Research on P2P security overlay network model

To improve the security of software developing and the use of trust mechanism in P2P, a mathematical model of P2P security overlay network was proposed. As the core of the model, overlay network was divided into four parts, including data confirmation layer, data capture layer, trust mechanism layer...

Full description

Saved in:
Bibliographic Details
Main Authors: SUN Zhi-xin1, ZHANG Zhen-wei1, GONG Jing2
Format: Article
Language:zho
Published: Editorial Department of Journal on Communications 2009-01-01
Series:Tongxin xuebao
Subjects:
Online Access:http://www.joconline.com.cn/zh/article/74653260/
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1841537667330736128
author SUN Zhi-xin1
ZHANG Zhen-wei1
GONG Jing2
author_facet SUN Zhi-xin1
ZHANG Zhen-wei1
GONG Jing2
author_sort SUN Zhi-xin1
collection DOAJ
description To improve the security of software developing and the use of trust mechanism in P2P, a mathematical model of P2P security overlay network was proposed. As the core of the model, overlay network was divided into four parts, including data confirmation layer, data capture layer, trust mechanism layer and routing layer. In the matter of functions, data confirmation layer filtered untrustworthy data; data capture layer run the vectorization of the exchanging data between logic nodes and processed relevant statistics and analysis; trust mechanism layer realized trust mechanism via identifying whether a logic node was trustworthy or not; routing layer build up mapping relationship on logic nodes and physical nodes. To enhance the security of P2P software and the convenience in the use of trust mechanism, simple vector distance classifications and kademlia algorithm were adopted on the basis of the global trust model. Simulating results show that P2P software developing can be more safe and easier under this model.
format Article
id doaj-art-f38e5dc5cbaf42d49d77dbb5c2553ef5
institution Kabale University
issn 1000-436X
language zho
publishDate 2009-01-01
publisher Editorial Department of Journal on Communications
record_format Article
series Tongxin xuebao
spelling doaj-art-f38e5dc5cbaf42d49d77dbb5c2553ef52025-01-14T08:29:37ZzhoEditorial Department of Journal on CommunicationsTongxin xuebao1000-436X2009-01-01309910474653260Research on P2P security overlay network modelSUN Zhi-xin1ZHANG Zhen-wei1GONG Jing2To improve the security of software developing and the use of trust mechanism in P2P, a mathematical model of P2P security overlay network was proposed. As the core of the model, overlay network was divided into four parts, including data confirmation layer, data capture layer, trust mechanism layer and routing layer. In the matter of functions, data confirmation layer filtered untrustworthy data; data capture layer run the vectorization of the exchanging data between logic nodes and processed relevant statistics and analysis; trust mechanism layer realized trust mechanism via identifying whether a logic node was trustworthy or not; routing layer build up mapping relationship on logic nodes and physical nodes. To enhance the security of P2P software and the convenience in the use of trust mechanism, simple vector distance classifications and kademlia algorithm were adopted on the basis of the global trust model. Simulating results show that P2P software developing can be more safe and easier under this model.http://www.joconline.com.cn/zh/article/74653260/overlay networksecurityP2P
spellingShingle SUN Zhi-xin1
ZHANG Zhen-wei1
GONG Jing2
Research on P2P security overlay network model
Tongxin xuebao
overlay network
security
P2P
title Research on P2P security overlay network model
title_full Research on P2P security overlay network model
title_fullStr Research on P2P security overlay network model
title_full_unstemmed Research on P2P security overlay network model
title_short Research on P2P security overlay network model
title_sort research on p2p security overlay network model
topic overlay network
security
P2P
url http://www.joconline.com.cn/zh/article/74653260/
work_keys_str_mv AT sunzhixin1 researchonp2psecurityoverlaynetworkmodel
AT zhangzhenwei1 researchonp2psecurityoverlaynetworkmodel
AT gongjing2 researchonp2psecurityoverlaynetworkmodel