The differences between the data integration of a dynamic database grid (DBG) and that of a distributed database system are analyzed, and three kinds of data integration strategies are given on the background of DBG...The differences between the data integration of a dynamic database grid (DBG) and that of a distributed database system are analyzed, and three kinds of data integration strategies are given on the background of DBG based on Peer to Peer (P2P) framework, including the centralized data integration (CDI) strategy, the distributed data integration (DDI) strategy and the filter-based data integration (FDDI) strategy. CDI calls all the database grid services (DGSs) at a single node, DDI disperses the DGSs to multiple nodes, while FDDI schedules the data integration nodes based on filtering the keywords returned from DGSs. The performance of these three integration strategies are compared with and analyzed by simulation experiments. FDDI is more evident for filtering the keywords with data redundancy increasing. Through the reduction of large amount of data transportation, it effectively shortens the executing time for the task and improves its efficiency.展开更多
In P2P Grid computing systems, the authorization decision is often tackled by two different trust management methods: policy-based approach, where authorization are built on logical rules and verifiable properties en...In P2P Grid computing systems, the authorization decision is often tackled by two different trust management methods: policy-based approach, where authorization are built on logical rules and verifiable properties encoded in signed credentials, and reputation-based approach, based on collecting, aggregating and disseminating reputation among the peers. However, the overhead caused by proof of compliance on authorization and the absence of certifying authorities may negate the strong and objective security advantages of policy-based approach, whilst vagueness, complexity and inaccurate characterization caused by reputation evolution may eliminate the quantitative and flexible advantages of reputation-based approach. We propose an adaptive trust management framework, which combines the merit of policy proof and reputation evolution such that authorization is aware of not only the strong and objective security traits, but also the calculability and the availability security traits. Finally, the framework of system is proposed.展开更多
A scheduling scheme is proposed to reduce execution time by means of both checkpoint sharing and task duplication under a peer-to-peer(P2P) architecture. In the scheme, the checkpoint executed by each peer(i.e., a res...A scheduling scheme is proposed to reduce execution time by means of both checkpoint sharing and task duplication under a peer-to-peer(P2P) architecture. In the scheme, the checkpoint executed by each peer(i.e., a resource) is used as an intermediate result and executed in other peers via its duplication and transmission. As the checkpoint is close to a final result, the reduction of execution time for each task becomes higher, leading to reducing turnaround time. To evaluate the performance of our scheduling scheme in terms of transmission cost and execution time, an analytical model with an embedded Markov chain is presented. We also conduct simulations with a failure rate of tasks and compare the performance of our scheduling scheme with that of the existing scheme based on client-server architecture. Performance results show that our scheduling scheme is superior to the existing scheme with respect to the reduction of execution time and turnaround time.展开更多
In the past decade,online Peer-to-Peer(P2P)lending platforms have transformed the lending industry,which has been historically dominated by commercial banks.Information technology breakthroughs such as big data-based ...In the past decade,online Peer-to-Peer(P2P)lending platforms have transformed the lending industry,which has been historically dominated by commercial banks.Information technology breakthroughs such as big data-based financial technologies(Fintech)have been identified as important disruptive driving forces for this paradigm shift.In this paper,we take an information economics perspective to investigate how big data affects the transformation of the lending industry.By identifying how signaling and search costs are reduced by big data analytics for credit risk management of P2P lending,we discuss how information asymmetry is reduced in the big data era.Rooted in the lending business,we propose a theory on the economics of big data and outline a number of research opportunities and challenging issues.展开更多
With the rapid growth of information and communication technology (ICT), the violation of information privacy has increased in recent years. The privacy concerns now re-emerge right because people perceives a threat...With the rapid growth of information and communication technology (ICT), the violation of information privacy has increased in recent years. The privacy concerns now re-emerge right because people perceives a threat from new ICT that are equipped with enhanced capabilities for surveillance, storage, retrieval, and diffusion of personal information. With the trend in the prevalence and the easy use of ICT, it is of necessary to pay much attention to the issue how the ICT can threaten the privacy of individuals on the Internet. While the Email and P2P (Peer-to-Peer) tools are the most popular ICT, this paper aims at understanding their respectively dissemination patterns in spreading of personal private information. To this purpose, this paper using dynamic model technique to simulate the pattern of sensitive or personal private information propagating situation. In this study, an Email propagation model and a Susceptible-lnfected-Removed (SIR) model are proposed to simulate the propagation patterns of Email and P2P network respectively. Knowing their dissemination patterns would be helpful for system designers, ICT manager, corporate IT personnel, educators, policy makers, and legislators to incorporate consciousness of social and ethical information issues into the protection of information privacy.展开更多
PeerMD, a P2P molecular dynamics simulation frame-work based on Web services is proposed. It utilizes rich free CPU time and network bandwidth of P2P networks to provide enough resources for dynamics simulation of bio...PeerMD, a P2P molecular dynamics simulation frame-work based on Web services is proposed. It utilizes rich free CPU time and network bandwidth of P2P networks to provide enough resources for dynamics simulation of bio-macromolecule, and has resolved the problem that it is difficult to interoperate between heterogeneous peers in P2P environment through Web services. Structure of PeerMD is given. Function, input and output of molecular dynamics simulation Web service are defined. Processes of publishing, discovering and invoking of molecular dynamics simulation Web service based on multi-level SuperPeer are given. A protocol system of PeerMD is implemented on a basic P2P platform JXTA, and experimental simulations of tumor necrosis fact alpha (TNF-α) and two mutations of it are executed on the protocol system. Simulation results show that PeerMD can speed up molecular dynamics simulation perfectly.展开更多
A model is built to analyze the performance of service location based on greedy search in P2P networks. Hops and relative QoS index of the node found in a service location process are used to evaluate the performance ...A model is built to analyze the performance of service location based on greedy search in P2P networks. Hops and relative QoS index of the node found in a service location process are used to evaluate the performance as well as the probability of locating the top 5% nodes with highest QoS level. Both model and simulation results show that, the performance of greedy search based service location improves significantly with the increase of the average degree of the network. It is found that, if changes of both overlay topology and QoS level of nodes can be ignored during a location process, greedy-search based service location has high probability of finding the nodes with relatively high QoS in small number of hops in a big overlay network. Model extension under arbitrary network degree distribution is also studied.展开更多
Application layer multicast (ALM) has been widely applied in Internet, as a substitute for IP multicast. However, it causes network load to increase because it adopts unlcast in data transmission, which limits the a...Application layer multicast (ALM) has been widely applied in Internet, as a substitute for IP multicast. However, it causes network load to increase because it adopts unlcast in data transmission, which limits the application. In this article, in order to improve the ALM performance in P2P-SIP network, an ALM model was proposed which reduced network load via merging messages in concast mode. Finally network simulations prove that this model has better benefit on single node load and average network load. Therefore, it is suitable for streaming media service in P2P-SIP Network.展开更多
The spread of social media has increased contacts of members of communities on the lntemet. Members of these communities often use account names instead of real names. When they meet in the real world, they will find ...The spread of social media has increased contacts of members of communities on the lntemet. Members of these communities often use account names instead of real names. When they meet in the real world, they will find it useful to have a tool that enables them to associate the faces in fiont of them with the account names they know. This paper proposes a method that enables a person to identify the account name of the person ("target") in front of him/her using a smartphone. The attendees to a meeting exchange their identifiers (i.e., the account name) and GPS information using smartphones. When the user points his/her smartphone towards a target, the target's identifier is displayed near the target's head on the camera screen using AR (augmented reality). The position where the identifier is displayed is calculated from the differences in longitude and latitude between the user and the target and the azimuth direction of the target from the user. The target is identified based on this information, the face detection coordinates, and the distance between the two. The proposed method has been implemented using Android terminals, and identification accuracy has been examined through experiments.展开更多
Towards the problems of existing detection methods,a novel real-time detection method(DMFIF) based on fractal and information fusion is proposed.It focuses on the intrinsic macroscopic characteristics of network,which...Towards the problems of existing detection methods,a novel real-time detection method(DMFIF) based on fractal and information fusion is proposed.It focuses on the intrinsic macroscopic characteristics of network,which reflect not the "unique" abnormalities of P2P botnets but the "common" abnormalities of them.It regards network traffic as the signal,and synthetically considers the macroscopic characteristics of network under different time scales with the fractal theory,including the self-similarity and the local singularity,which don't vary with the topology structures,the protocols and the attack types of P2P botnet.At first detect traffic abnormalities of the above characteristics with the nonparametric CUSUM algorithm,and achieve the final result by fusing the above detection results with the Dempster-Shafer evidence theory.Moreover,the side effect on detecting P2P botnet which web applications generated is considered.The experiments show that DMFIF can detect P2P botnet with a higher degree of precision.展开更多
For the problem of large network load generated by the Gnutella resource-searching model in Peer to Peer (P2P) network, a improved model to decrease the network expense is proposed, which establishes a duster in P2P...For the problem of large network load generated by the Gnutella resource-searching model in Peer to Peer (P2P) network, a improved model to decrease the network expense is proposed, which establishes a duster in P2P network, auto-organizes logical layers, and applies a hybrid mechanism of directional searching and flooding. The performance analysis and simulation results show that the proposed hierarchical searching model has availably reduced the generated message load and that its searching-response time performance is as fairly good as that of the Gnutella model.展开更多
A model of mobile peer to peer (P2P) network architecture based on agent for mobile value-added services is proposed in this paper. By using this model, wireless devices can build a P2P network dynamically, and then t...A model of mobile peer to peer (P2P) network architecture based on agent for mobile value-added services is proposed in this paper. By using this model, wireless devices can build a P2P network dynamically, and then they can access and transmit information peer to peer. An ontologybased semantic information description method is also proposed for the mobile wireless devices. The merit of this method is to enhance search efficiency. Moreover, a small system, called CellChat, has been implemented based on this model in the lab environment. Experimental results are provided to show that the benefi ts of the proposed method. This method will become an effective solution for mobile value-added services in 3G network.展开更多
In unstructured peer-to-peer (P2P) systems such as Gnutella, a general routing search algorithm is used to blindly flood a query through network among peers. But unfortunately, malicious nodes could easily make use ...In unstructured peer-to-peer (P2P) systems such as Gnutella, a general routing search algorithm is used to blindly flood a query through network among peers. But unfortunately, malicious nodes could easily make use of the search approach launching distributed denial of service (DDoS) attack which aims at the whole network. In order to alleviate or minimize the bad effect due to behavior of malicious nodes using the flooding search mechanism, the paper proposes a Markov-based evaluation model which exerts the trust and reputation mechanism to computing the level of trustworthy of nodes having the information requested by evaluation of the nodes' history behavior. Moreover, it can differentiate malicious nodes as early as possible for isolating and controlling the ones' message transmitted. The simulation results of the algorithm proposed show that it could effectively isolate malicious nodes, and hold back the transmission of vicious messages so that it could enhance tolerance of DDoS based on flooding in Guutella-like P2P network.展开更多
This paper presents a resource scheduling approach in grid computing environment. Using P2P technology, this novel approach can schedule dynamic grid computing resources efficiently. Grid computing resources in differ...This paper presents a resource scheduling approach in grid computing environment. Using P2P technology, this novel approach can schedule dynamic grid computing resources efficiently. Grid computing resources in different domains are organized into a structured P2P overlay network. Available resource information is published in type of grid services. Task requests for computational resources are also presented as grid services. Problem of resources scheduling is translated into services discovery. Different from central scheduling approaches that collect available resources information, this Chord-based approach forwards task requests in the overlay network and discovers satisfied resources for these tasks. Using this approach, the computational resources of a grid system can be scheduled dynamically according to the real- time workload on each peer. Furthermore, the application of this approach is introduced into DDG, a grid system for drug discovery and design, to evaluate the performance. Experimental results show that computational resources of a grid system can be managed efficiently, and the system can hold a perfect load balance state and robustness.展开更多
Since 2007,people's spending habits began to change:from cash to the bank card,from mobile phone to non-cash transactions,from traditional finance to network finance.And the rapid rise of emerging industries resul...Since 2007,people's spending habits began to change:from cash to the bank card,from mobile phone to non-cash transactions,from traditional finance to network finance.And the rapid rise of emerging industries results in many of the P2P Financial Corporation established,it makes the P2P platform trading volume continue to rise at an alarming rate.In this context,the industry self-discipline environment is like the mining of good and evil.The atmosphere was foul,bad phenomenon,investors difficult activist phenomenon,the phenomenon of credit default as one falls,another rises to a series of problems,such as serious absence of P2P financial supervision to promote the healthy and sustainable development,is a major problem for all participants,which must to be solved.Firstly,P2P development of management mode in the current situation in our country is discussed,and then it analyzes the P2P network of financial management platform,finally it proposes the existing problems in the relative countermeasures and suggestions of effective P2P financing mode,hoping to promote its advantages,overcoming the disadvantages of P2P.展开更多
基金Supported by the National High-Technology Re-search and Development Program of China(2003AA414210) the National Natural Science Foundation of China (60573090)
文摘The differences between the data integration of a dynamic database grid (DBG) and that of a distributed database system are analyzed, and three kinds of data integration strategies are given on the background of DBG based on Peer to Peer (P2P) framework, including the centralized data integration (CDI) strategy, the distributed data integration (DDI) strategy and the filter-based data integration (FDDI) strategy. CDI calls all the database grid services (DGSs) at a single node, DDI disperses the DGSs to multiple nodes, while FDDI schedules the data integration nodes based on filtering the keywords returned from DGSs. The performance of these three integration strategies are compared with and analyzed by simulation experiments. FDDI is more evident for filtering the keywords with data redundancy increasing. Through the reduction of large amount of data transportation, it effectively shortens the executing time for the task and improves its efficiency.
基金Supported by the Open Research Foundation of National Key Laboratory (SKLSE04-018)National Social Science Foundation of China (06BTQ024)the Science and Technical Key Project of Hubei Province (2005AA101C43)
文摘In P2P Grid computing systems, the authorization decision is often tackled by two different trust management methods: policy-based approach, where authorization are built on logical rules and verifiable properties encoded in signed credentials, and reputation-based approach, based on collecting, aggregating and disseminating reputation among the peers. However, the overhead caused by proof of compliance on authorization and the absence of certifying authorities may negate the strong and objective security advantages of policy-based approach, whilst vagueness, complexity and inaccurate characterization caused by reputation evolution may eliminate the quantitative and flexible advantages of reputation-based approach. We propose an adaptive trust management framework, which combines the merit of policy proof and reputation evolution such that authorization is aware of not only the strong and objective security traits, but also the calculability and the availability security traits. Finally, the framework of system is proposed.
基金supported by the Basic Science Research Program through the National Research Foundation of Korea (NRF) funded by the Ministry of Education (2012R1A1A4A0105777)supported by the MSIP (Ministry of Science, ICT and Future Planning), Korea, under the ITRC (Information Technology Research Center) support program (NIPA-2013-H030113-4007) supervised by the NIPA (National IT Industry Promotion Agency)
文摘A scheduling scheme is proposed to reduce execution time by means of both checkpoint sharing and task duplication under a peer-to-peer(P2P) architecture. In the scheme, the checkpoint executed by each peer(i.e., a resource) is used as an intermediate result and executed in other peers via its duplication and transmission. As the checkpoint is close to a final result, the reduction of execution time for each task becomes higher, leading to reducing turnaround time. To evaluate the performance of our scheduling scheme in terms of transmission cost and execution time, an analytical model with an embedded Markov chain is presented. We also conduct simulations with a failure rate of tasks and compare the performance of our scheduling scheme with that of the existing scheme based on client-server architecture. Performance results show that our scheduling scheme is superior to the existing scheme with respect to the reduction of execution time and turnaround time.
文摘In the past decade,online Peer-to-Peer(P2P)lending platforms have transformed the lending industry,which has been historically dominated by commercial banks.Information technology breakthroughs such as big data-based financial technologies(Fintech)have been identified as important disruptive driving forces for this paradigm shift.In this paper,we take an information economics perspective to investigate how big data affects the transformation of the lending industry.By identifying how signaling and search costs are reduced by big data analytics for credit risk management of P2P lending,we discuss how information asymmetry is reduced in the big data era.Rooted in the lending business,we propose a theory on the economics of big data and outline a number of research opportunities and challenging issues.
文摘With the rapid growth of information and communication technology (ICT), the violation of information privacy has increased in recent years. The privacy concerns now re-emerge right because people perceives a threat from new ICT that are equipped with enhanced capabilities for surveillance, storage, retrieval, and diffusion of personal information. With the trend in the prevalence and the easy use of ICT, it is of necessary to pay much attention to the issue how the ICT can threaten the privacy of individuals on the Internet. While the Email and P2P (Peer-to-Peer) tools are the most popular ICT, this paper aims at understanding their respectively dissemination patterns in spreading of personal private information. To this purpose, this paper using dynamic model technique to simulate the pattern of sensitive or personal private information propagating situation. In this study, an Email propagation model and a Susceptible-lnfected-Removed (SIR) model are proposed to simulate the propagation patterns of Email and P2P network respectively. Knowing their dissemination patterns would be helpful for system designers, ICT manager, corporate IT personnel, educators, policy makers, and legislators to incorporate consciousness of social and ethical information issues into the protection of information privacy.
基金the National Natural Science Foundation of China(30670421,60773191).
文摘PeerMD, a P2P molecular dynamics simulation frame-work based on Web services is proposed. It utilizes rich free CPU time and network bandwidth of P2P networks to provide enough resources for dynamics simulation of bio-macromolecule, and has resolved the problem that it is difficult to interoperate between heterogeneous peers in P2P environment through Web services. Structure of PeerMD is given. Function, input and output of molecular dynamics simulation Web service are defined. Processes of publishing, discovering and invoking of molecular dynamics simulation Web service based on multi-level SuperPeer are given. A protocol system of PeerMD is implemented on a basic P2P platform JXTA, and experimental simulations of tumor necrosis fact alpha (TNF-α) and two mutations of it are executed on the protocol system. Simulation results show that PeerMD can speed up molecular dynamics simulation perfectly.
文摘A model is built to analyze the performance of service location based on greedy search in P2P networks. Hops and relative QoS index of the node found in a service location process are used to evaluate the performance as well as the probability of locating the top 5% nodes with highest QoS level. Both model and simulation results show that, the performance of greedy search based service location improves significantly with the increase of the average degree of the network. It is found that, if changes of both overlay topology and QoS level of nodes can be ignored during a location process, greedy-search based service location has high probability of finding the nodes with relatively high QoS in small number of hops in a big overlay network. Model extension under arbitrary network degree distribution is also studied.
基金National Natural Science Foundation of China ( No. 71171045 ) Fundamental Research Funds for the Central Universities,China ( No. 11D10413,No. 11D10417,No. 12D10416 ) Donghua University Research Foundation for Young Teacher,China ( No. 104-10-0044010 )
文摘Application layer multicast (ALM) has been widely applied in Internet, as a substitute for IP multicast. However, it causes network load to increase because it adopts unlcast in data transmission, which limits the application. In this article, in order to improve the ALM performance in P2P-SIP network, an ALM model was proposed which reduced network load via merging messages in concast mode. Finally network simulations prove that this model has better benefit on single node load and average network load. Therefore, it is suitable for streaming media service in P2P-SIP Network.
文摘The spread of social media has increased contacts of members of communities on the lntemet. Members of these communities often use account names instead of real names. When they meet in the real world, they will find it useful to have a tool that enables them to associate the faces in fiont of them with the account names they know. This paper proposes a method that enables a person to identify the account name of the person ("target") in front of him/her using a smartphone. The attendees to a meeting exchange their identifiers (i.e., the account name) and GPS information using smartphones. When the user points his/her smartphone towards a target, the target's identifier is displayed near the target's head on the camera screen using AR (augmented reality). The position where the identifier is displayed is calculated from the differences in longitude and latitude between the user and the target and the azimuth direction of the target from the user. The target is identified based on this information, the face detection coordinates, and the distance between the two. The proposed method has been implemented using Android terminals, and identification accuracy has been examined through experiments.
基金supported by National High Technical Research and Development Program of China(863 Program)under Grant No.2011AA7031024GNational Natural Science Foundation of China under Grant No.90204014
文摘Towards the problems of existing detection methods,a novel real-time detection method(DMFIF) based on fractal and information fusion is proposed.It focuses on the intrinsic macroscopic characteristics of network,which reflect not the "unique" abnormalities of P2P botnets but the "common" abnormalities of them.It regards network traffic as the signal,and synthetically considers the macroscopic characteristics of network under different time scales with the fractal theory,including the self-similarity and the local singularity,which don't vary with the topology structures,the protocols and the attack types of P2P botnet.At first detect traffic abnormalities of the above characteristics with the nonparametric CUSUM algorithm,and achieve the final result by fusing the above detection results with the Dempster-Shafer evidence theory.Moreover,the side effect on detecting P2P botnet which web applications generated is considered.The experiments show that DMFIF can detect P2P botnet with a higher degree of precision.
文摘For the problem of large network load generated by the Gnutella resource-searching model in Peer to Peer (P2P) network, a improved model to decrease the network expense is proposed, which establishes a duster in P2P network, auto-organizes logical layers, and applies a hybrid mechanism of directional searching and flooding. The performance analysis and simulation results show that the proposed hierarchical searching model has availably reduced the generated message load and that its searching-response time performance is as fairly good as that of the Gnutella model.
基金funded by the Special Funds for Key Program of China No. 2009ZX01039-002-001-07
文摘A model of mobile peer to peer (P2P) network architecture based on agent for mobile value-added services is proposed in this paper. By using this model, wireless devices can build a P2P network dynamically, and then they can access and transmit information peer to peer. An ontologybased semantic information description method is also proposed for the mobile wireless devices. The merit of this method is to enhance search efficiency. Moreover, a small system, called CellChat, has been implemented based on this model in the lab environment. Experimental results are provided to show that the benefi ts of the proposed method. This method will become an effective solution for mobile value-added services in 3G network.
基金Supported by the National Natural Science Foundation of China (No.6057312, 60473090)
文摘In unstructured peer-to-peer (P2P) systems such as Gnutella, a general routing search algorithm is used to blindly flood a query through network among peers. But unfortunately, malicious nodes could easily make use of the search approach launching distributed denial of service (DDoS) attack which aims at the whole network. In order to alleviate or minimize the bad effect due to behavior of malicious nodes using the flooding search mechanism, the paper proposes a Markov-based evaluation model which exerts the trust and reputation mechanism to computing the level of trustworthy of nodes having the information requested by evaluation of the nodes' history behavior. Moreover, it can differentiate malicious nodes as early as possible for isolating and controlling the ones' message transmitted. The simulation results of the algorithm proposed show that it could effectively isolate malicious nodes, and hold back the transmission of vicious messages so that it could enhance tolerance of DDoS based on flooding in Guutella-like P2P network.
文摘This paper presents a resource scheduling approach in grid computing environment. Using P2P technology, this novel approach can schedule dynamic grid computing resources efficiently. Grid computing resources in different domains are organized into a structured P2P overlay network. Available resource information is published in type of grid services. Task requests for computational resources are also presented as grid services. Problem of resources scheduling is translated into services discovery. Different from central scheduling approaches that collect available resources information, this Chord-based approach forwards task requests in the overlay network and discovers satisfied resources for these tasks. Using this approach, the computational resources of a grid system can be scheduled dynamically according to the real- time workload on each peer. Furthermore, the application of this approach is introduced into DDG, a grid system for drug discovery and design, to evaluate the performance. Experimental results show that computational resources of a grid system can be managed efficiently, and the system can hold a perfect load balance state and robustness.
文摘Since 2007,people's spending habits began to change:from cash to the bank card,from mobile phone to non-cash transactions,from traditional finance to network finance.And the rapid rise of emerging industries results in many of the P2P Financial Corporation established,it makes the P2P platform trading volume continue to rise at an alarming rate.In this context,the industry self-discipline environment is like the mining of good and evil.The atmosphere was foul,bad phenomenon,investors difficult activist phenomenon,the phenomenon of credit default as one falls,another rises to a series of problems,such as serious absence of P2P financial supervision to promote the healthy and sustainable development,is a major problem for all participants,which must to be solved.Firstly,P2P development of management mode in the current situation in our country is discussed,and then it analyzes the P2P network of financial management platform,finally it proposes the existing problems in the relative countermeasures and suggestions of effective P2P financing mode,hoping to promote its advantages,overcoming the disadvantages of P2P.