Construction of Trust Based Dynamic Access Control Model in P2P Net- work Environment
نویسندگان
چکیده
With the development of society and technology, sharing of resources has become an indispensable component in our life. With its congenital features of high speed, rich resources, strong fault-tolerance and low cost, peer-to-peer (P2P) network occupies an important status in network resources sharing. However, this technology has serious problems in network security, especially in trust management and access control. Therefore, based on the advantage of trust management and Role based access control (RBAC), this study proposed a trust based dynamic access control model in P2P network environment, which allocates general roles by automated trust negotiation, to build dynamic trust relation among strange entities, then the internet calculates users’ trust in real time. General role whose trust is over threshold derives a series of temporary roles with privilege limit set which can access network resources and thus realize the dynamic authorization policy for small control granularity. Subject Categories and Descriptors I.6.4 [Model Validation and Analysis]: RBAC Model; G.2 [Discrete Mathematics] General Terms: Peer-to-Peer, RBAC Mode
منابع مشابه
Dynamic policy based model for evolution of trust in P2P applications
The decentralized and anonymous characteristics of P2P environments, necessitates the need for an access control model, based on trust and recommendation. Since peers are heterogeneous, some peers might be malicious and in the absence of a centralized authority to punish such peers, mechanisms for trust and recommendation can help to distinguish between good and bad peers. In this paper we prop...
متن کاملA Role Based Trust Model for Peer to Peer Systems Using Credential Trees
This paper deals with a Role based Trust (RT) model for Peer-to-Peer (P2P) networks. P2P networks are essentially decentralized in nature to enhance resource sharing and collaboration. The anonymous and open nature of P2P systems offers an almost ideal environment for unauthorized access of digital content and also for easy distribution of malware. Today’s popular P2P systems have to challenge ...
متن کاملA context-sensitive dynamic role-based access control model for pervasive computing environments
Resources and services are accessible in pervasive computing environments from anywhere and at any time. Also, due to ever-changing nature of such environments, the identity of users is unknown. However, users must be able to access the required resources based on their contexts. These and other similar complexities necessitate dynamic and context-aware access control models for such environmen...
متن کاملTrusted P2P computing environments with role-based access control
A P2P computing environment can be an ideal platform for resource-sharing services in an organisation if it provides trust mechanisms. Current P2P technologies offer content-sharing services for non-sensitive public domains in the absence of trust mechanisms. The lack of sophisticated trust mechanisms in the current P2P environment has become a serious constraint for broader applications of the...
متن کاملA Genetic Programming-based trust model for P2P Networks
Abstract— Peer-to-Peer ( P2P ) systems have been the center of attention in recent years due to their advantage . Since each node in such networks can act both as a service provider and as a client , they are subject to different attacks . Therefore it is vital to manage confidence for these vulnerable environments in order to eliminate unsafe peers . This paper investigates the use of genetic ...
متن کامل