期刊文献+

对等云存储系统信誉机制研究 被引量:1

A reputation mechanism in peer-to-peer cloud storage systems
下载PDF
导出
摘要 云存储是分布式存储技术与虚拟化技术结合的产物,是分布式存储技术的最新发展.云存储意味着存储可以作为一种服务,通过互联网提供给用户.相对于当前主从(Master/Slave)结构的GFS(Google File System),HDFS(Hadoop Distributed File System),Sector,KFS(Kosmos File System)等云存储系统,提出了一种基于DHT(Distributed Hash Table)的对等云存储系统MingCloud.重点研究了系统的信誉机制问题,具体包括综合信誉度的计算、信任模型设计、信誉机制的工作过程、安全性分析等方面.仿真实验表明,该机制具有较好的有效性和健壮性,能有效保护系统中的诚实节点,迅速降低恶意节点的信任值,抑制恶意交易行为.引入MingCredit之后,系统不再简单地以节点的物理性能诸如存储空间大小、网络带宽等方面的客观能力,以及在线时间作为评价标准,而是与节点参与到对等存储交易的行为特征密切关联起来. As the latest development of the distributed storage technology,cloud storage is a product of the integration of distributed storage and virtualization technologies.Cloud storage allows use to storage facilities available on the internet.Relative to the current Master/Slave computing model cloud storage file systems,including GFS,HDFS,Sector and KFS,an open P2P(peer-to-peer) cloud storage system based on DHT was proposed,and we constructed a prototype system named MingCloud based on the Kademlia algorithm.According to the research-development needs of the system,a reputation mechanism was designed for the system,specifically including the calculation of reputation degree,trust model design,work process of reputation mechanism,and safety analysis.Our simulation results show that the mechanism of this model provides a high degree of effectiveness and robustness.Meanwhile,the reputation model can effectively protect honest nodes,reduce the trust value of malicious nodes,and restrain malicious behaviors.
出处 《南京大学学报(自然科学版)》 CAS CSCD 北大核心 2011年第4期446-458,共13页 Journal of Nanjing University(Natural Science)
基金 国家自然科学基金(61070153) 浙江省高校优秀青年教师资助计划(2010170) 杭州师范大学勤慎研究项目
关键词 对等网络 云存储 信任模型 信誉机制 peer to peer cloud storage trust model reputation mechanism
  • 相关文献

参考文献20

  • 1Stephen P M. Formalizing Trust as a Computa- tional Concept. Ph. D. Thesis, University of Stirling, 1994.
  • 2Elizabeth C, Farookh H, Tharam D. Trust and reputation for service-oriented environments: Technologies for building business Intelligence and consumer confidence. New York: John Wi- ley and Sons, 2005.
  • 3Wang Y, Vassileva J. Bayesian network-based trust model. Proceedings of the IEEE Interna- tional Conference on Web Intelligence, Los An- geles, 2003, 29-38.
  • 4Audun J, Roslan I, Colin B. A survey of trust and reputation systems for online service provi- sion. Decision Support Systems, 2007, 48(2) : 618-644.
  • 5Artz D, Gil Y. A survey of trust in computer science and the semantic web. Web Semantics, 2007, 5(2) :58-71.
  • 6Audun J. Trust and reputation systems. In: Aldini A, Gorrieri R, eds. Foundations of Se- curity Analysis and Design, Lecture Notes in Computer Science. Berlin: Springer-Verlag, 2007,209-245.
  • 7Sanjay G, Howard G, Leung S T. The Google file system. Proceedings of the 19th ACM Sym- posium on Operating Systems Principles New York: ACM Press, 2003, 29-43.
  • 8Kelly S. IBM introduces ready-to-use cloud computing collaboration services get clients started with cloud computing, http://www- 03. ibm. com/press/us/en/pressrelease/22613. wss,2011.
  • 9Dhruba B. The hadoop distributed file system Architecture and design, http://hadoop, a- pache, org/common/docs/r0. 16.0/hdfs _de- sign. pdf,2011.
  • 10Hbase Development Team. Hbase: Bigtable- like structured storage for hadoop hdfs. http:// wiki. apache, org/hadoop/Hbase, 2011.

二级参考文献20

  • 1俞春,马骞,马晓星,吕建.一种面向体系结构的软件系统自适应机制[J].南京大学学报(自然科学版),2006,42(2):120-130. 被引量:15
  • 2王永峰.基于Spring的安全框架Acegi在Web系统中的应用[J].铁路计算机应用,2006,15(12):34-36. 被引量:7
  • 3[1]孙卫琴.精通Struts:基于MVC的Java Web设计与开发[M].北京:电子工业出版社,2006:10-11
  • 4Qiu J.Research and implementation of rolebased RBAC administration mModel.IEEE,2005,0-7695-2432-X:746-750.
  • 5Kim Y G,Lim J G.Dynamic activation of role on RBAC for ubiquitous applications.IEEE,2007,0-7695-3038-9/07:1148-1153.
  • 6Liu M,Guo H Q,Su J D.An attribute and role based access control model for web serviecs.IEEE,2005,0-7803-9091-1/05:1302-1306.
  • 7罗时飞,敏捷.Acegi,、CAS:构建安全的Java系统.北京:电子工业出版社,2007,83-211.
  • 8RBAC Standards,http://csrc.nist.gov/rbac/.
  • 9Kim Y G,Lim J G.Dynamic activation of role on RBAC for ubiquitous applications.IEEE,2007,0-7695-3038-9/07.1148-1153.
  • 10Liu M,Guo H Q,Su J D.An attribute and role based access control model for web serviecs.IEEE,2005,0-7803-9091-1/05.1302-1306.

共引文献513

同被引文献3

  • 1Damiani E, Vimercati S D C, Paraboschi S, et al. Managing and Sharing Servents'Reputations in P2P Systems [J]. IEEE Transactions on Knowledge and Data Engineering, 2003, 15 (4): 840-854.
  • 2XIONG L, LIU L. PeerTrust: supporting reputation- based trust for peer- to - peer electt~onic commtmities [J]. IEEE Transactions on Knowledge and Data Engineering, 2004, 16 (7): 843- 857.
  • 3Marcelii Mejiaa, N6stor Pefi - aa, Jose L, et al. A game theoretic trust model for on - line distributed evolution of cooperation in- MANE~s [.17. Journal of Network and Computer Applications, 2011, 34 (1): 39 - 51.

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部