Browse > Article

Authentication Mechanism Implementation for Information Sharing in Peer-to-Peer Environment  

Lee, Jeong-Ki (조선대학교)
Bae, Il-Ho (조선대학교)
Lee, Cheol-Seung (조선대학교)
Moon, Jung-Hwan (조선대학교)
Park, Chan-Mo (조선대학교)
Lee, Joon (조선대학교)
Abstract
According as progress by information society, computer network use and enlargement of scale are accelerated more. Also, with good physician increase of information that is exchanged through computer network, security of network is embossed to controversial point that is new. Because P2P as that remove or weakens center server function is open network that can participate between each user, problem about authentication between each users is risen. If certain user in network i3 in open environment, this user must authenticate request about service to user who is admitted between each user to limit connection. This treatise proposed method to keep security in P2P environment to solve this and designed certification mechanism that quote Kerberos certification mechanism to mechanism that can share information safety in P2P environment.
Keywords
Peer-to-Peer; Kerberos; Authentication; Mechanism;
Citations & Related Records
연도 인용수 순위
  • Reference
1 http://www.byte.com/art/9406/sec8/art.htm
2 William Stalling. 'Network and Internet- work Security'. Prentice Hall. 1995
3 W. ford. 'Computer Communication Sec- urity'. prentice Hall. 1995
4 RFC 1510, 'The Kerberos Network Auth- entication Service(V5),' Internet Request for Co- mments 1510, Sep. 1993
5 김문조, 사회학회 공동세미나, '정보화시대의 매체정책과 문화정책', 언론학회, 1998
6 http://www.openp2p.com/topics/p2p/security/
7 http://web-biz.pe.kr/web/p2p3.html
8 박기흥, '디지털 경제와 인터넷 혁명', 산업연구원, 2000
9 Warwick Ford, 'Computer Communications Security', New Jersey, Prentice-Hall, 1994
10 모영범․송주석, '반복 인증을 고려한 인증 프로토콜 제안 및 분석', 통신정보보호 학회논문지, 제5권 제2호, 1995
11 Halsall, F. 'Data Communications. Computer Networks and Open Systems,' 4th Edi- tion, Addison Wesley, 1996