Computer Science ›› 2010, Vol. 37 ›› Issue (5): 72-76.
Previous Articles Next Articles
YAN Hua-yun,GUAN Ji-hong
Online:
Published:
Abstract: To resolve the problem of inauthentic files, this paper proposed a security P2P sharing model (SPSM). To incentive all the nodes sharing its resources, this paper introduced virtual currencies in SPSM; and introduced a proseculive rules in SPSM,that is some nodes would prosecute a node which uploaded an inauthentic files,then CA (certificalion authorities) would put the malicious node into malicious sets when validating the identity of malicious node, to save the storage spaces, and considing the character of SPSM, this paper used DBF, the variants of Bloom Filter, to store the malicious sets in SPSM. To validate the validity of SPSM, this paper compared the performances of SPSM and Trust model, the results of experiments show that the performances of SPSM are more effective than Trust's.
Key words: Peer-to-Peer, Network security,Bloom filter
YAN Hua-yun,GUAN Ji-hong. Security P2P Sharing Model Based on Bloom Filter[J].Computer Science, 2010, 37(5): 72-76.
0 / / Recommend
Add to citation manager EndNote|Reference Manager|ProCite|BibTeX|RefWorks
URL: https://www.jsjkx.com/EN/
https://www.jsjkx.com/EN/Y2010/V37/I5/72
Cited