期刊文献+

一种新的基于信誉的P2P网络信任管理模型 被引量:1

A New Trust Management Model for P2P Network
原文传递
导出
摘要 文中提出了一种非中心的P2P网络信任管理模型NewTrust。在P2P网络中,需要根据一个节点在网络中的信誉来判断其是否可信,通过在信任向量中引入评价方差,有效抑制了不稳定节点和策略类恶意节点;通过区分陌生节点和不可信节点,解决了陌生节点的融入问题;通过对不同信誉的节点提供不同质量的服务,解决了节点激励问题;通过引入分布式哈希表(DHT)资源发现模式解决推荐信息的管理问题,降低了搜索与管理推荐信息的代价,并使系统具有良好的可扩展性。模型能够有效地抵御多种恶意攻击。 P2P network is an open, anonymous and highly dynamic system. This paper presents a novel decentralized trust management model NewTrust for P2P network, and also gives a detailed operation description of this model. First, the score variance is used as a element of trust vector to reflect the stability of a servent; then through distinguishing the Unknows from UNewTrusts, the addition problem of Unknows is solved; then the classification of service condition is used to construct an incentive mechanism, while DHT is used to reduce bandwidth cost and get nice salability; and finally NewTrust model is implemented and could thus resist various malicious attacks.
作者 李佳伦 杨达
出处 《信息安全与通信保密》 2012年第4期96-98,共3页 Information Security and Communications Privacy
关键词 信任管理 P2P网络 信誉 推荐 DHT trust management P2Pnetwork reputation recommendation DHT
  • 相关文献

参考文献9

二级参考文献30

  • 1张巍,刘鲁,朱艳春.基于多影响因素的网上拍卖信任模型[J].清华大学学报(自然科学版),2006,46(z1):1103-1108. 被引量:19
  • 2张春瑞,江帆,徐恪.面向对等网络应用的信任与名誉模型[J].清华大学学报(自然科学版),2005,45(10):1436-1440. 被引量:10
  • 3张润莲,武小年.基于PMI的校园网格访问控制研究与应用[J].信息安全与通信保密,2007,29(8):97-99. 被引量:2
  • 4Kagal L, Finin T, Joshi. A Trust-based Security in Pervasive Computing Environments[J]. IEEE Computers, 2001(12) 154-157.
  • 5Yao H, Hu H, Huang B, et al. Dynamic role and context-based access control for grid applications [C]. In: Proc of the 6th Intel Conf on Parallel and Distributed Computing Applications and Technologies. IEEE Computer Society, 2005: 404-406.
  • 6Sandhu R, Coyne E. Role-Based access control models [J]. IEEE Computer, 1996, 29(02) 38-47.
  • 7Joshi J, Bertino E, et al. A generalized temporal role based access control model[J]. IEEE Trans. on Knowledge and Data Engineering, 2005, 17(01) 04-23.
  • 8Butler R, Welch V. A national scale authentication infrastructure[J]. IEEE Computer, 2000, 33(12) 60-66.
  • 9Kamvar S D, Schlosser M T, Garcia M H. The Eigentrust Algorithm for Reputation Management in P2P Networks[C]//Proc. of the 12th Int'l WWW Conf.. Budapest, Hungary: ACM Press, 2003:640-651.
  • 10Xiong Li, Liu Ling. PeerTrust: Upporting Reputation-based Trust in Peer-to-Peer Communities[J]. IEEE Transactions on Knowledge and Data Engineering, 2004, 16(7): 843-854.

共引文献30

同被引文献6

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部