节点文献

基于可信计算的P2P信任模型

A P2P Trust Model Based on Trusted Computing

  • 推荐 CAJ下载
  • PDF下载
  • 不支持迅雷等下载工具,请取消加速工具后下载。

【作者】 何立宝黄刘生杨威罗永龙

【Author】 HE Li-Bao1,2,HUANG Liu-Sheng1,2,YANG Wei1,2,LUO Yong-Long1,2(1.NHPCC,Depart.of CS.& Tech.,USTC,Hefei An-hui 230026,China;2.Suzhou Institute for Advanced Study,USTC,Suzhou Jiangsu 215123,China)

【机构】 中国科学技术大学计算机科学与技术系国家高性能计算中心中国科学技术大学苏州研究院

【摘要】 P2P网络的安全需求中,信任关系的建立是重点也是难点。传统的信任评估模型,采用适当的信任评估手段,能够在一定程度上削弱单纯欺骗、不作为、诽谤和联合作弊的安全威胁,但却不能有效地抵御Pseudospoofing和Pseudostheft攻击。在本文中,我们将可信计算组织推出的可信计算技术引入P2P网络,提出了一种有效的P2P网络实体数字身份的创建和管理策略。新的信任模型在信任评估过程中贯穿着平台认证,很好地解决了P2P网络的安全问题。

【Abstract】 Building trust relationships between entities is an important and difficult part in the security needs of P2P networks.By using appropriate assessment tools,traditional trust models can weaken some security threats such as simple deception,an omission,defamation and joint cheating to a certain extent,however they are unable to resist the attacks of Pseudospoofing and Pseudostheft effectively.In this paper,the trusted computing method initiated by Trusted Computing Group(TCG) is introduced into P2P networks,and we propose an efficient scheme on foundation and management of stable and verifiable digital identities of entities.The new designed trust model,using platform attestation technology through the whole process of trust evaluation,perfectly solved security problems of P2P networks.

  • 【文献出处】 信息网络安全 ,Netinfo Security , 编辑部邮箱 ,2009年07期
  • 【分类号】TP393.08
  • 【被引频次】9
  • 【下载频次】393
节点文献中: 

本文链接的文献网络图示:

本文的引文网络