期刊文献+

P2P网络中基于权重因素的信任模型 被引量:4

Trust model based on weight factor in P2P network
在线阅读 下载PDF
导出
摘要 针对P2P网络内部的安全问题,提出了一种P2P网络基于直接交易信任和推荐信任的模型,运用了直接交易信息参数、推荐信息的评价可信度和动态平衡权值参数,较简单准确地描述了节点的综合信任值,在进行交易前与目标节点建立信任关系,能有效抑制恶意节点对网络中其他节点的恶意交易行为和评价欺骗,提高网络交易的安全性。 According to the inner security issue of Peer-to-Peer (P2P) networks, a trust model based on direct transaction and recommendation in P2P network was proposed. Parameters of direct transaction information, rating confidence degree of recommendation information and dynamic balance weight were applied in the model. The model described peer' s integration trust simply and accurately, and established trust relationship with target peer before transaction, which can restrain malicious peer to do malice behavior and rating cheat to other peers in the network, and improve the security of network trade.
作者 陈珊珊
出处 《计算机应用》 CSCD 北大核心 2013年第6期1612-1614,共3页 journal of Computer Applications
基金 国家973计划项目(2011CB302903) 国家自然科学基金资助项目(61272084)
关键词 直接信任 推荐信任 动态平衡权重 恶意 direct trust recommendation trust dynamic balance weight malice
作者简介 通信作者电子邮箱moist_css@163.com 陈珊珊(1980-),女,安徽安庆人,副教授,博士,主要研究方向:计算机网络、信息安全。
  • 相关文献

参考文献14

  • 1GKANTSIDIS C, MlHAIL M, SABERI A. Random walks in peer-to-peer networks: Algorithms and evaluation[J). Performance Eval-uation, 2006, 63(3):241-263.
  • 2MASSOUUEL, le MERRER E, KERMARREC A M, et al, Peer counting and sampling in overlay networks: random walk methods[C] / / Proceedings of the 25th Annual ACM Symposium on Princi-ples of Distributed Computing. New York: ACM, 2006 : 123 -132.
  • 3SABATER J, SIERRA C. Reputation and social network analysis in multi-Agent systems[C] / / Proceedings of the 1 st International Joint Conference on Autonomous Agents and Multiagent Systems. New York: ACM, 2002: 1 -8.
  • 4KAMVAR S, SCHLOSSER M, GARCIA-MOUNA H. The eigen-trust algorithm for reputation management in P2P networks[C) / / Proceedings of the 12th International Conference on World Wide Web. New York: ACM, 2003: 640 -651.
  • 5XIONG L, UU L. PeerTrust: Supporting reputation-based trust for peer-to-peer electronic communities[J). IEEE Transactions on Knowledge and Data Engineering, 2004, 16(7): 843 -857.
  • 6ZHOU R, HWANG K. PowerTrust: A robust and scalable reputa-tion system for trusted peer-to-peer computing[J). IEEE Transac-tions on Parallel and Distrihuted Systems, 2007, 18(4): 460 -473.
  • 7ZHOU R, HWANG K, CAl M. GossipTrust for fast reputation ag-gregation in peer-to-peer networks[J). IEEE Transactions on Knowl-edge and Data Engineering, 2008, 20( 9) : 1282 -1295.
  • 8UANG Z Q, SHI W S. PET: A personal trust model with reputation and risk evaluation for P2P resource sharing[C]/ / Proceedings of the 38th Annual Hawaii International Conference on System Sci-ences. Washington, DC: IEEE Computer Society, 2005: 201.
  • 9常俊胜,王怀民,尹刚.DyTrust:一种P2P系统中基于时间帧的动态信任模型[J].计算机学报,2006,29(8):1301-1307. 被引量:101
  • 10AZZEDIN F, RIDHA A. Feedhack behavior and its role in trust assessment for peer-to-peer systems[J]. Telecommunication Sys-tems, 2010( 44) : 253 - 266.

二级参考文献21

  • 1Oram A.. Peer-to-Peer: Harnessing the Power of Disruptive Technology. Sebastopol: O'Reilly Press, 2001
  • 2Aberer K. , Despotovic Z.. Managing trust in a Peer-to-Peer information system. In: Proceedings of the 10th International Conference on Information and Knowledge Management (ACM CIKM), New York, USA, 2001, 310-317
  • 3Kamwar S. D. , Schlosser M. T. , Hector Garcia-Molina. The eigenTrust algorithm for reputation management in P2P networks. In: Proceedings of the 12th International Conference on World Wide Web, Budapest, Hungary, 2003, 640-651
  • 4Damiani E. , De Capitani di Vimereati S. , Parabosehi S. , Samarati P.. Managing and sharing servents' reputations in P2P systems. IEEE Transactions on Data and Knowledge Engineering, 2003, 15(4): 840-854
  • 5Xiong L. , Liu L.. PeerTrust: Supporting reputation-based trust in peer-to-peer communities. IEEE Transactions on Data and Knowledge Engineering, Special Issue on Peer-to-Peer Based Data Management, 2004, 16(7): 843-857
  • 6Srivatsa M. , Xiong L. , Liu L.. TrustGuard: Countering vulnerabilities in reputation management for decentralized overlay networks. In: Proceedings of the 14th World Wide Web Conference(WWW 2005), Chiba, Japan, 2005, 422-431
  • 7Manchala D. W.. E-commerce trust metrics and models. Internet Computing, 2000, 4(2): 36-44
  • 8Stephen M.. Formalising trust as a computational concept[Ph. D. dissertation]. University of Stifling, Scotland, 1994
  • 9Abdul-Rahman A. , Halles S.. A distributed trust model. In:Proceedings of the New Security Paradigms Workshop'97,Cumbria, UK, 1997, 48-60
  • 10Abdul-Rahman A. , Hailes S.. Supporting trust in virtual communities. In: Proceedings of the aard Hawaii International Conference on System Sciences, Maui, Hawaii, 2000, 4-7

共引文献100

同被引文献48

  • 1聂晓文,卢显良,周旭,李梁,徐海湄.DHT算法基本统计特性及其应用[J].四川大学学报(工程科学版),2009,41(5):170-175. 被引量:2
  • 2田敬,代亚非.P2P持久存储研究[J].软件学报,2007,18(6):1379-1399. 被引量:52
  • 3田荣华,卢显良,侯孟书,王晓斌.P2P分布式存储系统[J].计算机科学,2007,34(6):47-48. 被引量:8
  • 4HSIAO H C, LIAO H. Load balance with imperfect informa- tion instructured peer-to-peer systems [J]. IEEE Transactions on Parallel Disturb System, 2011, 22(4): 634-649.
  • 5CHEN S, ZHANG Y, YANG G. Parameter-estimation based trust model for unstructured peer-to-peer networks [J]. IET Communications, 2011, 5(7): 922-928.
  • 6ZHANG De-gan, HU Yu-xia, WANG Dong, et al. A new al- gorithm of service discovery based on DHT for mobile applica- tion [J]. Jouranal of Network, 2011, 6(10) : 1466-1474.
  • 7FAN Chao, HAO Qing, ZHAO Jing-ling. GA-Chord: an im- provement to Chord algorithm based on group autonomy in- structed P2P network [C]// IEEE 3rd International Conference on Broadband Network and Multimedia Technology. [S.1.]: IEEE, 2010: 1001-1004.
  • 8MESHKOVA Elena, RIlHIJVI Janne, PETROVA Marina. Asurvey on resource discovery mechanisms, peer-to-peer and service discovery frameworks [J]. Computer Networks, 2008, 52(11): 2097-2128.
  • 9ANDROUTSELLIS-THEOTOKIS S, SPINELLIS D, LOURI- DAS P, et al. A market-based of peer-to-peer transactions [J] (5): 675-688. approach to managing the risk Computer Networks, 2010, 54.
  • 10GRIFFIN J, JAEGER T, PEREZ R. Trusted virtual domains: toward secure distributed services[C]//Proceedings of the 1st Workshop on Hot Topics in Systems Dependability. Yokohama: IEEE Press, 2005: 1-6.

引证文献4

二级引证文献10

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部