期刊文献+

P2P网络中利用推拉模式实现的信誉系统 被引量:3

Using push-pull mode to achieve reputation system in P2P networks
下载PDF
导出
摘要 在现有的信誉模型中,即使节点积极提供良好的服务,节点信誉的累积也需要一个很长的周期,影响了新节点加入网络的积极性。此外,大部分模型在合成全局信誉值时采用多次迭代的方式,大量的迭代运算将导致巨大的计算开销。针对上述问题,通过引入流媒体调度策略中典型的推拉模式,提出一个新的信誉计算模型。在推模式下,对于那些新加入且积极提供优质服务的节点,可以加快其信誉累积速度,在拉模式下,减少了网络消息流量,避免了迭代计算的负面影响。分析及仿真表明,该模型在保证信誉计算准确性的同时,能较大程度改善通信及计算开销。 In the existing reputation models, the accumulation of reputation of certain node requires so long a period even if that node provides good services, which influences the positivity of those newly added nodes. Besides, most models composite the global trust value by multiple iteration, and the huge amount of iteration will bring massive computational expense. On account of the above issue, this dissertation proposes a new reputation computing model by introducing the typical push-pull model in streaming media scheduling strategy. The push model can accelerate the trust value accumulation speed of those newly added nodes which provide good services, while the pull model reduces the network flows online and avoids the negative impacts of the iteration computation. Through analysis and simulation, this model can ensure the accuracy of reputation computation, mean- while, the communication and computation expenses can get improved as well.
出处 《计算机工程与应用》 CSCD 2013年第5期88-92,173,共6页 Computer Engineering and Applications
基金 国家自然科学基金(No.60873075 No.60973118) 教育部培育基金(No.708078)
关键词 信誉 节点 推拉协议 迭代 reputation peer push-pull protocol iteration
  • 相关文献

参考文献13

  • 1Gu Chengjie, Zhang Shunyi, Feng Huibin, et al.A novel trust management model for P2P network with reputation and risk evaluation[C]//International Conference on E-Business and E-Government.Washington, DC, USA: IEEE Computer Society, 2010,891 : 3544-3547.
  • 2胡宁,邹鹏,朱培栋.基于信誉机制的域间路由安全协同管理方法[J].软件学报,2010,21(3):505-515. 被引量:10
  • 3Lin Huaiqing, Hu Zhengbin.A fuzzy trust model with puni- shment mechanism[C]//2010 2rid International Conference on Networks Security, Wireless Communications and Trusted Computing.Washington, DC, USA: IEEE Computer Society, 2010,2: 158-161.
  • 4Yu B, Singh M P.An evidential model of distributed reputa- tion management[C]//Proc of the 1st International Confer- ence on Autonomous Agent and Multi-Agent Systems.Bologna, Italy: [s.n.], 2002 : 294-301.
  • 5Kamvar S,Schlosser M.The Eigentrust algorithm for reputa- tion management in P2P networks[C]//12th International Con- ference on the World Wide Web.Budapest, Hungary: [s.n.], 2003 : 640-651.
  • 6Li Xiong, Ling Liu.PeerTrust: supporting reputation-based trust for peer-to-peer electronic communities[J].IEEE Trans- actions on Knowledge and Data Engineering,2004, 16(7): 843-857.
  • 7Rao Shen, Wang Yong, Tao Xiao-ling.The comprehensive trust model in P2P based on improved eigentrust algorithm[C]// 2010 International Conference on Measuring Technology and Mechatronics Automation(ICMTMA).Washington, DC, USA: IEEE Computer Society, 2010,3 : 822-825.
  • 8Liu Yan, Han Jun.An architectural approach to composing reputation-based rustworthy services[C]//2010 21st Australian Software Engineering Conference.Washington, DC, USA: IEEE Computer Society,2010:l17-126.
  • 9李景涛,荆一楠,肖晓春,王雪平,张根度.基于相似度加权推荐的P2P环境下的信任模型[J].软件学报,2007,18(1):157-167. 被引量:115
  • 10Cornelli F, Damiani EChoosing reputable servents in a P2P network[C]//llth International World Wide Web Con- ference,Honolulu,Hawaii.New York:ACM,2002:7-11.

二级参考文献31

  • 1龚海刚,刘明,毛莺池,陆桑璐,谢立.P2P流媒体关键技术的研究进展[J].计算机研究与发展,2005,42(12):2033-2040. 被引量:81
  • 2Rekhter Y, Li T, Hares S. A border gateway protocol (BGP Version 4). IETF Internet RFC, RFC 4271. 2006.
  • 3Butler K, Farley T, McDaniel P, Rexford J. A survey of BGP security. 2005. http://www.patrickmcdaniel.org/pubs/td-5ugj33.pdf.
  • 4Roughgarden T. Selfish routing [Ph.D. Thesis]. Comell University, 2002.
  • 5Bono VJ. 7007 explanation and apology. 1997. http://www.merit.edu/mail.archives/nanog/1997-04/msg00444.html.
  • 6Popescu AC, Premore BJ, Underwood T. Abstract: Anatomy of a leak: AS9121. 2005. http://www.nanog.org/mtg-0505/ underwood.html.
  • 7Brown MA. Pakistan hijacks YouTube: A closer look. 2008. http://www.circleid.com/posts/82258_pakistan_hijacks_youtube_closer_look.
  • 8PResnick P, Zeckhauser R, Friedman E, Kuwabara K. Reputation systems: Facilitating trust in Internet interactions. Communications of the ACM, 2000,43(12):45-48.
  • 9The North American Network Operators' Group. 2008. http://www.nanog.org/.
  • 10White R. Securing BGP through secure origin BGP (soBGP). The Internet Protocol Journal, 2003,6(3): 15-22.

共引文献127

同被引文献23

引证文献3

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部