计算机科学 ›› 2010, Vol. 37 ›› Issue (5): 72-76.

• 计算机网络与信息安全 • 上一篇    下一篇

基于Bloom Filter的安全P2P共享模型

严华云,关佶红   

  1. (同济大学电子与信息工程学院 上海201804);(湖州师范学院信息工程学院 湖州313000)
  • 出版日期:2018-12-01 发布日期:2018-12-01
  • 基金资助:
    本文受国家自然科学基金项目(60573183,60872057,60803053),浙江省自然科学基金杰出青年团队项目( RL090244},浙江省自然科学基金项目(YL07293, YL080212),浙江省科技计划项目(2008C21083),湖州市科技攻关项目 (2008GG11)资助。

Security P2P Sharing Model Based on Bloom Filter

YAN Hua-yun,GUAN Ji-hong   

  • Online:2018-12-01 Published:2018-12-01

摘要: 针对当前对等网中虚假文件的问题,提出了一种安全P2P共享模型(SPSM)。在该模型中为了激励节点共享自己的资源,引入虚拟货币(VC)以激励各个节点共享自己的资源;并在模型中引入了举报机制,即当网络中一个节点下载了虚假文件后就向CA(Certification Authorities,认证中心)举报提供虚假资源的节点,经CA甄别后将该恶意节点放入恶意节点集;为了节省存储空间,SPSM根据自身的特点,采用了Bloom Filter的变体DBF来存储恶意节点。为了验证提出的SPSM模型的有效性,将其与Trust模型进行了比较,结果表明SPSM模型比Trust模型更有效。

关键词: Peer-to-Peer,网络安全,Bloom Filter

Abstract: To resolve the problem of inauthentic files, this paper proposed a security P2P sharing model (SPSM). To incentive all the nodes sharing its resources, this paper introduced virtual currencies in SPSM; and introduced a proseculive rules in SPSM,that is some nodes would prosecute a node which uploaded an inauthentic files,then CA (certificalion authorities) would put the malicious node into malicious sets when validating the identity of malicious node, to save the storage spaces, and considing the character of SPSM, this paper used DBF, the variants of Bloom Filter, to store the malicious sets in SPSM. To validate the validity of SPSM, this paper compared the performances of SPSM and Trust model, the results of experiments show that the performances of SPSM are more effective than Trust's.

Key words: Peer-to-Peer, Network security,Bloom filter

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!