期刊文献+

改进的基于推荐证据的对等网络信任模型 被引量:2

Improved trust model based on recommendation evidence for P2P networks
下载PDF
导出
摘要 针对传统P2P对等网络信任模型中推荐节点诚实性难以判别的问题,提出了改进的基于推荐证据的P2P网络信任模型。模型根据交易结果,同时更新交易节点和推荐节点的信任记录。采用符合人际交往特性的衰减函数描述信任证据的衰减过程。将D-S证据理论应用于信任模型的信任计算中,将直接证据和推荐证据合成做为信任证据。模型采用基于概率Gossip算法实现信任证据的搜索。试验结果表明:本文算法有效地提高了P2P网络的成功交易率,改善了网络环境。 An improved trust model based on recommendation evidence for P2P network is proposed. The aim of the model is to resolve the problem of identifying dishonesty recommendation peers in traditional trust model for unstructured P2P network. The new model updates the trust records of the transaction node and recommendation nodes simultaneously according to the transaction results. It adopts the decay function, which meets interpersonal characteristics, to describe the decay process of the trust records. The D-S evidence theory is introduced to the computation of the trust model, which integrates direct evidence and recommendation evidence into trust evidence. The model searches trust evidence through probability based Gossip algorithm. The experiment results show that the proposed model can increase the successful transaction rate and improve the network environment.
出处 《吉林大学学报(工学版)》 EI CAS CSCD 北大核心 2013年第6期1666-1674,共9页 Journal of Jilin University:Engineering and Technology Edition
基金 国家自然科学基金项目(61171078) 吉林省自然科学基金项目(20101515 20130101045JC) 吉林省国际科技合作项目(20130413053GH)
关键词 通信技术 对等网络 推荐证据 信任模型 communication P2P network recommendation evidence trust model
  • 相关文献

参考文献2

二级参考文献38

  • 1朱峻茂,杨寿保,樊建平,陈明宇.Grid与P2P混合计算环境下基于推荐证据推理的信任模型[J].计算机研究与发展,2005,42(5):797-803. 被引量:44
  • 2陈学梁,万晓榆,樊自甫,房志刚.无线接入网中P2P对网络业务性能的评估[J].重庆工学院学报,2006,20(5):92-96. 被引量:3
  • 3Karl A, Zoran D. Managing trust in a peer - 2 - peer information system[C] // Proceedings of the 10th International Conference on Information and Knowledge Management. New York, USA, 2001:310-317.
  • 4Kamvar S D, Schlosser M T. EigenRep: reputation management in p2p networks[C] // Lawrence S, ed. Proc. of the 12th Int' l World Wide Web Conf. (WWW 2003). Budapest: ACM Press, 2003 : 123-134.
  • 5Xiong L, Liu L. PeerTrust: supporting reputation-based trust for p2p electronic communities[J], IEEE Trans, Knowledge and Data Engineering,2004,16(7) :843-857.
  • 6Zhou R, Hwang K. PowerTrust: A robust and scalable reputation system for trusted P2P computing[J]. IEEE Trans. Parallel and Distributed Systems, 2007,18(4) : 460-473.
  • 7Song S S, Hwang K, Zhou R F, et al. Trusted p2p transactions with fuzzy reputation aggregation [J]. IEEE Internet Compu ting,2005,9(6) :24- 34.
  • 8Gambetta D. Can we trust trust [M]. Reprinted in electronic edition from Department of Sociology, University of Oxford: Basil Blackwell, 1988.
  • 9Josang A, Gray L, Kinateder M. Simplification and analysis of transitive trust networks[J]. Web Intelligence and Agent Systems Journal,200G,4(2) : 139-161.
  • 10Wang Yonghong, Singh M P. Trust represenlation and aggregation in a distributed agent system[C]//Proceedings of the 21st National Conference on Artificial Intelligence (AAAI). Boston,MA, USA, 2006.

共引文献42

同被引文献21

  • 1Fan X,Li M,Ma J,et al.Behavior-based reputation management in P2Pfile-sharing networks[J].Journal of Computer and System Sciences,2012,78(6):1737-1750.
  • 2Sarjaz B S,Abbaspour M.Securing BitTorrent using a new reputation-based trust management system[J].Peer-to-Peer Networking and Applications,2013,6(1):86-100.
  • 3Shin K,Reeves D S,Rhee I.Treat-before-trick:Free-riding prevention for BitTorrent-like peer-topeer networks[C]∥Parallel&Distributed Processing,IEEE,2009:1-12.
  • 4Gheorghe G,Cigno R L,Montresor A.Security and privacy issues in P2Pstreaming systems:a survey[J].Peer-to-Peer Networking and Applications,2011,4(2):75-91.
  • 5Douceur J R.The Sybil Attack[M].Berlin:Springer Berlin Heidelberg,2002:251-260.
  • 6Locher T,Moor P,Schmid S,et al.Free riding in BitTorrent is cheap[C]∥Proc Workshop on Hot Topics in Networks(HotNets),California,USA,2006:85-90.
  • 7Piatek M,Isdal T,Anderson T,et al.Do incentives build robustness in BitTorrent[C]∥Proc of NSDI,Cambridge,2007:1-14.
  • 8Levin D,LaCurts K,Spring N,et al.Bittorrent is an auction:analyzing and improving bittorrent's incentives[C]∥ACM SIGCOMM Computer Communication Review,ACM,2008,38(4):243-254.
  • 9Shah P,PrisJF.Incorporating trust in the BitTorrent protocol[C]∥International Symposium on Performance Evaluation of Computer and Telecommunication Systems,San Diego,USA,2007:586-593.
  • 10Ge T,Manoharan S.Mitigating free-riding on bittorrent networks[C]∥Digital Telecommunications(ICDT),2010 Fifth International Conference on,IEEE,2010:52-56.

引证文献2

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部