期刊文献+

P2P网络环境下的推荐信任模型方案 被引量:14

Recommendation Trust Model Scheme for P2P Network Environment
下载PDF
导出
摘要 针对对等(P2P)网络的匿名性和动态性带来的安全问题以及传统的信任管理模型并不能很好地适应对等网络环境,提出了一种基于推荐的P2P网络信任模型.首先定义了节点的信任度,然后根据节点的直接信任值、其他节点的推荐信任值和相应的惩罚值来计算节点的信任度,最后提出了基于推荐的信任模型的实现策略.仿真实验表明,基于推荐的信任模型能有效评估节点的信任度,交易成功率优于传统的信任管理模型. The traditional trust manage model can not satisfy the P2P environment commendably. A recommendation-based trust model in P2P network is proposed. The peer's recommendation degree is defined, and then the peer's trust value is assessed according to the direct trust value, the other peer's recommendation trust value and the corresponding penalty value. The implement strategy of recommendation-based trust model is also proposed. Simulations show that the recommendation-based trust model is able to assess the peer's trust value more effectively, surpass the traditional trust management model in the transaction success ratio.
出处 《北京邮电大学学报》 EI CAS CSCD 北大核心 2009年第3期69-72,共4页 Journal of Beijing University of Posts and Telecommunications
基金 国家高技术研究发展计划项目(2006AA01Z419) 国家自然科学基金重大研究计划项目(90604023)
关键词 对等网络 信任值 信誉值 基于推荐的信任模型 peer to peer trust value reputation value recommendation-based trust model
  • 相关文献

参考文献9

  • 1Tran H, Hitchens M, Varadharajan V, et al. A trust based access control framework for P2P file-sharing systems[ C]//Proceedings of 38th Annual Hawaii International Conference on System Sciences (HICSS' 05 ). Los Alamitos: IEEE Computer Society, 2005: 302c-302c.
  • 2Xiong Li, Liu Ling. Peer trust: supporting reputationbased trust for peer-to-peer electronic communities [J ]. IEEE Trans on Knowledge and Data Engineering, 2004, 16(7) : 843-857.
  • 3Apostolos T, Barry M G. Peer-to-peer networks based on hierarchies of trust[C]//Proceedings of the 5th IEEE International Conference on Peer-to-Peer Computing. Washington: IEEE Computer Society, 2005: 160-161.
  • 4Kamvar S D, Schlosser M T, Garcia-Molina H. Eigen-Rep: reputation management in P2P networks[ C]//Pro- ceedings of the 12th International World Wide Web Conference. New York: ACM Press, 2003: 123-134.
  • 5Wang Yao, Vassileva J. Agents and peer-to-peer computing[M]. Berlin: Springer, 2004: 23-34.
  • 6刘义春.一个基于信任的P2P访问控制模型[J].计算机工程与应用,2008,44(1):145-147. 被引量:4
  • 7文珠穆,卢正鼎,唐卓,辜希武.基于RBAC的P2P网络环境信任模型研究[J].计算机科学,2008,35(6):32-36. 被引量:5
  • 8田春岐,邹仕洪,王文东,程时端.构造分布式P2P环境下抗攻击信任管理模型[J].北京邮电大学学报,2007,30(3):62-65. 被引量:6
  • 9李祖鹏,黄建华,唐辉.基于P2P计算模式的自组织网络路由模型[J].软件学报,2005,16(5):916-930. 被引量:24

二级参考文献57

  • 1王玉峰,王文东,袁刚,程时端.Ad Hoc网络中基于Vickrey拍卖的协作激励机制的研究[J].北京邮电大学学报,2005,28(4):50-53. 被引量:6
  • 2Dabek F, Kaashoek MF, Karger D, Morris R, Stoica I. Wide-Area cooperative storage with CFS. In: Proc. of the 18th ACM Symp.on Operating Systems Principles (SOSP 2001). Chateau Lake Louise, 2001. 344-352.
  • 3Glewin D. Consistent hashing and random trees: Algorithms for caching in distributed networks [MS. Thesis]. Department of EECS,MIT, 1998. http://thesis.mit.edu/
  • 4Karger D, Lehman E, Leighton F, Levine M, Lewin D, Panigrahy R. Consistent hashing and random trees: Distributed caching protocols for relieving hot spots on the World Wide Web. In: Proc. of the 29th Annual ACM Symp. on Theory of Computing. El Paso, 1997. 654-663.
  • 5Gupta A, Liskov B, Rodrigues R. One hop lookups for peer-to-peer overlays. In: Proc. of the 9th Workshop on Hot Topics in Operating Systems (HOTOS IX). 2003.452-458.
  • 6Ratnasamy S, Shenker S, Stoica I. Routing algorithms for dhts: Some open questions. In: Proc. of the IPTPS02. Cambridge, 2002.http://www. cs.rice.edu/Conferences/IPTPS02/
  • 7Zegura E, Calvert KL, Bhattacharjee S. How to model an internetwork. In: Sohraby K, ed. Proc. of the IEEE Infocom'96. San Francisco: IEEE Computer Society Press, 1996. 594-602.
  • 8Lv Q, Cao P, Cohen E, Li K, Shenker S. Search and replication in unstructured peer-to-peer networks. In: Proc. of the 16th ACM Int'l Conf. on Supercomputing (ICS 2002). 2002. 254-261.
  • 9Maymounkov P, Mazieres D. Kademlia: A peer-to-peer information system based on the XOR metric. In: Proc. of the 1st Int'l Workshop on Peer-to-Peer Systems (IPTPS 2002). 2002. 153-161.
  • 10Weatherspoon H, Kubiatowicz J. Efficient heartbeats and repair of softstate in decentralized object location and routing systems. In:Proc. of the ACM SIGOPS European Workshop 2002. 2002.231-238.

共引文献33

同被引文献144

引证文献14

二级引证文献67

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部