期刊文献+

基于信任的P2P真实性查询及副本管理算法 被引量:4

P2P Authenticity Query and Replica Management Algorithm Based on Trust
下载PDF
导出
摘要 文档安全性对于信息共享Peer-to-Peer(或P2P)系统而言是一项重要的性能指标,以P2P系统的文档安全性优化为目标.P2P系统的文档安全性主要取决于两方面的因素:其载体的安全性和文档相关机制的构造,如副本管理等.对于P2P这样高度自主的分布式系统而言,文档安全性的提高无法依赖于结点安全性的提高,而应依靠对文档相关机制的控制来实现.首先设计了一个对文档安全性敏感的查询协议,以该查询协议为基础,与文档相关的机制就可以形式化地表述为函数,而系统文档安全性的提高就转化为函数空间上的数学分析.基于函数分析的结果,设计了一套旨在提高文档真实性的副本管理算法集合.理论分析的结果表明:在理想情况下,该算法集合可达到文档真实性的优化.对于实际系统,经过大量的模拟实验结果验证,该算法集可以获得良好的效果,接近优化水平. For the information sharing Peer-to-Peer (or P2P) systems, the document security is an important metric to evaluate the performance, so this paper concentrates on the optimization of document security in file sharing P2P system. For the highly autonomous P2P systems, because the document security in P2P systems mainly depends on two aspects: the security of the documents' carrier and the mechanisms related to the document, such as the replica management, the improvement of the document security can not depend on the improvement of the peers' security, but rely on the mechanisms related to the document. A query protocol sensitive to the document security is designed first in this paper. Based on this protocol, the mechanisms related to the document can be formally described as functions, and the improvement of the system document security can be transformed into the mathematical analyses on the function space. Derived from the results of mathematical analyses, a set of algorithms for replica managements are designed, aiming at improving the document security. In ideal situation, this set of algorithms can achieve the optimization for document security seen from the theoretical analyses, and in realistic systems, the algorithms can obtain good effects, approach to the optimal level. The algorithms are verified by lots of experimental results.
出处 《软件学报》 EI CSCD 北大核心 2006年第4期939-948,共10页 Journal of Software
基金 哈尔滨工业大学基金~~
关键词 P2P网络 文档真实性 查询协议 副本管理 文档安全性 peer-to-peer network document authenticity query protocol replica management trust
  • 相关文献

参考文献11

  • 1Andy O.Peer-to-Peer:Harnessing the Power of Disruptive Technologies.O'Reilly & Associates,Inc.,2001.3-159.
  • 2Neil D,Hector GM,Beverly Y.Open problems in data-sharing peer-to-peer systems.In:Proc.of the 9th Int'l Conf.on Database Theory.Siena:Springer-Verlag,2003.1-15.
  • 3Ernesto D,Sabrina DC,Stefano P,Pierangela S,Fabio V.A reputation-based approach for choosing reliable resources in peer-to-peer networks.In:Proc.of the 9th ACM Conf.on Computer and Communications Security.Washington:ACM Portal Press,2002.207-216.http://www.comp.nus.edu.sg/~ooibc/courses/cs6203/reputation-based-approach.pdf
  • 4Yao W,Julita V.Trust and reputation model in peer-to-peer networks.In:Proc.of the 3rd IEEE Int'l Conf.on Peer-to-Peer Computing.Linkǒping:IEEE Computer Society,2003.150-158.
  • 5Khambatti M,Dasgupta P,Ryu KD.A role-based trust model for peer-to-peer communities and dynamic coalitions.In:Proc.of the 2nd IEEE Int'l Information Assurance Workshop.Charlotte:IEEE Computer Society,2004.141-154.
  • 6Neil D,Hector GM.Query-Flood DoS attacks in Gnutella.In:Proc.of the 9th ACM Conf.on Computer and Communications Security.Washington:ACM Press,2002.181-192.
  • 7Brian FC,Mayank B,Neil D,Sergio M,Hector GM.Authenticity and availability in PIPE networks.Future Generation Computer Systems,2005,21(3):391-400.
  • 8Anwitaman D,Manfred H,Karl A.Beyond "Web of trust":Enabling P2P e-commerce.In:Proc.of the IEEE Int'l Conf.on Electronic Commerce.Newport Beach:IEEE Computer Society,2003.303-312.
  • 9Sepandar DK,Mario TS,Hector GM.The EigenTrust algorithm for reputation management in P2P networks.In:Proc.of the 12th Int'l Conf.on World Wide Web.Budapest:ACM Press,2003.640-651.
  • 10Gnutella.http://www.gnutella.com/.2005.

同被引文献34

引证文献4

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部