under this model.
ISSN:1000-436X