期刊文献+

一种基于推荐证据的有效抗攻击P2P网络信任模型 被引量:42

A New Trust Model Based on Recommendation Evidence for P2P Networks
下载PDF
导出
摘要 提出一种基于推荐证据的对等网络(Peer-to-Peer,P2P)信任模型RETM(Recommendation Evidence based Trust Model for P2P networks),解决了基于推荐的信任模型中普遍存在的在汇聚推荐信息时无法处理不确定性信息以及强行组合矛盾推荐信息引起的性能下降问题,同时,RETM采取推荐证据预处理措施,在合成之前有效过滤了无用的以及误导性的推荐信息,使得该模型具有一定的抗攻击性能.在推荐信息的查找问题上,RETM提出了基于反馈信息的概率查找算法,该算法在降低了网络带宽开销的情况下,提高了信息查询的准确率.实验证明RETM较已有的信任机制在系统成功交易率、模型的安全性等问题上有较大改进. A novel trust model for P2P networks, namely RETM, a Recommendation Evidence based Trust Model, is presented in this paper. It solves some problems, for instance, not invalidly aggregating incompatible recommendation information and dealing with uncertainty of information in the reputation-based P2P trust model. Before combining the evidences, RETM will filter out noisy recommendation information, and moreover the method makes RETM more robust. In addition a feedback-based probabilistic searching algorithm is proposed to find the recommendation information, which improves the searching success rate and lowers the network traffic. Theoretical analyses and experimental results show that, compared to the current some trust models, the proposed model RETM has advantages in modeling dynamic trust relationship and aggregating recommendation information, moreover, is more robust on trust security problems and more advanced in successful transaction rate.
出处 《计算机学报》 EI CSCD 北大核心 2008年第2期270-281,共12页 Chinese Journal of Computers
基金 国家“九七三”重点基础研究发展规划项目基金(2003CB314806) 国家自然科学基金(60603060,60502037,90604019)资助
关键词 D—S证据合成规则 对等网 信任 信誉 局部信任度 D-S theory of evidence P2P trust reputation local trust value
  • 相关文献

参考文献24

  • 1Kamvar S, Schlosser M. The EigenTrust algorithm for reputation management in P2P networks//Proceedings of the 12th International Conference on World Wide Web (WWW'03). Budapest, Hungary, 2003:640-651
  • 2窦文,王怀民,贾焰,邹鹏.构造基于推荐的Peer-to-Peer环境下的Trust模型[J].软件学报,2004,15(4):571-583. 被引量:325
  • 3Yamamoto A, Asahara D, Itao T. Distributed pagerank:A distributed reputation model for open P2P networks//Proceedings of the International Symposium on Applications and the Internet Workshops (SAINTW' 04). Japan, 2004 : 389- 396
  • 4Altman J. PKI Security for JXTA overlay networks. Sun Microsystem, Palo Alto: Technical Report TR-I2-03-06, 2003
  • 5Cornelli F, Damiani E, Vimercati D C. Choosing reputable servents in a P2P network//Proceedings of the 11th International Conference on World Wide Web (WWW'02). ACM Press, Hawaii, 2002:441-449
  • 6Wang Y, Vassileva J. Trust and reputation model in Peer-to- Peer networks//Proceedings of the 3th International Conference on Peer-to-Peer Computing(P2P'03). Washington, DC, USA, 2003:150-159
  • 7Damiani E, Vimereati D C, Paraboschi S, Samarati P, Violante F. A reputation-based approach for choosing reliable resources in P2P networks//Proceedings of the 9th ACM Conference on Computer and Communications Security. New York, 2002:207-216
  • 8Yu B, Singh M P. An evidential model of distributed reputation management//Proeeedings of the ACM International Conference Autonomous Agents and Multi-Agent Systems (AAMAS'02). Bologna, Italy, 2002:82-93
  • 9Yu B, Singh M P, Sycara K. Developing Trust in large-scale Peer-to-Peer systems//Proceedings of the 1st IEEE Symposium on Multi-Agent Security and Survivability. Philadelphia, 2004 : 1-10
  • 10Song S S, Hwang K, Zhou R F. Trusted P2P transactions with fuzzy reputation aggregation. IEEE Internet Computing 2, 2005, 9(6): 18-28

二级参考文献16

  • 1[1]Ronald R.Yager.On the dempster-shafer framework and new combination rules[J].Information Sciences,1987,41:93-137.
  • 2[2]G.Shafer.A mathematical theory of evidence[M].Princeton U.P.,Princeton,1976.
  • 3[3]A.P.Dempster.Upper and lower probabilities induced by a multi-valued mapping[J].Ann.Math.Statist.1967,38:325-339.
  • 4Ian Foster, Carl Kesselman, Steven Tuecke. The anatomy of the grid. International J. Supercomputer Applications. http://www.globus.org/research/papers/anatomy.pdf, 2001.
  • 5Andy Oram. Peer to Peer: Harnessing the Power of Disruptive Technologies. New York: O'Reilly & Associates, 2001.
  • 6R. Khare, A. Rifkin. Weaving a Web of trust. World Wide Web, 1997, 2(3): 77~112.
  • 7G. Caronni. Walking the Web of trust. In: Proc. the 9th Workshop on Enabling Technologies (WET ICE' 2000 ) . Los Alomitos, CA: IEEE Computer Society Press, 2000.
  • 8T. Beth, M. Borcherding, B. Klein. Valuation of trust in open networks. In: Proc. the 3rd European Symposium on Research in Computer Security. Brighton: Springer-Verlag, 1994. 3~18.
  • 9A. Abdul-Rahman, S. Hailes. A distributed trust model. In:Proc. the 1997 New Security Paradigms Workshop. Cumbnia:ACM Press, 1997. 48~60.
  • 10J. Scott. Social Network Analysis: A Handbook. Oxford: SAGE Publications, 2000.

共引文献796

同被引文献334

引证文献42

二级引证文献191

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部