跳到主要內容

臺灣博碩士論文加值系統

(18.97.9.171) 您好!臺灣時間:2024/12/09 01:58
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果 :::

詳目顯示

我願授權國圖
: 
twitterline
研究生:陳昱德
研究生(外文):Yu-De Chen
論文名稱:對等檔案分享系統的分散式控制
論文名稱(外文):Distribution Control for Peer-to-Peer File Sharing Systems
指導教授:賴飛羆賴飛羆引用關係
指導教授(外文):Feipei Lai
學位類別:碩士
校院名稱:國立臺灣大學
系所名稱:資訊工程學研究所
學門:工程學門
學類:電資工程學類
論文種類:學術論文
論文出版年:2007
畢業學年度:95
語文別:中文
論文頁數:39
中文關鍵詞:同儕計算主從架構檔案分享分散式控制憑證
外文關鍵詞:peer-to-peerclient/serverfile sharingdistribution controlcredential
相關次數:
  • 被引用被引用:0
  • 點閱點閱:186
  • 評分評分:
  • 下載下載:0
  • 收藏至我的研究室書目清單書目收藏:1
同儕計算(Peer-to-Peer,P2P)是一種通訊模式,在P2P系統中的使用者,每個人擁有相同的能力而且通訊中的任一方都可以初始化建立溝通橋樑,和它對比的模式包含了主從架構。目前P2P檔案分享已經成為了主要的P2P應用,它讓使用者們能夠互相合作地、搜尋、取得檔案。雖然P2P檔案分享系統能有效且穩定的提供可調整和自我組織的檔案服務,但是也因為它天生的分散性,使得在控制分享檔案的散佈這方面困難重重。在本論文裡,建議了一種分散式控制系統,能對符合檔案限制的使用者,限制他們的檔案分享。擁有檔案的使用者有責任去判斷要求檔案者的資格,且評估結果然後包進憑證裡,憑證由擁有檔案的使用者簽章然後交換。擁有憑證的使用者證明他符合資格 。
Peer-to-peer (P2P) is a communications model in which each party has the same capabilities and either party can initiate a communication session. Other models with which it might be contrasted include the client/server model and the master/slave model. P2P file sharing has been a major P2P application, and enables peers to distribute, search, and retrieve files collaboratively. Although P2P file sharing systems offer scalable and self-organized file services with wide availability and good stability, but the decentralized nature make them inherently difficult to control the distribution of shared files. In this thesis, a distribution control system is proposed to restrict the sharing of files to the peers who qualified the constraints associated with the files. Peers are responsible to gauge requesting peers’ qualifications for the files they are holding, and evaluation results are encapsulated in credentials signed and exchanged in the process. Credentials are collected and presented by peers as evidence of qualifications.
Chapter 1 .......................................1
Introduction....................................1
1.1 peer-to-peer..............................1
1.2 P2P file sharing..........................3
1.3 Distribution control of P2P file sharing..4
1.4 Related Work..............................5
1.5 Organization..............................6
Chapter 2 .......................................7
Overview........................................7
2.1 Motivation................................7
2.2 Terminology...............................8
2.2.1 Hash function........................13
2.2.2 Digital signature schemes............14
2.3 Architecture..............................18
2.3.1 P2PNS................................20
2.3.2 P2PFS................................20
2.3.3 PTS..................................20
2.3.4 CS...................................22
Chapter 3 .......................................23
Distribution Control.............................23
3.1 Distribution Control Protocol..............23
3.1.1 Setup.................................23
3.1.2 Credential exchange...................24
3.1.3 File transmission.....................26
3.2 Distributor Verification................26
3.3 Requester Evaluation.......................29
Chapter 4 ........................................34
Credential Management............................34
4.1 Online Credential Gathering................34
4.2 Credential Graph Compression...............35
Chapter 5 ........................................37
Conclusion.......................................37
Bibliography:....................................38
[1]Gnutella. Website: http://www.gnutella.com.
[2]SPKI / SDSI certificates.
http://world.std.com/.cme/html/spki.html.
[3]S. Androutsellis-Theotokis and D. Spinellis. A survey of peer-to-peer content distribution technologies. ACM Computer Survey, 36(4):335–371, 2004. ACM Press, New York, USA.
[4]R. Chen and W. Yeager. Poblano: A distributed trust model for peer-to-peer networks. Sun Microsystems. http://www.jxta.org/docs/trust.pdf.
[5]I. Clarke, O. Sandberg, and B. Wiley. Freenet: A distributed anonymous information storage and retrieval system. In Proceedings of the Workshop on Design Issues in Anonymity and Unobservability, Berkeley, CA, 2000.
[6]N. Daswani, H. Garcia-Molina, and B. Yang. Open problems in data-sharing peer-to-peer systems. In ICDT 2003.
[7]E. Freudenthal, T. Pesin, L. Port, E. Keenan, and V. Karamcheti. dRBAC: Distributed role-based access control for dynamic coalition environments. In Proceedings of the 22nd International Conference on Distributed Computing Systems (ICDCS’02), Vienna, Austria, July 2002.
[8]A. Hess, J. Holt, J. Jacobson, and K. E. Seamons. Content-triggered trust negotiation. ACM Transactions on Information and System Security (TISSEC), 7(3):428–456, August 2004.
[9]A. Hess and K. E. Seamons. An access control model for dynamic client-side content. In the 8th ACM Symposium on Access Control Models and Technologies (SACMAT 2003), Villa Gallia, Como, Italy, June 2003. ACM.
[10]M. Kaminsky, G. Savvides, D. Mazi`eres, and M. F. Kaashoek. Decentralized user authentication in a global file system. In Proceedings of the 19th ACM Symposium on Operating Systems Principles (SOSP’03), pages 60–73, Bolton Landing, New York, October 2003.
[11]S. Lee, R. Sherwood, and B. Bhattacharjee. Cooperative peer groups in nice. In Proceedings of IEEE INFOCOM 2003, San Franciso, CA, April 2003.
[12]S. Miltchev, V. Prevelakis, S. Ioannidis, J. Ioannidis, A. D. Keromytis, and J. M. Smith. Secure and flexible global file sharing. In Proceedings of the USENIX 2003 Annual Technical Conference, pages 165–178, San Antonio, Texas, June 2003.
[13]M. Ripeanu. Peer-to-peer architecture case study: Gnutella network. In 1st International Conference on Peer-to-Peer Computing (P2P 2001), Linköping, Sweden, Auguest 2001.
[14]R. L. Rivest and B. Lampson. SDSI: A simple distributed security infrastructure. http://theory.lcs.mit.edu/.cis/sdsi.html.
[15]T. Ryutov, L. Zhou, C. Neuman, T. Leithead, and K. E. Seamons. Adaptive trust negotiation and access control. In Proceedings of the tenth ACM symposium on Access control models and technologies, Stockholm, Sweden.
[16]R. Sandhu and X. Zhang. Peer-to-peer access control architecture using trusted computing technology. In Proceedings of the 10th ACM Symposium on Access Control Models and Technologies, pages 147–158, Stockholm, Sweden, 2005. ACM Press.
[17]Y. Wang and J. Vassileva. Trust and reputation model in peer-to-peer networks. In Proceedings of the 3rd International Conference on Peer-to-Peer Computing (P2P 2003), Linköping, Sweden, September 2003.
[18] P. R. Zimmermann. The Official PGP User’s Guide. MIT Press, 1995.
QRCODE
 
 
 
 
 
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top
無相關期刊