Research on P2P security overlay network model
To improve the security of software developing and the use of trust mechanism in P2P, a mathematical model of P2P security overlay network was proposed. As the core of the model, overlay network was divided into four parts, including data confirmation layer, data capture layer, trust mechanism layer...
Saved in:
Main Authors: | , , |
---|---|
Format: | Article |
Language: | zho |
Published: |
Editorial Department of Journal on Communications
2009-01-01
|
Series: | Tongxin xuebao |
Subjects: | |
Online Access: | http://www.joconline.com.cn/zh/article/74653260/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
_version_ | 1841537667330736128 |
---|---|
author | SUN Zhi-xin1 ZHANG Zhen-wei1 GONG Jing2 |
author_facet | SUN Zhi-xin1 ZHANG Zhen-wei1 GONG Jing2 |
author_sort | SUN Zhi-xin1 |
collection | DOAJ |
description | To improve the security of software developing and the use of trust mechanism in P2P, a mathematical model of P2P security overlay network was proposed. As the core of the model, overlay network was divided into four parts, including data confirmation layer, data capture layer, trust mechanism layer and routing layer. In the matter of functions, data confirmation layer filtered untrustworthy data; data capture layer run the vectorization of the exchanging data between logic nodes and processed relevant statistics and analysis; trust mechanism layer realized trust mechanism via identifying whether a logic node was trustworthy or not; routing layer build up mapping relationship on logic nodes and physical nodes. To enhance the security of P2P software and the convenience in the use of trust mechanism, simple vector distance classifications and kademlia algorithm were adopted on the basis of the global trust model. Simulating results show that P2P software developing can be more safe and easier under this model. |
format | Article |
id | doaj-art-f38e5dc5cbaf42d49d77dbb5c2553ef5 |
institution | Kabale University |
issn | 1000-436X |
language | zho |
publishDate | 2009-01-01 |
publisher | Editorial Department of Journal on Communications |
record_format | Article |
series | Tongxin xuebao |
spelling | doaj-art-f38e5dc5cbaf42d49d77dbb5c2553ef52025-01-14T08:29:37ZzhoEditorial Department of Journal on CommunicationsTongxin xuebao1000-436X2009-01-01309910474653260Research on P2P security overlay network modelSUN Zhi-xin1ZHANG Zhen-wei1GONG Jing2To improve the security of software developing and the use of trust mechanism in P2P, a mathematical model of P2P security overlay network was proposed. As the core of the model, overlay network was divided into four parts, including data confirmation layer, data capture layer, trust mechanism layer and routing layer. In the matter of functions, data confirmation layer filtered untrustworthy data; data capture layer run the vectorization of the exchanging data between logic nodes and processed relevant statistics and analysis; trust mechanism layer realized trust mechanism via identifying whether a logic node was trustworthy or not; routing layer build up mapping relationship on logic nodes and physical nodes. To enhance the security of P2P software and the convenience in the use of trust mechanism, simple vector distance classifications and kademlia algorithm were adopted on the basis of the global trust model. Simulating results show that P2P software developing can be more safe and easier under this model.http://www.joconline.com.cn/zh/article/74653260/overlay networksecurityP2P |
spellingShingle | SUN Zhi-xin1 ZHANG Zhen-wei1 GONG Jing2 Research on P2P security overlay network model Tongxin xuebao overlay network security P2P |
title | Research on P2P security overlay network model |
title_full | Research on P2P security overlay network model |
title_fullStr | Research on P2P security overlay network model |
title_full_unstemmed | Research on P2P security overlay network model |
title_short | Research on P2P security overlay network model |
title_sort | research on p2p security overlay network model |
topic | overlay network security P2P |
url | http://www.joconline.com.cn/zh/article/74653260/ |
work_keys_str_mv | AT sunzhixin1 researchonp2psecurityoverlaynetworkmodel AT zhangzhenwei1 researchonp2psecurityoverlaynetworkmodel AT gongjing2 researchonp2psecurityoverlaynetworkmodel |