基于P2P网络模型的开放业务环境下的信任管理研究
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
随着当今互联网规模的迅猛发展和互联互通技术的进步,P2P网络技术逐渐得到越来越多的应用,成为计算机领域的研究热点。P2P是英文Peer-to-Peer的缩写,称为对等网络。对等网络是一种网络模型,在这种网络模型中所有网络节点都是对等的,具有相同的能力和义务,称为对等点。对等点之间通过直接连接共享资源,而且无需中心服务器的控制就能够实现对等点之间的协同工作。
     P2P应用的出现使得基于网络的业务环境从面向封闭的、熟识用户群体和相对静态的形式向开放的、公共可访问的和高度动态的服务模式转变。这种转变使得Web应用系统的安全分析复杂化,同时使许多基于传统软件系统形态的安全技术和手段,不再适用于解决P2P应用系统的安全问题。因此需要新的思路和方法来解决P2P带来的安全挑战。
     信任管理是近来提出的一种提供P2P业务环境下安全框架的新技术。但是其研究目前还存在一些问题。因此本论文的主要研究思路是在现有的信任管理的基本思想下,提出一套具有一定系统性的信任管理模型,包括基于证书的验证,信任模型及信任协商分析模型等内容。
     论文的主要创新工作概括如下:
     论文首先对P2P网络技术的应用现状和安全需求进行了总结和分析。对P2P网络模型进行分类并与服务器/客户端网络模型进行了比较。列举了P2P网络技术的应用,并总结了基于P2P网络模型的开放业务环境下的安全需求。
     论文的第二部分引入了信任管理的概念。首先给出信任管理的定义和模型,随后详细概述并分析几个有代表性的信任管理系统和信任度评估模型,最后讨论当前信任管理研究存在的问题以及今后的研究方向。
     论文的第三部分对PKI在P2P网络模型中的应用进行了深入研究。在具备基于证书验证的能力的P2P环境下,引入PKI将能够很大程度上提高P2P网络模型的安全性。通过对PKI信任模型的分析,针对PKI证书路径构造和证书路径验证的问题,提出了一种新的证书路径自动构造和自动验证的方法。
     论文的第四部分对信任模型进行了深入研究。提出了基于用户行为的分布式信任模型,信任模型使用实体在网络中的行为作为模型的反馈信息,对实体行为进行量化得到关键属性和关键级别向量,并选择适当的算法进行计算,得到实体的信任度。信任模型所需的实体行为信息分布存储在网络中的实体内。信任模型在算法中引入了修正因子。还引入评价准确度反馈系统,能有效抑制欺骗行为和惩罚欺骗者。
     论文的第五部分研究了信任协商技术。对信任协商和信任协商系统的要素进行了定义。对信任协商策略做了形式化描述,并对不同协商策略分别证明了其充分性和有效性。提出了基于Petri网的建模分析方法,通过和基于树的生成的建模分析方法的比较表明其更优的性能。
Uder the development of scale of the Internet and fast progress of inter-connection technologies, P2P network technology, which becomes a hot topic of computer science, eventually are used in many applications. P2P is the abbreviation of Peer-to-Peer, which is called peer network. Peer network is a tyoe of network model, in which model all the nodes are peer entities. The nodes, called as peer nodes, have the same capabilities and duties. The peer nodes can share resources through direct connections, without any control from any central server.
     P2P applications bring changes to the web based service environment. The service environment changes from a close, static mode to a open, public and highly dynamic mode. This kind of changes complicates the security analysis for web based applications. Security technologies for traditional softwares are no longer applicable to P2P applications. There is a requirement for new methods to solve these challenges.
     Trust management is a new technology to provide security framework in P2P service environment recently. But there are some problem unsolved during the research of this technology. Therefore, the aim of this thesis is to propose a set of trust management models, including certificate based authentication, trust model and trust negotiation model.
     The main innovations of the thesis are summarized as follows:
     The first part of the thesis summarizes and analyses the applications and security requirements of P2P technology. The thesis sort P2P network models and compare them with Client/Server network model. The applications of P2P technology is listed in the thesis. Then the thesis summarizes the security requirements of open service environment based on P2P network model.
     The second part introduces the concepts of trust management. Firstly the definition and model of trust management are given. Then the thesis analyses several representative trust management systems and trust evaluation models. At last the existing problems and the research directions of trust management.
     The third part studies the application of PKI in P2P network model. PKI can improve the security of P2P network model if the P2P environment can provide the capability of certificate authentication. After analysis of PKI trust model, a new method of automaticly creating and validating certificate paths is proposed.
     The forth part of the thesis studies the trust model. The thesis brings forward a entity-behavior based distributed trust model. This trust model uses the behavior of the entities in the network as feedback information, evaluates key attributes and class vectors, and calculates trust level of entities by proper algorithms. The model distributes entity behaviors information into all the entities in the network. The model also introduces amendatory factors and feedback system for evaluation veracity, which can effectively restrain cheatings.
     The fifth part studies trust negotiation technology. This part defines concept of trust negotiation and factors of trust negotiation. Then introduces formal description of trust negotiation policy, with the provement of its sufficiency and efficiency. Then a Petri-net based modeling method is proposed. The compare with modeling methods based on tree evolution shows that the new mdeling method has better performance.
引文
[1]D.S.Milojicic et al.,Peer-to-Peer Computing,tech.report HPL-2002-57,Hewlett-Packard Laboratories,Palo Alto,Calif.,2002.
    [2]吕向辰,P2P技术与应用,计算机世界,2002.
    [3]Dreamtech software group,Peer to Peer Application Development:Cracking the code,Wiley Publishing,2001.
    [4]Jonas Aslund,Authentication in peer-to-peer systems,http://www.ep.liu.se/exjobb/isy/2002/3153/exjobb.pdf,2002.
    [5]张联峰,刘乃安,钱秀槟,张玉清,综述:对等网(P2P)技术,计算机工程与应用,2003.
    [6]陈姝,周勇林等,P2P技术的研究与应用,计算机工程与应用,2002年38卷13期
    [7]M Parameswaran,A Susarla,AB Whinston,P2P networking:an information sharing alternative,Computer,2001
    [8]http://www.napster.com/
    [1]Blaze,M.,Feigenbaum,J.,Ioannidis,J.,et al.The role of trust management in distributed systems security.In:Secure Internet Programming:Issues for Mobile and Distributed Objects.Berlin:Springer-Verlag,1999.185-210
    [2]Khare,R.,Rifkin,A.Trust management on World Wide Web.World Wide Web Journal,1997,2(3):77-112.
    [3]Blaze,M.,Feigenbaum,J.,Lacy,J.Decentralized trust management.In:Dale,J.,Dinolt,G.,eds.Proceedings of the 17th Symposium on Security and Privacy.Oakland,CA:IEEE Computer Society Press,1996.164-173.
    [4]Abdul-Rahman,A.,Hailes,S.A distributed trust model.In:Proceedings of the 1997New Security Paradigms Workshop.Cumbria,UK:ACM Press,1998.48-60. http://www.ib.hu-berlin.de/~kuhlen/VERT01/abdul-rahman-trust-model 1997.pdf.
    [5]Abdul-Rahman,A.,Hailes,S.Using recommendations for managing trust in distributed systems.In:Proceedings of the IEEE Malaysia International Conference on Communication'97(MICC'97).Kuala Lumpur:IEEE Press,1997.http://citeseer.nj.nec.com/360414.html.
    [6]Yahalom,R.,Klein,B.,Beth,T.Trust relationships in secure systems-a distributed authentication perspective.In:Proceedings of the 1993 IEEE Symposium on Research in Security and Privacy.IEEE Press,1993.50-164.http://isbn.nu/0818633700.
    [7]Beth,T.,Borcherding,M.,Klein,B.Valuation of trust in open network.In:Gollmann,D.,ed.Proceedings of the European Symposium on Research in Security(ESORICS).Brighton:Springer-Verlag,1994.3-18.
    [8]Blaze,M.,Feigenbaum,J.,Keromytis,A.D.Keynote:trust management for public-key infrastructures.In:Christianson,B.,Crispo,B.,William,S.,et al.,eds.Cambridge 1998Security Protocols International Workshop.Berlin:Springer-Verglag,1999.59-63.
    [9]K.Aberer and Z.Despotovic.Managing trust in a peer-to-peer information system,CIKM,2001,ACM
    [10]Mujtaba Khambatti,Partha Dasgupta,et al.A Role-Based Trust Model for Peer-to-Peer Communities and Dynamic Coalitions,Proceedings of the Second IEEE International Information Assurance Workshop(IWIA'04),2004,IEEE
    [11]Li Xiong and Ling Liu,A Reputation-Based Trust Model for Peer-to-Peer eCommerce Communities,E-Commerce,2003.CEC 2003.IEEE International Conference on,24-27 June 2003
    [12]Farag Azzedin and Muthucumaru Maheswaran,Trust Modeling for Peer-to-Peer based Computing Systems,Proceedings of the International Parallel and Distributed Processing Symposium(IPDPS'03),2003,IEEE
    [13]Jφsang,A.A model for trust in security systems.In:Proceedings of the 2nd Nordic Workshop on Secure Computer Systems.1997.http://security.dstc.edu.att/staff/ajosang/papers.html.
    [1]Mujtaba Khambatti,Partha Dasgupta,and Kyung Dong Ryu,"A Role-Based Trust Model for Peer-to-Peer Communities and Dynamic Coalitions",Proceedings of the Second IEEE International Information Assurance Workshop(IWIA'04),2004,IEEE
    [2]Li Xiong,Ling Liu,"A Reputation-Based Trust Model for Peer-to-Peer eCommerce Communities",
    [3]Farag Azzedin and Muthucumaru Maheswaran,"Trust Modeling for Peer-to-Peer based Computing Systems",Proceedings of the International Parallel and Distributed Processing Symposium(IPDPS'03),2003,IEEE
    [4]K.Aberer and Z.Despotovic."Managing trust in a peer-to-peer information system",CIKM,2001,ACM
    [5]L.Ramaswamy and L.Liu.Freeriding,"A new challenge for peer-to-peer file sharing systems",36th AnnualHawaii International Conference on System Sciences(HICSS-36),2003.
    [6]张京楣,金妍,基于对等网络的信任模型[J],计算机应用研究,2002,第16卷第4期:343-345
    [7]陈姝,方滨兴,周勇林,P2P技术的研究与应用[J],计算机工程与应用,2002,第13期:20-24
    [8]陈建华,黄道颖,张尧等,计算机对等网络P2P技术[J],计算机工程与应用,2003,第33期:162-164,186
    [9]http://www.napster.com/
    [10]冯登国等译,公开密钥基础设施-概念、标准和实施,北京:人民邮电出版社
    [1]Ramaswamy and L.Liu,Freeriding:A new challengeforpeer-to-peer file sharing systems,36th AnnualHawaii International Conference on System Sciences(HICSS-36),2003.
    [2]谢冬青,冷健,PKI原理与技术,清华大学出版社,2004
    [3]P.Resnick,R.Zeckhauser,Et al,Reputation systems,Communications of the ACM,43(12),2000.
    [4]K.Aberer and Z.Despotovic.Managing trust in a peer-to-peer information system, CIKM,2001,ACM
    [5]Mujtaba Khambatti,Partha Dasgupta,et al.A Role-Based Trust Model for Peer-to-Peer Communities and Dynamic Coalitions,Proceedings of the Second IEEE International Information Assurance Workshop(IWIA'04),2004,IEEE
    [6]Li Xiong and Ling Liu,A Reputation-Based Trust Model for Peer-to-Peer eCommerce Communities,E-Commerce,2003.CEC 2003.IEEE International Conference on,24-27 June 2003
    [7]Farag Azzedin and Muthucumaru Maheswaran,Trust Modeling for Peer-to-Peer based Computing Systems,Proceedings of the International Parallel and Distributed Processing Symposium(IPDPS'03),2003,IEEE
    [9]R.Chen and W.Yeager,Poblano:A distributed trust model for peer-to-peer networks,http:security.jxta.org,2001
    [10]Cornelli,E.Damiani,et al,Choosing reputable servents in a P2P network,Eleventh International World Wide Web Conference,2002
    [11]T.Grandison and M.Sloman,A survey of trust in Internet applications,IEEE Communications Surveys & Tutorials,Vol.4,No.4,Fourth Quarter 2000,pp.2-16
    [12]Andrew Nash,William Duane,Celia Joseph,Derek Rink著,张玉清等译,公钥基础设施(PKI):实现与管理电子安全,清华大学出版社,2002
    [1]Elisa Bertino,Elena Ferrari and Anna Squicciarini,Trust Negotiations:Concepts,Systems,and Languages,p27-34,July/August 2004 IEEE
    [2]William H.Winsborough,Jay Jacobs,Automated Trust negotiation in Attribute-based Access Control,Proceedings of the DARPA Information Survivability Conference and Exposition(DISCEX'03),2003,IEEE
    [3]Tadao Murata,Petri Nets:Properties,Analysis and Applications,Proceedings of the IEEE,Vol 77,No.4,541-580,1989
    [4]Ting Yu,Xiaosong Ma and Marianne Winslett,PRUNES:An Efficient and Complete Strategy for Automated Trust Negotiation over the Internet,CCS'00,2000,ACM
    [5]Ting Yu,Marianne Winslett and Kent E.Seamons,Interoperable Strategies in Automated Trust Negotiation,CCS'01,2001,ACM
    [6]Elisa Bertino,Elena Ferrari and Anna Squicciarini,Trust-X:A Peer-to-Peer Framework for Trust Establishment,IEEE Transaction on Knoledge and Data Engineering,Vol.16,No.7,July 2004

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700