节点文献

基于JXTA体系的P2P网络搜索技术及安全研究

The P2P Searching Technology and Security Research Based on the JXTA

【作者】 朱明英

【导师】 段会川;

【作者基本信息】 山东师范大学 , 计算机软件与理论, 2007, 硕士

【摘要】 自2000年Napster与唱片公司的一场官司将P2P重新带入人们的视线以来,P2P的发展日新月异。由于P2P的发展不需要服务器,给用户带来了极大的便利,各种基于P2P的应用迅速发展。但P2P的发展也存在一些问题,像很多P2P应用基于各自的平台,相互之间缺乏交流,不能共享数据资源,造成很多的重复劳动。JXTA是由Sun公司提出的关于P2P计算的合作研究项目。JXTA的目的在于创建一个通用的P2P平台,开发者可以利用JXTA创建的基本模块来建立应用。这使得开发者不需要在对等网络具有的一些共同特征模块上进行重复劳动,而可以专注于如何实现及完善可扩展、互操作性强且高可用性的高层应用。JXTA独立于编程语言、系统平台和网络平台,有望成为将来P2P开发的统一平台。本文先介绍了什么是P2P,P2P的发展、特点、应用及开发P2P的应用平台,并分析了JXTA平台的优势,然后详细介绍了JXTA的体系结构,构成JXTA网络结构的抽象的基础概念,以及构成JXTA网络的几个基本协议,之后举例说明了JXTA网络中的消息查询机制,介绍并分析了JXTA网络提供的安全机制。为了改变JXTA网络采用DHT方法进行查询,方式极为复杂、效率低下且难以实现的情况,及充分利用JXTA网络中集合点的特点,本文提出了根据对等点之间的信任程度进行查询的机制,先在对等组中的关键字-服务关联程度表中查询与关键字最相关的服务,再在关于该服务的对等体信任值表,查找信任程度较好的对等点进行查询。对JXTA网络提供的安全机制进行安全性分析,JXTA网络由于节点可以自由加入离开,相互之间难以建立信任关系,所以其中证书授权中心的信任问题难以保证。我们根据服务-对等体信任表对一个对等点进行综合评估,建立一个公共信任值,选定一些对等组内公共信任值较高的对等点作为一个对等组的证书授权中心,以保证证书授权中心的信任问题。

【Abstract】 Since the lawsuit of Napster and the USA disc bring the P2P to people’s eyeshot, P2P develops quickly. No need of server is convenient for people, so many applications based on P2P grows quickly. But there are some problems stunting the P2P, i.e. no communications between the applications based on the P2P, they can’t share data resource, which leads many repeated work on the same modules.JXTA is a cooperate study project proposed by Sun Microsystems Company in February 2001.It is used to create an common P2P platform, the developers can create some applications and services based on the generic block buildings specified by JXTA, thus the developers needn’t repeat the work on the common feature modules of P2P, then they can concentrate on designing high-level application with high expandability, interoperability and usability. JXTA is independent of program language、system platform and network platform, and is hopeful to be a common P2P standard platform in the future.The paper describes the concepts, history, features, applications and the platform of JXTA, and analyzes its advantages. Then the system architecture, the abstract concepts and six basic protocols is introduced. At last, this paper illustrates the discovery mechanism, and discusses the security mechanism.JXTA search network uses the DHT(distributed hashing table) method, which is very complex, low efficiency and difficult to implement. In order to change it and make sufficient use of the rendezvous peer, we proposed a discovery method, which creates a confidence relationship among the peers in the peergroup, search the services Service_Relevance table to find the higher relevant services of the keywords, the search the Peer_Confidence table to find the higher confident peers, then send the requests to these peers.The security of the security mechanism in JXTA is analyzed. In JXTA, the peer can join and leave the network freely, which leads the confidence relationship between pees hard to build, so the CA of the JXTA peergroup is not trusted by the peers in the peergroup. We evaluate the confidence of peers according to the Peer_Confidence table, and choose the peers with the higher public Confidence value as the CA to assure the confidence of the CA.

【关键词】 对等网络JXTARPV搜索机制CA安全
【Key words】 peer-to-peerJXTARPVsearchCAsecurity
  • 【分类号】TP391.3
  • 【被引频次】2
  • 【下载频次】184
节点文献中: 

本文链接的文献网络图示:

本文的引文网络