期刊文献+

A Content Audit Model for Validity of Service in Peer-to-Peer Networks

A Content Audit Model for Validity of Service in Peer-to-Peer Networks
下载PDF
导出
摘要 Validity of service in the service system is significantly affected by reliability of providers and availability of service contents.Most service inspiring schemes in peer-to-peer(P2P) networks associate each provider with reputation or money to ensure provider's reliability so as to improve the availability of service contents.However,these schemes bring considerable risk to consumers when a provider with high reputation or money publishes a malicious service content.Moreover,the number of providers decreases as some providers are rejected while they have unconsciously published one or several polluted contents ever.The risk may spread to more users and cause the collapse of the service system.Recently,some researches have shown that the unconscious polluted contents are over twice as many as the intentional polluted contents.In order to distinguish the unconscious polluted contents from the intentional polluted contents and rescue those correlative users,we propose an audit model based on each service content to improve the validity of services.In our model,each node is associated with money,and each service content is associated with reputation.The unconscious polluted contents are prevented via consumers' evaluation,and the intentional polluted contents and malicious providers are rejected via audit executors' evaluation.Simulation results show that the model improves the ratio of available service contents and reliable providers. Validity of service in the service system is significantly affected by reliability of providers and availability of service contents. Most service inspiring schemes in pecr-to-pecr (P2P) networks associate each provider with reputation or money to ensure provider's reliability so as to improve the availability of service contents. However, these schemes bring considerable risk to consumers when a provider with high reputation or money publishes a malicious service content. Moreover, the number of providers decreases as some providers are rejected while they have unconsciously published one or several polluted content., ever. The risk may spread to more users and cause the collapse of the service system. Recently, some researches have shown that the unconscious polluted contents are over twice as many as the intentional polluted contents. In order to distinguish the unconscious polluled contents from the intentional polluted contents and rescue those correlative users, we propose an audit model based on each service content to improve the validity of services. In our model, each node is associated with money, and each service content is associated with reputation. The unconscious polluted contents are prevented via consumers' evaluation, and the intentional polluted cantents and malicious providers are rejected via audit executors' evaluation. Simulatinn results show that the model improves the ratio of available service contents and reliable providers.
出处 《Journal of Donghua University(English Edition)》 EI CAS 2011年第5期499-506,共8页 东华大学学报(英文版)
基金 National Natural Science Foundation of China(No.60903160)
关键词 服务 服务内容 审计执行者 审计模型 service service content audit executor audit model
  • 相关文献

参考文献19

  • 1Levente Buttyán,Jean-Pierre Hubaux.Stimulating Cooperation in Self-Organizing Mobile Ad Hoc Networks[J]. Mobile Networks and Applications . 2003 (5)
  • 2Dewan P,Dasgupta P.Securing Reputation Data in Peer-to-Peer Networks [C ]. International Conference on Parallel and Distributed Computing and Systems . 2004
  • 3Wang Y,Vassileva J.Bayesian Network-Based Trust Model in Peer-to-Peer Networks. Lecture Notes in Computer Science . 2003
  • 4Zhang D,Shinkuma R,Mandayam N B.Bandwidth Exchange:an Energy Conserving Incentive Mechanism for Cooperation. IEEE Transactions on Wireless Communications . 2010
  • 5Vishnumurthy V,Chandrakumar S,Sirer E G.KARMA:a Secure Economic Framework for Peer-to-Peer Resource Sharing. Proceedings of the Workshop on the Economics of Peer-to-Peer Systems . 2003
  • 6Lu R X,Lin X D,Zhu H J,et al.Pi:a Practical Incentive Protocol for Delay Tolerant Networks. IEEE Transactions on Wireless Communications . 2010
  • 7Mahmoud M E,Shen X M.ESIP:Secure Incentive Protocol with Limited Use of Public-Key Cryptography for Multihop Wireless Network. IEEE Transactions on Mobile Computing . 2011
  • 8Zhang Z,Chen S G,Yoon M K.MARCH:a Distributed Incentive Scheme for Peer-to-Peer Networks. The 26th IEEE International Conference on Computer Communications (INFOCOM 2007) . 2007
  • 9Lee U,Choi M,Cho J,et al.Understanding Pollution Dynamics in P2P File Sharing. The 5th International Workshop on Peer-to-Peer Systems (IPTPS 2006) . 2006
  • 10Liang J,Kumar R,Xi Y J,et al.Pollution in P2P File Sharing Systems. The 24th Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM 2005) . 2005

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部