期刊文献+

P2P环境下电子商务信任评估机制研究 被引量:2

Research of trust evaluation mechanism in P2P E-commerce
下载PDF
导出
摘要 为了解决P2P环境下电子商务安全问题,在深入研究P2P环境下电子商务信任模型的基础上,针对传统信任模型不足的问题,提出了一种利用哈希函数将加入群的节点随机地分配到各个群的方法,降低了节点共谋攻击的危险。考虑到当一个节点偶尔提供一次恶意服务时,并不能证明是恶意节点,只需要给节点警告。引入了交易时间和交易规模、交易次数等因素来进行信任值的计算,利用惩罚项来限制交易节点提供恶意服务。节点的信任值很大程度上依靠同群节点和有外连接的群的节点来进行评估,仿真实验结果表明,该方法可以更加准确地评估节点的信任值,保证了网络的性能。 To solve the P2P E-commerce security problem effectively,on the basis of researching the trust model deeply in the P2P Ecommerce, a method based on hash function is proposed to put the node from the trust group into the sub-group in a random.It reduces the risk of collusion attack.When a node provides a malicious service occasionally,it can not be proved to be a malicious node,and it only needs to be given a warning.Transaction time factors,transaction scales,and transactions number are introduced to calculate the trust value.Penalty item is used to limit node to provide malicious service.It is more accurate to estimate the trust value.The model relies heavily on nodes from the group connected with outside group and the nodes from the same group,and it ensures the performance of the network.
出处 《计算机工程与设计》 CSCD 北大核心 2011年第1期28-31,共4页 Computer Engineering and Design
关键词 点对点 电子商务 哈希函数 信任模型 评估机制 P2P E-commerce Hash function trust model evaluation mechanism
  • 相关文献

参考文献8

  • 1Yao Wang,Julita Vassileva.Bayesian network-based trust model [C].Proceedings of the IEEE/WIC International Conference on Web Intelligence,2003.
  • 2Guha R,Kumar R,Raghavan P.Propagation of trust and distrust [C].New York,USA:WWW2004,2004:17-22.
  • 3Mujtaba Khambatti,Partha Dasgupta,Kyung Dong Ryu.A role- based trust model for peer-to-peer communities and dynamic coalitions[C].Proceedings of Second IEEE International Conference on Information Assurance Workshop,2004:141-154.
  • 4徐巧枝,刘东升.一种用于P2P电子商务的信任模型[J].计算机工程与应用,2006,42(21):134-138. 被引量:11
  • 5陈灿,胡峰松,王慧娟.P2P环境下改进的基于信誉的信任模型[J].计算机工程与设计,2010,31(5):999-1001. 被引量:5
  • 6Abhilash Gummadi,Jong P Yoon.Model in group trust for peer- to-peer access control[C].Proc of 15th International Workshop on Database and Expert System Applications,2004:971-978.
  • 7孟宪福,张磊,王旭.P2P电子商务信任模型研究[J].计算机应用研究,2009,26(8):3067-3069. 被引量:9
  • 8王茜,杜瑾珺.一种P2P电子商务安全信任模型[J].计算机科学,2006,33(9):54-57. 被引量:14

二级参考文献23

  • 1李小勇,桂小林.大规模分布式环境下动态信任模型研究[J].软件学报,2007,18(6):1510-1521. 被引量:138
  • 2LIANG J, KUMAR R,XI Y, et al.Pollution in P2P file sharing systems[C].Proc of the IEEE Infocom.Miami:IEEE Press,2005: 1174-1185.
  • 3LIU Yu-mei,YANG Shou-bao,GUO Lei-tao,et al .A distributed trust-based reputation model in P2P system[C]. Eighth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing,2007: 294-299.
  • 4Altman J.PKI security for JXTA overlay networks[R].Technical Report,Sun Microsystem,2003.
  • 5Khambatti M, Dasgupta P, Ryu K D.A role-based trust-model for peer-to-peer communities and dynamic eoalitions[C].Proc of the 2nd IEEE Int'l Information Assurance-Workshop,2004.
  • 6Cornelli F. Choosing reputable servents in a P2P network [C]. Proc of the 11th Int'l World Wide Web Conf.Hawaii:ACM Press,2002:441-449.
  • 7Kamvar S D,Schlosser M T.EigenRep:reputation management in P2P networks[C].Proc of the 12th Int'l World Wide Web Conf. Budapest:ACM Press,2003:123-134.
  • 8RATNASAMY S. Routing algorithms for DHTs: some open questions[C].Proc of the 1 st Int'l Workshop on Peer-to-Peer Systems.Cambridge:Springer-Verlag,2002:45-52.
  • 9STOICA I,MORRIS R,KARGER D,et al .Chord:a scalable peer- to-peer lookup service for internet applications[C].Proc of SIGCOMM 2001 .San Deigo:ACM Press,2001 : 149-160.
  • 10SCHLOSSER M T, CONDIE T E,KAMWAR S D.Simulating a file-sharing P2P network[C].Proc of the 1st Workshop on Semantics in P2P and Grid Computing.Budapest:ACM Pres,2003: 69-80.

共引文献32

同被引文献19

引证文献2

二级引证文献12

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部