Abstract
The P2P network and its applications have the characters of dynamic and self-management, so the existing technologies do not solve the security issues of P2P network appropriately. In this paper, we describe new techniques that overcome many of the cited difficulties. We propose a new security architecture named SAP2P to address the security problems in P2P network. The core of SAP2P is based on a trust management named ExSPKI that establishes the trust relationships between peers. This architecture is adapted to the features of P2P network.
This work is supported by National Natural Science Foundation of China under Grant 60373040 and National “863” Program Grant 2003AA142150.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Blaze, M., Feigenbaum, J., Lacy, J.: Decentralized Trust Management. In: Proceedings of the 1996 IEEE Symposium on Security and Privacy, pp. 164–173. IEEE Computer Society Press, Los Alamitos (1996)
Ellison, C., Frantz, B., Lampson, B., Rivest, R., Thomas, B., Ylonen, T.: SPKI Certificate Theory. IETF RFC 2693 (September 1999)
Traversat, B., Abdelaziz, M., Duigou, M., Hugly, J.-C., Pouyoul, E., Yeage, B.: Sun Microsystems, Inc. Project JXTA Virtual Network. October 28 (2002)
Dehua, Z., YuQing, Z.: A Survey of P2P Network Security Issues Based on Protocol Stack, Progress on Cryptography, 25 Years of Cryptography in China, Shanghai, China, pp. 209—216
Yuqing, Z., Dehua, Z.: Authentication and Access Control in P2P Network. In: Li, M., Sun, X.-H., Deng, Q.-n., Ni, J. (eds.) GCC 2003. LNCS, vol. 3032, pp. 468–470. Springer, Heidelberg (2004)
Foster, I., Kesselman, C., Tsudik, G., Tuechk, S.: A Security Architecture for Computational Grids. In: 5th ACM Conference on Computer and Communication Security Conference (1998)
Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Trans. Netw. 11(1), 17–32 (2003)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Dehua, Z., Zhang, Y., Zhou, Y. (2005). Research of Security Architecture for P2P Network Based on Trust Management System. In: Zhuge, H., Fox, G.C. (eds) Grid and Cooperative Computing - GCC 2005. GCC 2005. Lecture Notes in Computer Science, vol 3795. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11590354_26
Download citation
DOI: https://doi.org/10.1007/11590354_26
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-30510-1
Online ISBN: 978-3-540-32277-1
eBook Packages: Computer ScienceComputer Science (R0)