期刊文献+

点对点网络中核心节点结构的全局信任网络模型

A novel core-peer based trust model for peer-to-peer networks
下载PDF
导出
摘要 针对点对点网络节点信任关系以及交易可能性较小的特点,阐述基于核心节点的点对点信任网络模型.该网络模型中的网络节点以公有度和私有信任度进行聚类,依靠节点可靠度针对核心节点和普通节点分情况讨论,并给予相关解决方案.仿真实验结果表明:该信任模型不但具有抗恶意节点攻击的鲁棒性,同时在网络资源搜索时具有较低的评估计算量和通信开销. In this paper, on account of the features of node trust relationships and smaller transaction possibilities in peer-to-peer network, a peer-to-peer trust network model is set forth based on its core nodes. Nodes in the network model are clustered accord- ing to their public reputation and private credibility. This paper discusses core nodes and ordinary nodes respectively relying on their node reliabilities and gives relevant solutions. The simulation results show that the trust model not only has robustness of an- ti-malicious node attacks but also has lower amount of assessment computation and communication overhead for network resources search.
出处 《上海师范大学学报(自然科学版)》 2012年第6期580-585,共6页 Journal of Shanghai Normal University(Natural Sciences)
基金 湖北省教育厅优秀中青年资助项目(Q20111311)
关键词 点对点网络 信任信誉 核心节点 私有信任度 可靠度 peer-to-peer network trust and reputation core nodes private trust reliability
  • 相关文献

参考文献10

  • 1CORNELLI F, DAMIANI E, VIMERCATI D C. Choosing reputable servents in a P'2P network [ C ]. Hawaii:Proceedings of the 11 th International Conference on World Wide Web (WWW' 02),2002.
  • 2ALMENAREZ F, MARIN A, DIAZ D. Developing a model for trust management in pervasive devices [ C ]. Washington: Proceedings of the 3rd IEEE International Workshop on Pervasive Computing and Communication Security ( PerSec 2006 ) ,2006.
  • 3GUO L T,YANG S B,WANG J. Trust model based on similarity measure of vectors in P2P networks[ C]. Beijing: Pro- ceedings of the 4th International Conference on Grid and Cooperative Computing,2005.
  • 4JORDI S M, PAOLUCCI M. On representation and aggregation of social evaluations in computational trust and reputation models [ J ]. International Journal of Approximate Reasoning (Elsevier) ,2007,46:458 -483.
  • 5HASSANA M, MCCLATCHEY R, WILLERS I. A Scalable Evidence Based Self-Managing Framework for Trust Manage- ment[ J]. Electronic Notes in Theoretical Computer Science (Elsevier) ,2007,179:59 - 73.
  • 6XIONG L, LIU L. PeerTrust : Supporting Reputaion-Based Trust for Peer-to-Peer Electronic Communities [ J ]. IEEE Trans- actions on Knowledge and Data Engineering,2004,16 (7) : 843 - 857.
  • 7FRIEDMAN E, RESNICK P. The social cost of cheap pseudonyms [ J ]. Journal of Economics and Management Strategy, 2001,10(2) :173 - 199.
  • 8SCHLOSSER M, CONDIE T, KAMVAR S. Simulating a File-Sharing P2P Network [ C ]. California:Proceedings of the First Workshop on Semantics in P2P and Grid Computing,2003.
  • 9陈兴蜀,林大云,王文贤.P2P节点智能选择机制的研究与实现[J].计算机应用,2011,31(2):293-297. 被引量:5
  • 10陈作汉,任旭鹏,卢鹏丽.对抗共谋及节点行为动态性的P2P信任模型[J].计算机应用,2011,31(2):308-312. 被引量:6

二级参考文献27

  • 1COHEN B. The BitTorrent protocol specification[ EB/OL]. [ 2010-01-01 ]. http://www. bittorrent. org/beps/bep_0003. html.
  • 2Ipoque company. Ipoque intemet study 2007 abstract[ EB/OL]. [ 2010 - 01 - 01 ]. http://www. ipoque, com/resources/intemet- studies/internet -study-2007.
  • 3WANG RUI, LIU YANG, YANG YUEXIANG, et al. Solving the app-level classification problem of P2P traffic via optimized support vector machines[ C]//Proceedings of the Sixth International Conference on Intelligent Systems Design and Applications. Washington, DC: IEEE Computer Society, 2006:534 -539.
  • 4CONSTANTINOU F, MAVROMMATIS P. Identifying known and unknown peer-to-peer traffic[ C]// Proceedings of the Fifth tEEE International Symposium on Network Computing and Applications. Washington, DC: IEEE Computer Society, 2006: 93-102.
  • 5KARAGIANNIS T, BROIDO A, FALOUTSOS M. Transport layer identification of P2P traffic[ C]//Proceedings of the 4th ACM SIG-COMM Conference on Intemet Measurement. New York: ACM, 2004:121 - 134.
  • 6WIERZBICKI A , LEIBOWITZ N , RIPEANU M, et al. Cache replacement policies revisited: the case of P2P traffic [ C] // Proceed- ings of the 2004 IEEE International Symposium on Cluster Computing and the Grid. Washington, DC: IEEE Computer Society, 2004:182 - 189.
  • 7SALEH O, HEFEEDA M. Modeling and caching of peer-to-peer traffic[ C]//ICNP'06: Proceedings of the 2006 14th IEEE International Conference. Washington, DC: IEEE Computer Society, 2006:249-258.
  • 8XIE HAIYONG, KRISHNAMURTHY A, SILBERSCHATZ A, et al. P4P: Explicit communications for cooperative control between P2P and network providers[ EB/OL]. [ 2010 - 01 - 01 ]. http:// www. dcia. info/documents/P4P_Overview, pdf.
  • 9XIE HAIYONG, YANG Y R, KRISHNAMURTHY A, et al. P4P Provider portal for (P2P) applications[ EB/OL]. [ 2010 - 01 - 01 ] http://citeseerx, ist. psu. edu/viewdoc/download? doi = 10. 1. 1 143. 5641 &rep = rep 1 &type = pdf.
  • 10LI WEI, CHEN SANZHI, YUTAO. UTAPS: An underlying topology-aware peer selection algorit hm in BitTorrent [ C]//Proceedings of 22nd International Conference on Advanced Information Networking and Applications. Washington, DC: IEEE Computer Society, 2008:539-549.

共引文献9

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部