期刊文献+

A Secure Trust Model for P2P Systems Based on Trusted Computing 被引量:1

A Secure Trust Model for P2P Systems Based on Trusted Computing
下载PDF
导出
摘要 Trust is one of the most important security requirements in the design and implementation of peer-to-peer (P2P) systems. In an environment where peers' identity privacy is important, it may conflict with trustworthiness that is based on the knowledge related to the peer's identity, while identity privacy is usually achieved by hiding such knowledge. A trust model based on trusted computing (TC) technology was proposed to enhance the identity privacy of peers during the trustworthiness evaluation process between peers from different groups. The simulation results show that, the model can be implemented in an efficient way, and when the degree of anonymity within group (DAWG) is up to 0.6 and the percentage of malicious peers is up to 70%, the service selection failure rate is less than 0.15. Trust is one of the most important security requirements in the design and implementation of peer-to-peer (P2P) systems. In an environment where peers' identity privacy is important, it may conflict with trustworthiness that is based on the knowledge related to the peer's identity, while identity privacy is usually achieved by hiding such knowledge. A trust model based on trusted computing (TC) technology was proposed to enhance the identity privacy of peers during the trustworthiness evaluation process between peers from different groups. The simulation results show that, the model can be implemented in an efficient way, and when the degree of anonymity within group (DAWG) is up to 0.6 and the percentage of malicious peers is up to 70%7 the service selection failure rate is less than 0.15.
出处 《Journal of Shanghai Jiaotong university(Science)》 EI 2008年第1期86-90,共5页 上海交通大学学报(英文版)
基金 The National High-Tech Research and Development (863) Program of China (No. 2005AA145110, No. 2006AA01Z436) The Natural Science Foundation of Shanghai (No. 05ZR14083) The Pudong New Area Technology Innovation Public Service Platform of China (No. PDPT2005-04)
关键词 点对点传输系统 计算机技术 网络技术 安全技术 peer-to-peer trust model trusted computing direct anonymous attestation pseudonym
  • 相关文献

参考文献10

  • 1Pavlov E,Rosenschein J S,Topol Z.Supporting privacy in decentralized additive reputation sys-tems[].Proceedings of the nd International Conference on Trust Management.2004
  • 2Miranda H,Rodrigues L.A framework to provide anonymity in reputation systems[].Proceedings of the rd Annual International Conference on Mobile and Ubiquitous Systems: Networks and Services.2006
  • 3Felten E W.Understanding trusted computing: will its benefits outweigh its drawbacks[].IEEE Security & Privacy.2003
  • 4Brickell E,Camenisch J,Chen L.Direct anonymous at-testation[].Proceedings of the th ACM Conference on Computer and Communications Security.2004
  • 5Atenitse G,Camenisch J,Joye M, et al.A practical and provably secure coalition-resist ant group signature scheme[].Advances in Cryptology-CRYPTO‘.2000
  • 6Bertino E,Ferrari E,Squicciarini A.Trust-X: A peer-to-peer framework for trust establishment[].IEEE Transaction on Knowledge and Data Engineering.2004
  • 7Song S S,Hwang K,Zhou R F.Trusted P2P transactions with fuzzy reputation aggregation[].IEEE Internet Computing.2005
  • 8Damiani E,De Capitani di Vimercati S,Paraboschi S, et al.Managing and sharing servents‘ reputations in P2P systems[].IEEE Transaction on Data and Knowledge Engineering.2003
  • 9Seigneur J M,Jensen C D.Trading privacy for trust[].Proceedings of the nd International Conference on Trust Management.2004
  • 10Bradshaw R W,Holt J E,Seamons K E.Concealing complex policies with hidden creden-tials[].Proceedings of the th ACM Conf on Computer and Communications Security.2004

同被引文献7

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部