期刊文献+

DyTrust:一种P2P系统中基于时间帧的动态信任模型 被引量:101

DyTrust: A Time-Frame Based Dynamic Trust Model for P2P Systems
下载PDF
导出
摘要 针对现有的信任模型对节点行为改变的动态适应能力和对反馈信息的有效聚合能力支持不足,提出一个基于时间帧的动态信任模型DyTrust,使用时间帧标示出经验和推荐的时间特性,引入近期信任、长期信任、累积滥用信任和反馈可信度4个参数来计算节点信任度,并通过反馈控制机制动态调节上述参数,提高了信任模型的动态适应能力.仿真实验表明,与已有的信任模型相比,DyTrust具有更好的动态适应能力和反馈信息有效聚合能力,能够有效处理动态恶意节点策略性的行为改变和不诚实反馈对系统的攻击. An important challenge regarding peer's trust valuation in P2P systems is how to cope with strategically altering behaviors and dishonest feedbacks of malicious peers efficiently. However, the trust models employed by the existing systems do not provide adequate support to coping with quick changes in peers' behavior and aggregating feedback information, so the authors present a time-frame based dynamic trust model DyTrust. After incorporating time dimension using time-frame, which captures experience and recommendation's time-sensitivity, the authors also introduce four trust parameters in computing trustworthiness of peers, namely, short time trust, long time trust, misusing trust accumulation and feedback credibility. Together, these parameters are adjusted in time to reflect the dynamics of the trust environment using feedback control mechanism, thus, the trust evaluation has better adaptability to the dynamics of trust. Theoretical analysis and simulation show that DyTrust has advantages in modeling dynamic trust relationship and aggregating feedback information over the existing trust metrics. It is highly effective in countering malicious peers regarding strategic altering behavior and dishonest feedbacks of malicious peers.
出处 《计算机学报》 EI CSCD 北大核心 2006年第8期1301-1307,共7页 Chinese Journal of Computers
基金 国家"九七三"重点基础研究发展规划项目基金(2005CB321800) 国家自然科学基金(90412011) 国家"八六三"高技术研究发展计划项目基金(2003AA115210 2003AA115410 2005AA112030)资助.
关键词 对等网络 反馈 动态信任模型 peer to peer feedback dynamic trust model
  • 相关文献

参考文献21

  • 1Oram A.. Peer-to-Peer: Harnessing the Power of Disruptive Technology. Sebastopol: O'Reilly Press, 2001
  • 2Aberer K. , Despotovic Z.. Managing trust in a Peer-to-Peer information system. In: Proceedings of the 10th International Conference on Information and Knowledge Management (ACM CIKM), New York, USA, 2001, 310-317
  • 3Kamwar S. D. , Schlosser M. T. , Hector Garcia-Molina. The eigenTrust algorithm for reputation management in P2P networks. In: Proceedings of the 12th International Conference on World Wide Web, Budapest, Hungary, 2003, 640-651
  • 4Damiani E. , De Capitani di Vimereati S. , Parabosehi S. , Samarati P.. Managing and sharing servents' reputations in P2P systems. IEEE Transactions on Data and Knowledge Engineering, 2003, 15(4): 840-854
  • 5Xiong L. , Liu L.. PeerTrust: Supporting reputation-based trust in peer-to-peer communities. IEEE Transactions on Data and Knowledge Engineering, Special Issue on Peer-to-Peer Based Data Management, 2004, 16(7): 843-857
  • 6Srivatsa M. , Xiong L. , Liu L.. TrustGuard: Countering vulnerabilities in reputation management for decentralized overlay networks. In: Proceedings of the 14th World Wide Web Conference(WWW 2005), Chiba, Japan, 2005, 422-431
  • 7Manchala D. W.. E-commerce trust metrics and models. Internet Computing, 2000, 4(2): 36-44
  • 8Stephen M.. Formalising trust as a computational concept[Ph. D. dissertation]. University of Stifling, Scotland, 1994
  • 9Abdul-Rahman A. , Halles S.. A distributed trust model. In:Proceedings of the New Security Paradigms Workshop'97,Cumbria, UK, 1997, 48-60
  • 10Abdul-Rahman A. , Hailes S.. Supporting trust in virtual communities. In: Proceedings of the aard Hawaii International Conference on System Sciences, Maui, Hawaii, 2000, 4-7

二级参考文献9

  • 1Blaze M, Feigenbaum J, Ioannidis J, Keromytis AD. The role of trust management in distributed systems security. In: Secure Internet Programming: Issues for Mobile and Distributed Objects. Berlin: Springer-Verlag, 1999. 185-210.
  • 2Beth T, Borcherding M, Klein B. Valuation of trust in open network. In: Gol!mann D, ed. Proceedings of the European Symposiumon Research in Security (ESORICS). Brighton: Springer-Verlag, 1994. 3-18.
  • 3Jcsang A. The right type of trust for distributed systems. In: Meadows C, ed. Proceedings of the 1996 New Security Paradigms Workshop. Lake Arrowhead: ACM Press, 1996.
  • 4Jcsang A, Knapskog SJ. A metric for trusted systems. In: Global IT Security. Wien: Austrian Computer Society, 1998. 541-549.
  • 5Jcsang A. A subjective metric of authentication. In: Quisquater J, ed. Proceedings of the ESORICS'98. Louvain-la-Neuve.:Springer-Verlag, 1998. 329-344.
  • 6Gambetta D. Can we trust trust? In: Gambetta D, ed. Trust: Making and Breaking Cooperative Relations. Basil Blackwell: Oxford Press, 1990. 213-237.
  • 7Reiter MK, Stubblebine SG. Toward acceptable metrics of authentication. In: Proceedings of the 1997 IEEE SYmposium on Research in Security and Privacy. Oakland: ACM Press, 1998.
  • 8Levien LR. Attack resistant trust metric [Ph.D. Thesis]. Berkeley: University of California, 2002.
  • 9徐锋,吕建.Web安全中的信任管理研究与进展[J].软件学报,2002,13(11):2057-2064. 被引量:113

共引文献582

同被引文献912

引证文献101

二级引证文献518

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部