期刊文献+

一种P2P网络环境下遏制节点摇摆行为的全局信任模型 被引量:1

A Global Trust Model to Suppress the Oscillating Behavior of Peers for P2P Environments
下载PDF
导出
摘要 现有信任模型对节点行为的突然改变不能做出迅速地反应,动态性适应能力支持不足.引入反馈控制机制,提出了一种P2P网络环境下的全局信任模型,并给出模型的分布式实现策略.该模型排除了P2P网络中很难确定的高信任节点集合,并通过对反馈信息的有效聚合增强信任系统的动态适应能力,有效地遏制恶意节点的动态摇摆行为,提高了P2P网络中共享文件的下载成功率.仿真结果显示,在有50%的动态摇摆恶意节点的P2P文件共享网络环境下,真实文件下载的平均成功率是用于比较现有模型的1.5倍. Existing trust models can not provide adequate reaction to quick changes in peers' behavior, and thus lack dynamic adaptability. A global trust model integrating feedback control mechanism for P2P networks was proposed, which includes a distributed implementation. The model excludes pre-trusted peers, who are hardly determined in P2P systems, and enhances the dynamic adaptability of trust systems by aggregating feedback information. It can efficiently suppress malicious peers' oscillating behavior and improve the successful download ratio of files in P2P file-sharing networks. Simulation results show that the average download ratio of authentic files is 1.5 times bigger than the global trust models under comparison when malicious oscillating peers is 50 percent of the population in P2P file-sharing networks.
出处 《湖南大学学报(自然科学版)》 EI CAS CSCD 北大核心 2008年第8期68-72,共5页 Journal of Hunan University:Natural Sciences
基金 湖南省自然科学基金资助项目(06JJ20049) 湖南省教育厅科研基金资助项目(03C162)
关键词 对等网络 信任 摇摆行为 分布式哈希表 Peer-to-Peer trust oscillating behavior distributed hash table
  • 相关文献

参考文献12

  • 1LIANG J, KUMAR R, XI Y, et al. Pollution in P2P file sharing syztems[ C]//Proe of the IEEE Infocom 2005. Miami: IEEE Press, 2005:1174 - 1185.
  • 2KAMWAR S D, SCHLOSSER M T, GARCIA-MOLINA H. The EigenTrust algorithm for reputation management in P2P networks[C]//Proc of the 12th Int'l World Wide Web Conf. Budapest: ACM Press, 2003:640 - 651.
  • 3ZHOU R, HWANG K. PowerTrust: a robust and sealable reputation system for trusted peer-to-peer computing [ J ]. IEEE Transactions on Parallel and Distributed Systems, 2007, 18 (5): 460 - 473.
  • 4X IONG L, LIU L. PeerTrust:supporting reputation-based trust for peer-to-peer electronic communities[J]. IEEE Transactions on Knowledge and Data Engineering, 2004,16 (7) :843 - 857.
  • 5SRIVATSA M, XIONG L, LIU L, TrustGuard:eountering vulnerabilities in reputation management for decent ralized overlay networks[C]//Proc of the 14th World Wide Web Conference (WWW 2005). Chiba: IEEE Press,2005:422 - 431.
  • 6窦文,王怀民,贾焰,邹鹏.构造基于推荐的Peer-to-Peer环境下的Trust模型[J].软件学报,2004,15(4):571-583. 被引量:325
  • 7李景涛,荆一楠,肖晓春,王雪平,张根度.基于相似度加权推荐的P2P环境下的信任模型[J].软件学报,2007,18(1):157-167. 被引量:115
  • 8HAVELIWALA T H, KAMVAR S D. The second eigenvalue of the google matrix[R/OL]. Technical Report, Stanford University [2003]. http ://dbpubs. stanford. edu/pub/2003 - 20.
  • 9KAMVAR S D, HAVELIWALA T H, MANNING C D,et al. Extrapolation methods for accelerating Page.Rank computations [ C] //Proc of the Twelfth International World Wide Web Conference. New York:ACM Press, 2003: 261- 270.
  • 10RATNASAMY S. Routing algorithms for DHTs:some open questions[C]//Proc of the 1st Int'l Workshop on Peer-to-Peer Systems. Cambridge: Springer-Verlag, 2002:45 - 52.

二级参考文献2

共引文献394

同被引文献9

  • 1LIANG J, KUMAR R,XI Y, et al.Pollution in P2P file sharing systems[C].Proc of the IEEE Infocom.Miami:IEEE Press,2005: 1174-1185.
  • 2LIU Yu-mei,YANG Shou-bao,GUO Lei-tao,et al .A distributed trust-based reputation model in P2P system[C]. Eighth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing,2007: 294-299.
  • 3Altman J.PKI security for JXTA overlay networks[R].Technical Report,Sun Microsystem,2003.
  • 4Khambatti M, Dasgupta P, Ryu K D.A role-based trust-model for peer-to-peer communities and dynamic eoalitions[C].Proc of the 2nd IEEE Int'l Information Assurance-Workshop,2004.
  • 5Cornelli F. Choosing reputable servents in a P2P network [C]. Proc of the 11th Int'l World Wide Web Conf.Hawaii:ACM Press,2002:441-449.
  • 6Kamvar S D,Schlosser M T.EigenRep:reputation management in P2P networks[C].Proc of the 12th Int'l World Wide Web Conf. Budapest:ACM Press,2003:123-134.
  • 7RATNASAMY S. Routing algorithms for DHTs: some open questions[C].Proc of the 1 st Int'l Workshop on Peer-to-Peer Systems.Cambridge:Springer-Verlag,2002:45-52.
  • 8STOICA I,MORRIS R,KARGER D,et al .Chord:a scalable peer- to-peer lookup service for internet applications[C].Proc of SIGCOMM 2001 .San Deigo:ACM Press,2001 : 149-160.
  • 9SCHLOSSER M T, CONDIE T E,KAMWAR S D.Simulating a file-sharing P2P network[C].Proc of the 1st Workshop on Semantics in P2P and Grid Computing.Budapest:ACM Pres,2003: 69-80.

引证文献1

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部