Computer Science ›› 2010, Vol. 37 ›› Issue (5): 72-76.

Previous Articles     Next Articles

Security P2P Sharing Model Based on Bloom Filter

YAN Hua-yun,GUAN Ji-hong   

  • Online:2018-12-01 Published:2018-12-01

Abstract: To resolve the problem of inauthentic files, this paper proposed a security P2P sharing model (SPSM). To incentive all the nodes sharing its resources, this paper introduced virtual currencies in SPSM; and introduced a proseculive rules in SPSM,that is some nodes would prosecute a node which uploaded an inauthentic files,then CA (certificalion authorities) would put the malicious node into malicious sets when validating the identity of malicious node, to save the storage spaces, and considing the character of SPSM, this paper used DBF, the variants of Bloom Filter, to store the malicious sets in SPSM. To validate the validity of SPSM, this paper compared the performances of SPSM and Trust model, the results of experiments show that the performances of SPSM are more effective than Trust's.

Key words: Peer-to-Peer, Network security,Bloom filter

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!