期刊文献+

面向对等网络的主观逻辑信任模型 被引量:1

P2P-oriented trust model based on subjective logic
下载PDF
导出
摘要 由于P2P系统的开放性、匿名性等特征,使得P2P系统对节点实体缺乏有效的管理机制,节点间的信任度无法进行有效的评定,就有可能存在欺诈节点,影响系统的可靠性,针对以上问题,在J准sang主观逻辑理论的基础上,建立了一种基于主观逻辑理论的网络信任模型,该模型通过加权平均和方差来确定信任程度的取值方式,以及不确定度的可靠成分的确定,并在信任模型的基础上添加了风险机制,可以在一定程度上防止协同作弊和诋毁的安全隐患。通过仿真分析表明,这种信任模型能很好地解决P2P网络中存在的安全隐患。 P2P system lacks effective mechanism in terms of peers because of its open nature and user anonymity,so its peer trust cannot be evaluated efficiently, and then reliability of the system will be influenced by the possible cheating peers.Aiming at the security problems,a network trust model based on subjective logic theory(created by Jφsang) can be a better solution.The mod- el is to confirm appropriate value of trust degree and the trustiness proportion among the uncertainty by calculating its weighed average and variance.What's more,risk mechanism is introduced on the basis of the trust model.With the help of all the processes, the trust model can prevent from collaborative cheating and imputation to some degree.According to the simulation analysis,it turns out to be that the trust model is effective to solve the security risk existing in P2P network.
出处 《计算机工程与应用》 CSCD 北大核心 2009年第33期99-102,共4页 Computer Engineering and Applications
基金 江苏省自然科学基金No.BK2007035 中国矿业大学科技基金(No.0D0601624287)~~
关键词 主观逻辑 加权平均 声誉 风险 subjective logic weighted average reputation risk
  • 相关文献

参考文献22

  • 1Khare R,Rifkin A.Weaving a Web of trust[J].World Wide Web,1997, 2(3):77-112.
  • 2Abdul-Rahman A,Hailes SSupporting trust in virtual communities[C]// Proceedings of HICSS33,2000.
  • 3Marsh S.Formalising trust as a computational eoncept[D].Department of Mathematics and Computer Science,University of Stirling, 1994.
  • 4Dellaroeas C,Resnick P.Online reputation mechanisms-A roadmap for future researeh[C]//Proeeedings of 1st Interdisciplinary Symposium on Online Reputation Mechanism,2003.
  • 5Yu B,Singh M P.A social mechanism of reputation management in electronic communities[C]//Proceedings of the 4th International Workshop on Cooperative Information Agents,2000.
  • 6Lv Q,Cao P,Cohen E,et al.Search and replication in unstructured peer-to-peer networks[C]//Proceedings of ACM International Conference on Supercomputing,2002.
  • 7Aberer K,Despotovic Z.Managing trust in a peer-to-peer information system[C]//Proceedings of CIKM,2001.
  • 8Srivatsa M,Xiong L,Liu L.Trustguard:Countering vulnerabilities in reputation management for decentralized overlay networks[C]//Proceedings of WWW,2005.
  • 9Xiong L,Liu L.A reputation-based trust model for peer-to-peer ecommerce communities[C]//Proceedings of IEEE International Conference on Electronic Commerce,2003.
  • 10Xiong L,Liu L.Peertrust:Supporting reputation-based trust for peer-to-peer communities[J].IEEE Transactions on Knowledge and Data Engineering,2004,16.

二级参考文献9

  • 1Marsh S P. Formalising trust as a computational concept [D]. University of Stirling, 1994
  • 2Beth T, Borcherding M, Klein B. Valuation of trust in open networks [A]. In: ESORICS 94 [C]. Brighton, 1994
  • 3Yu Bin, Munindar Singh P. An evidential model of distributed reputation management [A]. In: Proceedings of First International Joint Conference on Autonomous Entities and Multi-Entity Systems [C], 2002. 294-301
  • 4Aberer K, Despotovic Z. Managing trust in a peer-2-peer information system [A]. In: Proceedings of the 10th International Conference on Information and Knowledge Management [C]. New York, 2001
  • 5Abdul Rahman A, Hailes S. A distributed trust model [A]. In: New Security Paradigms Workshop [C]. ACM, 1997
  • 6Fox G. Peer-to-Peer Networks[J]. IEEE Computer in Science & Engineering, 2001, (3): 75-77.
  • 7Dempster A P. Upper and Lower Probability Induced by a Multi-valued Mapping[J]. Annals Mathematical Statistics, 1967, 38(2): 325-339.
  • 8Shafer G. A Mathematical Theory of Evidence[M]. Princeton: Princeton University Press, 1976.
  • 9张键红,伍前红,王育民.基于代理签名链的安全移动代理[J].西安电子科技大学学报,2003,30(6):784-787. 被引量:2

共引文献11

同被引文献15

  • 1http://www, guntella, corn, 2003.
  • 2Kamvar S D, Schlosser M T. EigenRep.-Reputation management in P2P networks [C]// Proceedings of the 12th International WWW Conf. Budapest, 2003 : 123-134.
  • 3Damiani E, Vimercati S D C, et al. Managing and sharing servents' reputation in P2P systems [J]. IEEE Transactions on Knowledge and Data Engineering, 2003,15 (4) : 840-854.
  • 4Damiani E,Vimercati S D C, et al. A reputation-based approach for choosing reliable resources in peer-to-peer networks[C]// Proceedings of the 9th ACNM Conference on Computer and Communications Security(CCS'02). ACM, 2002 .. 207 216.
  • 5JФsang A, Ismall R. The beta reputation system [C] //Proceedings of the 15th Bled Conf. on Electronic Commerce. Bled,Slovenia, 2002 : 708-721.
  • 6Zbou R, Hwang K. PowerTrust: A robust and scalable reputation system for trusted P2P computing[J]. IEEE Transaction on Parallel and Distributed systems, 2007,18 (5).
  • 7Wu Xu, He Jing-xia,Xu Fei. An enhanced trust model based on reputation for P2P networks[C]//IEEE International Conf. on Sensor Networks, Ubiquitous, and Trustworthy Computing. Taichung, Taiwan: IEEE Press, 2008 : 67-73.
  • 8Xiong L, Liu L. A reputation-based trust model for P2P ecommerce communities [C] // Proceedings of IEEE International Conf. on Electronic Commerce, 2003.
  • 9Xiong L, Liu L. PeerTrust:Supporting reputation-based trustfor peer-to-peer communities[J]. IEEE Transactions on Knowledge and Data Engineering, 2004,16.
  • 10Srivatsa M, Xiong L, Liu L. Trustguard : countering vulnerabilities in reputation management for decentralized overlay networks[C]//Proeeedings of WWW. 2005.

引证文献1

二级引证文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部