期刊文献+

P2P文件共享系统中基于分类名誉值的信任机制

Credible Mechanism Based on the Assorted Reputation Value of P2P File Sharing System
下载PDF
导出
摘要 针对名誉机制中的一个节点只设一个名誉值产生的'节点名誉值失信'问题,提出一种结合资源类别、钱和名誉值的CMARCH机制,对每个节点的每类资源均设一个名誉值.消费者节点在购买资源时使用该类资源的特有货币付给资源提供者,依据挣得的货币量来决定提供者节点该类资源的名誉值,从而为一个节点挑选某类资源的服务节点提供更大的可靠性和真实性,降低了多付钱率和交易失败率,提高了准确性,同时可以促进P2P文件共享系统中各节点提供资源种类的多元化.理论分析和实验结果表明,CMARCH机制的多付钱率和交易失败率比单纯的结合钱和名誉值的MARCH机制低,且更能保证节点间的成功交易. This paper proposed a CMARCH reputation mechanism, which is a combination of Category, Money and Reputation sCHemes, in order to solve the "node reputation's credible lose" brought about from only one reputation value corresponding to a node. In this mechanism, consumer node pays the resource provider through a special "coin" under its resource control, and the provider node's resource reputation value will be increased by the amount of the incoming "coin". All these functions will provide a greater reliability and enhance reality in selecting resource provider node. The mechanism reduces the "overpaid money ratio" (the total paid money divided by overpaid money) and "failed transaction ratio" ( the total number of transactions divided by the number of failed transaction), and improve the accuracy. Meanwhile, it may increase the node's resource diversity in P2P file sharing system. Analysis and experiments have shown that the overpaid money ratio and failed transaction ratio of CMARCH are lower than MARCH (Money and Reputation sCHemes), which ensures a successful transaction between nodes.
出处 《湖南大学学报(自然科学版)》 EI CAS CSCD 北大核心 2010年第4期77-80,共4页 Journal of Hunan University:Natural Sciences
基金 国家973计划资助项目子课题(2007CB310702) 广东省自然科学基金资助项目(7007730) 广东省科技计划资助项目(0711020400157) 湖南省自然科学基金资助项目(09JJ3124) 东莞市科技资助项目(2007108101021 2006101101032)
关键词 文件共享 P2P(Peer—To—Peer) 名誉 CMARCH机制 多付钱率 file sharing P2P reputation CMARCH (Category, Money and Reputation sCHemes) mechanism overpaid money ratio
  • 相关文献

参考文献9

  • 1DAMIANI E,PARABOSCHI S,SAMARATI P,et al.A reputation-based approach for choosing reliable resources in Peer-to-Peer networks[C]//Proc of the 9th ACM Conference on Computer and Communications Security.New York:ACM Press,2002:207-216.
  • 2WANG Lei,ZHU Yan-qin,JIN Lan-fang,et al.Trust mechanism in distributed access control model of P2P networks[C]//Proc of the 7th IEEE/ACIS International Conference on Computer and Information Science (ICIS).Washington,DC:IEEE Computer Society,2008:19-24.
  • 3田慧蓉,邹仕洪,王文东,程时端.激励一致的自适应P2P拓扑构造[J].软件学报,2006,17(4):845-853. 被引量:13
  • 4DAMIANI E,VIMERCATI D C,PARABOSCHI S,et al.A reputation-based approach for choosing reliable resources in Peer-to-Peer networks[C]//Proc of the 9th ACM Conference on Computer and Communications Security.New York:ACM Press,2002:207-216.
  • 5YU B,SINGH M,SYCARA K.Developing trust in large-scale Peer-to-Peer systems[C]//Proc of the First IEEE Symposium on Multi-Agent Security and Survivability (MASS).PA:IEEE,2004:1-10.
  • 6金瑜,古志民,班志杰.一种新的P2P系统中基于双ratings的声誉管理机制[J].计算机研究与发展,2008,45(6):942-950. 被引量:12
  • 7ZHANG Y,LOU W,FANG Y.Sip:a secure incentive protocol against selfishness in mobile ad hoc networks[C]//Proc of the IEEE Wireless Communications and Networking Conference.Piscataway:IEEE,2004:1679-1684.
  • 8LEE S,ZHU S,KIM K.et al.Analysis on malicious peer's behavior of the P2P trust resource chain model[C]//Proc of the 9th ACIS International Conference on Software Engineering,Artificial Intelligence,Networking and Parallel/Distributed Computing (SNPD).Heidelberg:Springer Berlin,2008:89-102.
  • 9ZHANG Z,CHEN S,YOON M K.MARCH:a distributed incentive scheme for Peer-to-Peer networks[C]//The 26th Annual IEEE Conference on Computer Communications (IEEE INIFOCOM).Alaska:IEEE,2007:1091-1099.

二级参考文献37

  • 1常俊胜,王怀民,尹刚.DyTrust:一种P2P系统中基于时间帧的动态信任模型[J].计算机学报,2006,29(8):1301-1307. 被引量:101
  • 2石志国,贺也平,张宏.一种对等计算安全性的时间自衰减信任管理算法[J].计算机研究与发展,2007,44(1):1-10. 被引量:21
  • 3Saroiu S,Gummadi PK,Gribble SD.A measurement study of peer-to-peer file sharing systems.In:Proc.of the Multimedia Conf.and Networking.San Jose,2002.http://www.cs.washington.edu/homes/gribble/papers/mmcn.pdf
  • 4Adar E,Huberman BA.Free riding on Gnutella.Technical Report,SSL-00-63,Internet Ecologies Area Xerox Palo Alto Research Center.Palo Alto,2002.
  • 5Dou W.The research on trust-aware P2P topologies and constructing technologies[Ph.D.Thesis].Changsha:National University of Defense Technology,2003 (in Chinese with English abstract).
  • 6Gnutella.http://www.gnutella.com.2005.
  • 7Stoica I,Morris R,Karger D,Kaashoek MF,Balakrishnan H.Chord:A scalable peer-to-peer lookup service for Internet applications.In:Proc.of the ACM SIGCOMM 2001.San Diego,2001.http://pdos.csail.mit.edu/papers/chord:sigcomm01/chord_ sigcomm.pdf
  • 8Ratnasamy S,Francis P,Handley M,Karp R.A scalable content-addressable network.In:Proc.of the ACM SIGCOMM 2001.San Diego,2001.http://www.eecs.harvard.edu/~mema/courses/cs264/papers/p13-ratnasamy.pdf
  • 9Cooper BF,Garcia-Molina H.Ad hoc,self-supervising peer-to-peer search networks.Technical Report,Stanford University,2003.http://dbpubs.stanford.edu/pub/2003-4
  • 10Lv Q,Ratsnasamy S,Shenker S.Can heterogeneity make Gnutella scalable-In:Proc.of the 1st Int'l Workshop on P2P Systems.Cambridge,2002.http://www.cs.rice.edu/Conferences/IPTPS02/165.pdf

共引文献22

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部