Skip to main content

Research of Security Architecture for P2P Network Based on Trust Management System

  • Conference paper
Grid and Cooperative Computing - GCC 2005 (GCC 2005)

Part of the book series: Lecture Notes in Computer Science ((LNPSE,volume 3795))

Included in the following conference series:

  • 483 Accesses

Abstract

The P2P network and its applications have the characters of dynamic and self-management, so the existing technologies do not solve the security issues of P2P network appropriately. In this paper, we describe new techniques that overcome many of the cited difficulties. We propose a new security architecture named SAP2P to address the security problems in P2P network. The core of SAP2P is based on a trust management named ExSPKI that establishes the trust relationships between peers. This architecture is adapted to the features of P2P network.

This work is supported by National Natural Science Foundation of China under Grant 60373040 and National “863” Program Grant 2003AA142150.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. SSL, http://www.openssl.org/

  2. Blaze, M., Feigenbaum, J., Lacy, J.: Decentralized Trust Management. In: Proceedings of the 1996 IEEE Symposium on Security and Privacy, pp. 164–173. IEEE Computer Society Press, Los Alamitos (1996)

    Chapter  Google Scholar 

  3. Ellison, C., Frantz, B., Lampson, B., Rivest, R., Thomas, B., Ylonen, T.: SPKI Certificate Theory. IETF RFC 2693 (September 1999)

    Google Scholar 

  4. Traversat, B., Abdelaziz, M., Duigou, M., Hugly, J.-C., Pouyoul, E., Yeage, B.: Sun Microsystems, Inc. Project JXTA Virtual Network. October 28 (2002)

    Google Scholar 

  5. Dehua, Z., YuQing, Z.: A Survey of P2P Network Security Issues Based on Protocol Stack, Progress on Cryptography, 25 Years of Cryptography in China, Shanghai, China, pp. 209—216

    Google Scholar 

  6. Yuqing, Z., Dehua, Z.: Authentication and Access Control in P2P Network. In: Li, M., Sun, X.-H., Deng, Q.-n., Ni, J. (eds.) GCC 2003. LNCS, vol. 3032, pp. 468–470. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  7. Foster, I., Kesselman, C., Tsudik, G., Tuechk, S.: A Security Architecture for Computational Grids. In: 5th ACM Conference on Computer and Communication Security Conference (1998)

    Google Scholar 

  8. Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Trans. Netw. 11(1), 17–32 (2003)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Dehua, Z., Zhang, Y., Zhou, Y. (2005). Research of Security Architecture for P2P Network Based on Trust Management System. In: Zhuge, H., Fox, G.C. (eds) Grid and Cooperative Computing - GCC 2005. GCC 2005. Lecture Notes in Computer Science, vol 3795. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11590354_26

Download citation

  • DOI: https://doi.org/10.1007/11590354_26

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-30510-1

  • Online ISBN: 978-3-540-32277-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics