作者投稿和查稿 主编审稿 专家审稿 编委审稿 远程编辑

计算机工程

• 安全技术 • 上一篇    下一篇

基于信任模糊评价的P2P 访问控制模型

龚 翱,刘 浩   

  1. (湖南人文科技学院信息科学与工程系,湖南娄底417000)
  • 收稿日期:2014-01-28 出版日期:2015-03-15 发布日期:2015-03-13
  • 作者简介:龚 翱(1981 - ),男,讲师、硕士,主研方向:网络安全,软件工程;刘 浩,副教授、博士后。
  • 基金资助:
    湖南省自然科学基金资助项目(11JJ3074);湖南省科技计划基金资助项目(2012GK3117);湖南省教育厅科学研究基金资助 项目(12C0744)。

Access Control Model of P2P Based on Trust Fuzzy Evaluation

GONG Ao,LIU Hao   

  1. (Department of Information Science and Engineering,Hunan University of Humanities,Science and Technology,Loudi 417000,China)
  • Received:2014-01-28 Online:2015-03-15 Published:2015-03-13

摘要: 应用社会信任网络构建的基本原理,给出一种新的P2P 访问控制模型。将P2P 节点间的信任关系分为直接信任、信任知识和推荐信任3 个方面,利用模糊理论对P2P 节点进行信任评价,通过扩展多级安全机制实现访问控制,在P2P 中的节点间进行交互时,主体节点根据目标节点的信任等级授予其不同的访问权限,以达到保护P2P网络安全的目标,引入加密与数字签名等安全机制,有效地抑制冒名、窃听和女巫攻击等一系列安全性攻击。在P2P 网络中恶意节点比重变化的情况下,对引入该访问控制模型前后的情况进行对比实验,结果表明,引入模型后P2P 网络中的节点交互成功率有较大提高。

关键词: P2P 网络, 模糊评价, 访问控制, 多级安全, 授权, 安全策略

Abstract: Drawing lessons from the basic principles of social trust network,this paper proposes an access control mode of P2P based on trust of fuzzy evaluation. The trust relationship between nodes is divided into three aspects,direct trust, knowledge of trust,and recommendation trust. It adopts fuzzy theory to evaluate the trust of nodes in P2P network,and realizes access control by extending the Multi-level Security(MLS) mechanism. Before the transaction can be generated between the nodes,according to the trust level of the object node,the subject node grants it different access privileges,so that,the goal of P2P network security is achieved. Some security mechanisms,such as encryption and digital signature,are introduced into this model,as a result,this model is capable of effectively restraining several typical security attacks such as impostor,eavesdrop,and sybil attack. When the proportion of malicious nodes in P2P network is changing,the contrast experiment is doing with the network containing the access control model and without this model. Results show that the success interaction rate of nodes is greatly improved.

Key words: P2P network, fuzzy evaluation, access control, Multi-level Security(MLS), authorization, security strategy

中图分类号: