Share Email Print
cover

Proceedings Paper

Research of trust model in p2p network based on trusted computing
Author(s): Rong Li; Lei Li
Format Member Price Non-Member Price
PDF $14.40 $18.00
cover GOOD NEWS! Your organization subscribes to the SPIE Digital Library. You may be able to download this paper for free. Check Access

Paper Abstract

In order to strengthen the security of P2P networks, it is necessary to build trust relationships between nodes of networks. However, the traditional trust evaluation models can't resist the attacks of Pseudospoofing and Pseudostheft effectively. To resolve the problems, in this paper, the trusted computing method is introduced into P2P networks, and an idea of group trust model based on trusted computing methods is proposed. In the process of trust evaluation, the model can realize the anonymous attestation of the node body, which improves the creditability of trust relationships between nodes and resolves the security problems of P2P networks.

Paper Details

Date Published: 14 March 2013
PDF: 5 pages
Proc. SPIE 8768, International Conference on Graphic and Image Processing (ICGIP 2012), 87682M (14 March 2013); doi: 10.1117/12.2003491
Show Author Affiliations
Rong Li, Xinyang Agricultural College (China)
Lei Li, Xinyang Agricultural College (China)


Published in SPIE Proceedings Vol. 8768:
International Conference on Graphic and Image Processing (ICGIP 2012)
Zeng Zhu, Editor(s)

© SPIE. Terms of Use
Back to Top