期刊文献+

P2P电子商务环境下的动态安全信任管理模型 被引量:28

Dynamic secure trust management model for P2P e-commerce environments
下载PDF
导出
摘要 针对P2P电子商务中的信任评估问题,提出一种基于信任云的动态安全信任管理模型(TCDSTM)。TCDSTM利用云理论来刻画信任及信任等级,然后给出具有抗攻击能力的全局信任度融合算法、节点的类型识别和拓扑重构机制。理论分析和仿真实验一致表明,TCDSTM不仅可以抵御共谋、振荡等恶意攻击,而且大大提高了交易成功率。此外,该模型具有较低的通信开销。 For the trust evaluation problem in P2P e-commerce,a trust cloud-based dynamic secure trust management model(TCDSTM) was proposed.Cloud theory was used to describe the trust and the trust level in TCDSTM.Then an anti-attack global trust aggregation algorithm,the node type identification and topology reconstruction mechanisms were presented.Both theoretical analysis and simulation results show that TCDSTM not only can resist collusion attack,on-off attack and other malicious attacks,but also can improve the success rate of transactions.In addition,TCDSTM has low communication overhead.
出处 《通信学报》 EI CSCD 北大核心 2011年第3期50-59,共10页 Journal on Communications
基金 国家自然科学基金资助项目(60973139 60773041 61003039 61003236) 江苏省科技支撑计划(工业)项目(BE2010197 BE2010198) 江苏省级现代服务业发展专项基金资助项目 江苏省高校自然科学基础研究基金资助项目(10KJB520013) 高校科研成果产业化推进工程项目(JH10-14) 国家和江苏省博士后基金资助项目(20100471353 20100471355) 江苏高校科技创新计划基金资助项目(CX10B-196Z CX10B-197Z CX10B-198Z CX10B-199Z) 江苏省六大高峰人才基金资助项目(2008118)~~
关键词 对等网络 电子商务 信任 云理论 peer to peer networks electronic commerce trust cloud theory
  • 相关文献

参考文献15

  • 1LIN Y. Study of security problems in P2P e-commerce[A]. Proceed- ings of the 2nd International Conference on e-Business and Information System Security[C]. Wuhan, China, 2010.1-4.
  • 2LI C, WANG Y, YANG D. A trust evaluation model for future peer-to-peer e-commerce environments[A]. Proceedings of the Workshops on GLOBECOM[C]. Honolulu, HI, 2009.1-6.
  • 3ZHANG S, ZHANG X, WANG B. History and future information based trust model in C2C E-commerce[A]. Proceedings of the Fifth International Conference on Information Assurance and Security[C]. Xian, China, 2009. 491-494.
  • 4DONG P, WANG H, ZHANG H. Probability-based trust management model for distributed e-commerce[A]. Proceedings of the IEEE International Conference on Network Infrastructure and Digital Content[C] Beijing, China, 2009. 419-423.
  • 5ZHANG J, GUO X. Trust evaluation model based on fuzzy logic forC2C e-commerce[A]. Proceedings of the International Symposium on Information Engineering and Electronic Commerce[C]. Ternopil, 2009. 403-407.
  • 6吴鹏,吴国新,方群.一种基于概率统计方法的P2P系统信任评价模型[J].计算机研究与发展,2008,45(3):408-416. 被引量:27
  • 7ZHANG Z, WANG X M, WANG Y X. A scheme for solving D-S theory based ignorant evidence fusion in P2P network[A]. Proceedings of the Fifth International Conference on Machine Learning and Cybernetics[C]. Dalian, China, 2006. 4531-4535.
  • 8胡波,王汝传,王海艳.基于集对分析的P2P网络安全中的信誉度改进算法[J].电子学报,2007,35(2):244-247. 被引量:13
  • 9ZHOU R F, HWANG K, MIN C. Gossiptrust for fast reputation aggregation in peer-to-peer networks[J]. IEEE Transactions on Knowledge and Data Engineering, 2008, 20(9): 1282-1295.
  • 10KARAME G, CHRISTOU I T, DIMITRIOU T. A secure hybrid reputation management system for super-peer networks[A]. Proceedings of the 5th IEEE International Conference on Consumer Communications and Networking[C]. Las Vegas, NV, 2008. 495-499.

二级参考文献20

  • 1朱峻茂,杨寿保,樊建平,陈明宇.Grid与P2P混合计算环境下基于推荐证据推理的信任模型[J].计算机研究与发展,2005,42(5):797-803. 被引量:44
  • 2唐文,胡建斌,陈钟.基于模糊逻辑的主观信任管理模型研究[J].计算机研究与发展,2005,42(10):1654-1659. 被引量:84
  • 3赵克勤,宣爱理.集对论——一种新的不确定性理论方法与应用[J].系统工程,1996,14(1):18-23. 被引量:391
  • 4K Aberer, Z Despotovic. Managing trust in a peer-to-peer informarion system[ A] .Proc of the 10th Int'l ACM Conf. on Informarion and Knowledge Management [ C ]. New York: ACM Press, 2001.310- 317.
  • 5F Comelli. Choosing reputable servents in a P2P network[ A ]. Lassner D, ed. Proc of the 11th Int'l World Wide Web Conf [C]. Hawaii: ACM Press, 2002.441 - 449.
  • 6E Damiani,S Paraboschi,et al.Managing and sharing servents' reputations in P2P systems [ J ]. IEEE Transactions on Knowledge and Data Engineering,2003,15(4) :840- 854.
  • 7D E Zand. Trust and managerial problem solving [J]. Administrative Science Quarterly, 1972, 17(2) : 229-239.
  • 8T Grandison, M Sloman. A survey of trust in Internet applications [J]. IEEE Communications Surveys and Tutorials, 2000, 3(4): 2-16.
  • 9P Macnaughton-Smith, W T Williams, M B Dale, et al. Dissimilarity analysis: A new technique of hierarchical subdivision [J]. Nature, 1964, 202(6):1034-1035.
  • 10E Adar, B A Huberman. Free riding on Gnutella [R]. Xerox Palo Alto Research Center, Tech Rep: CSL-00-3, 2000.

共引文献38

同被引文献283

引证文献28

二级引证文献87

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部