基于JXTA体系的P2P网络搜索技术及安全研究
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
自2000年Napster与唱片公司的一场官司将P2P重新带入人们的视线以来,P2P的发展日新月异。由于P2P的发展不需要服务器,给用户带来了极大的便利,各种基于P2P的应用迅速发展。但P2P的发展也存在一些问题,像很多P2P应用基于各自的平台,相互之间缺乏交流,不能共享数据资源,造成很多的重复劳动。
     JXTA是由Sun公司提出的关于P2P计算的合作研究项目。JXTA的目的在于创建一个通用的P2P平台,开发者可以利用JXTA创建的基本模块来建立应用。这使得开发者不需要在对等网络具有的一些共同特征模块上进行重复劳动,而可以专注于如何实现及完善可扩展、互操作性强且高可用性的高层应用。JXTA独立于编程语言、系统平台和网络平台,有望成为将来P2P开发的统一平台。
     本文先介绍了什么是P2P,P2P的发展、特点、应用及开发P2P的应用平台,并分析了JXTA平台的优势,然后详细介绍了JXTA的体系结构,构成JXTA网络结构的抽象的基础概念,以及构成JXTA网络的几个基本协议,之后举例说明了JXTA网络中的消息查询机制,介绍并分析了JXTA网络提供的安全机制。
     为了改变JXTA网络采用DHT方法进行查询,方式极为复杂、效率低下且难以实现的情况,及充分利用JXTA网络中集合点的特点,本文提出了根据对等点之间的信任程度进行查询的机制,先在对等组中的关键字-服务关联程度表中查询与关键字最相关的服务,再在关于该服务的对等体信任值表,查找信任程度较好的对等点进行查询。
     对JXTA网络提供的安全机制进行安全性分析,JXTA网络由于节点可以自由加入离开,相互之间难以建立信任关系,所以其中证书授权中心的信任问题难以保证。我们根据服务-对等体信任表对一个对等点进行综合评估,建立一个公共信任值,选定一些对等组内公共信任值较高的对等点作为一个对等组的证书授权中心,以保证证书授权中心的信任问题。
Since the lawsuit of Napster and the USA disc bring the P2P to people’s eyeshot, P2P develops quickly. No need of server is convenient for people, so many applications based on P2P grows quickly. But there are some problems stunting the P2P, i.e. no communications between the applications based on the P2P, they can’t share data resource, which leads many repeated work on the same modules.
     JXTA is a cooperate study project proposed by Sun Microsystems Company in February 2001.It is used to create an common P2P platform, the developers can create some applications and services based on the generic block buildings specified by JXTA, thus the developers needn’t repeat the work on the common feature modules of P2P, then they can concentrate on designing high-level application with high expandability, interoperability and usability. JXTA is independent of program language、system platform and network platform, and is hopeful to be a common P2P standard platform in the future.
     The paper describes the concepts, history, features, applications and the platform of JXTA, and analyzes its advantages. Then the system architecture, the abstract concepts and six basic protocols is introduced. At last, this paper illustrates the discovery mechanism, and discusses the security mechanism.
     JXTA search network uses the DHT(distributed hashing table) method, which is very complex, low efficiency and difficult to implement. In order to change it and make sufficient use of the rendezvous peer, we proposed a discovery method, which creates a confidence relationship among the peers in the peergroup, search the services Service_Relevance table to find the higher relevant services of the keywords, the search the Peer_Confidence table to find the higher confident peers, then send the requests to these peers.
     The security of the security mechanism in JXTA is analyzed. In JXTA, the peer can join and leave the network freely, which leads the confidence relationship between pees hard to build, so the CA of the JXTA peergroup is not trusted by the peers in the peergroup. We evaluate the confidence of peers according to the Peer_Confidence table, and choose the peers with the higher public Confidence value as the CA to assure the confidence of the CA.
引文
[1]Napster. http://www.napster.com/
    [2]Gnutella http://www.napster.com/
    [3]Freenet: http://www.freenet.com
    [4]SETI@HONE:Search for Extraterrestrial Intelligence at home http://setiathome.berkeley.edu/
    [5]NetBatch:ftp://download.intel.com/cn/eBusiness/pdf/it/wp014703.pdf
    [6]Groove. http://www.groove.net/
    [7]JXTA ww.jxta.org
    [8]孙默 西安电子科技大学 P2P 网络安全模型的研究与设计实现 2005 年 P11/62
    [9]刘保旭、李雪莹、于传松、许榕生.对等网技术及应用概述[J]《.计算机工程与应用》 2003.18:1~3,12
    [10]AIM。www.aim.com
    [11]MSN。messager.msn.com
    [12]Yahoo! Messager。messager.yahoo.com
    [13]ICQ。www.icq.com
    [14]QQ。www.qq.com
    [15]Google。www.google.com
    [16]孙默 西安电子科技大学 P2P 网络安全模型的研究与设计实现 2005 年 P20
    [17]JXTA。www.jxya.org
    [18]Thuan Thai,Foang Q.Lam。.NET Framework Essentials,Introducing the .NET Framework。O’Reilly,ISBN:0-596-00165-7
    [19]OpenSSL:The Open Source toolkit for SSL/TLS.www.openssl.org
    [20]Java P2P 技术内幕
    [21][22]Scott Oaks, Bernard Traversat & Li Gong JXTA 技术手册 2004.4 P10,P333
    [23] [24] [25] [26] [27] [28]Java P2P 技术内幕 P368、P366、P369、P370、P372、P371
    [29]JXTA v2.3.x: Java? Programmer’s Guide 2005.4.7 P23
    [30] Daniel Brookshier 等 Java P2P 程序设计 2003.1 P191
    [31] RFC 2246. The TLS Protocol. 1999.
    [32] PureTLS. http://www.rtfm.com/puretls
    [33]任小征 基于 P2P 和 SSL 的网络安全服务的设计与实现 吉林大学硕士学位论文 P36
    [34] Rita Chen, William Yeager. Poblano: A Distributed Trust Model for Peer-to-Peer Networks. http://www.jxta.org/docs/trust.pdf
    [35] S. Osokine .Search Optimization in the Distributed Networks http://www.grouter.net/gnutella/search.htm. 2002/10/15]
    [36]黄鑫 基于 JXTA 协议的 Peer-to-Peer 网络查询研究 郑州大学硕士学位论文 P16
    [37]JXTA v2.3.x: JavaTM Programmer’s Guide2005.4.7 P21-23
    [38] 庄雷 黄鑫。JXTA 技术中 RPV 的改进策略郑州大学学报(理学版)2004 年 9 月第 36卷第 3 期 P1-4
    [39]陈宁程 基于 JXTA 的对等网络资源搜索引擎系统的研究与实现 新疆大学硕士研究生学位论文 2005.6.9
    [40]吴慧良 对等网络计算平台 JXTA 的研究 浙江大学硕士学位论文 2003.2
    [41]Bernard Traversat, Ahkil Arora, Mohamed Abdelaziz, Mike Duigou, Carl Haywood,Jean-Christophe Hugly, Eric Pouyoul, Bill Yeager。Project JXTA 2.0 Super-Peer Virtual Network ,p6/20
    [42]孙林红,冯登国等.传输层安全协议的安全性分析及改进.软件学报,2003 14(3): 518-523.
    [43]张莹,徐志根 JXTA 安全问题研究 成都信息工程学院学报第 19 卷第 4 期 2004 年 12 月 P496-499
    [44] Project JXTA: A Technology Review. http://www.jxta.org/project/www/docs/TechOverview.pdf
    [45] Li Gong.Get connected with Jxta[C]. In: Sun Microsystems JavaOne conference 2001-06

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700