期刊文献+

P2P网络信任数据存储机制综述 被引量:1

Survey of Trust Data Storage Mechanism in Peer-to-Peer Network
下载PDF
导出
摘要 P2P网络以其在动态、自组织、伸缩性、鲁棒性、资源利用率等方面的优势,已经发展成为当前互联网络的重要分支并获得广泛应用。但由于P2P支持用户匿名访问,其中包含大量恶意节点,因而存在安全隐患,故须依赖信任机制保证对等节点间的协作,其中信任数据存储成为一个关键问题。首先介绍P2P信任模型的基本构成,进而对目前P2P信任模型中常用的信任数据存储技术作了深入研究,同时通过分析对比总结各自的优缺点,最后提出理想的信任数据存储方案应具备的特征。 Because of many good features, such as dynamic, auto organized, scalability, robust and resource utility, peer-to-peer (P2P) network becomes to an important branch of Internet and has been widely applied. But because P2P network permits anonymous access including many malicious peers, which bring many security problems to P2P network, cooperation between peer and peer must be supported by trust relation established between peer and peer. This paper focused on the issue of trust data storage. Firstly the components of general trust model were introduced. Next several typical trust data storage models of P2P were discussed. After careful analyzed, these models display their advantages and disadvantages. Finally this paper puts forward the essential features of the ideal trust data storage model.
出处 《计算机科学》 CSCD 北大核心 2008年第11期23-27,共5页 Computer Science
基金 国家863计划(2007AA01Z422) 安徽省高校教师青年基金(2007jq1061) 安徽省教育厅自然科学研究项目(2005kj088)
关键词 P2P 信任 存储 分布Hash袁 Peer-to-peer, Trust, Storage, DHT
  • 相关文献

参考文献13

  • 1P2P Group. http://www. p2p. org
  • 2Adar E , Huberman B. Free Riding on Gnutella [R]. Xerox PARC, 2000
  • 3Feldmany M, Laiz K. Quantifying disincentives in peer- to- peer networks[C]//Workshop on economies of peer-to-peer systems [M]. LNCS 2735. Berkeley. CA: Springer-Verlag, 2003 : 117-122
  • 4Caronni G. Walking the Web of trust [C] // Sriram RD, ed. Proc. of the IEEE 9th Int'l Workshops on Enabling Technologies. Infrastructure for Collaborative Enterprises. IEEE Press, 2000:153-159
  • 5Altman J. PKI Security for JXTA Overlay Networks[R]. TRI2-03-06. Palo Alto: Sun Microsystem, 2003
  • 6Sig2dat specification, http://www. geocities. com/vlaibb/.2002
  • 7Cornelli F. Choosing reputable servents in a P2P network[C]// Lassner D, ed. Proc. of the 11th Int'l World Wide Web Conf. Hawaii: ACM Press, 2002 : 441-449
  • 8Kamvar S D, Schlosser M T. EigenRep: Reputation management in P2P networks [C]//Proceedings of the 12th Int'l World Wide Web Conference. Budapest: ACM Press: 123-134
  • 9Zhang Zhen, et al. A P2P Global Trust Model Based on Recom mendation[C]//Proceedings of the Fourth International Conference on Machine Learning and Cybernetics. Guangzhou, August 2005
  • 10Stoica I, et al. Chord: A Sealable Peer-to-peer Lookup Service for Internet Applications[C]//SIGCOMM'01. San Diego, California, USA, August 2001

共引文献324

同被引文献15

  • 1秦艳琳,吴晓平,高键鑫.分布式环境下信任路径选择性搜索及聚合研究[J].通信学报,2012,33(S1):148-156. 被引量:6
  • 2QIN F L, GE L S, LIU Q, et al. Free riding analysis of peer to peer streaming systems [J]. Journal of Computational Information Systems, 2011, 7(3): 721-728.
  • 3DIAN S M, RAMADOSS B. A trust agent based incentive mechanism for file sharing in P2P networks [C] // 2nd International Conference on Trends in Information Sciences and Computing Proceeding. Chennai: IEEE, 2010: 167-170.
  • 4SEPANDAR D K, MARIO T S, HECTOR G M. The EigenTrust algorithm for reputation management in P2P networks [C] // Proceedings of the 12th International Conference on World Wide Web. Budapest: ACM, 2003: 640-650.
  • 5ZHOU R, HWANG K. PowerTrust: a robust and scalable reputation system for trusted Peer-to-Peer computing [J]. IEEE Transactions on Parallel and Distributed Systems, 2007, 18(4): 460-473.
  • 6XIONG L, LU L. PeerTrust: supporting reputation-based trust for Peer-to-Peer electronic communities [J]. IEEE Transactions on Knowledge Data Engineering, 2004, 16(7): 843-857.
  • 7FEDOTOVA N, VELTRI L. Reputation management algorithms for DHT-based peer-to-peer environment [J]. Computer Communications, 2009, 32(12): 1400-1409.
  • 8LEE S, SHERWOOD R, BHATTACHARJEE B. Cooperative peer groups in NICE [C] //Infocom Twenty-second Joint Conference of the IEEE Computer and Communications IEEE Societies. San Francisco: IEEE, 2003: 1272-1282.
  • 9SEN J. A secure and efficient searching scheme for trusted nodes in a peer-to-peer network [C]// Lecture Notes in Computer Science, 2011: 100-108.
  • 10ZHAO H Y, YANG X, LI X L. cTrust: trust aggregation in cyclic mobile ad hoc networks [C]// Lecture Notes in Computer Science, 2010: 454-465.

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部