您的位置:山东大学 -> 科技期刊社 -> 《山东大学学报(理学版)》

山东大学学报(理学版) ›› 2014, Vol. 49 ›› Issue (09): 97-102.doi: 10.6040/j.issn.1671-9352.2.2014.307

• 论文 • 上一篇    下一篇

P2P系统中一种基于TMR优化的信誉评估算法

彭浩, 赵丹丹, 韩建民, 鲁剑锋   

  1. 浙江师范大学数理与信息工程学院计算机科学与工程系, 浙江 金华 321004
  • 收稿日期:2014-06-24 修回日期:2014-08-27 出版日期:2014-09-20 发布日期:2014-09-30
  • 作者简介:彭浩(1982-),男,讲师,博士,主要研究方向为可信计算、网络与信息安全、复杂系统安全.E-mail:hpeng@zjnu.edu.cn
  • 基金资助:
    国家自然科学基金资助项目(61170108);教育部人文社会科学研究青年基金项目(12YJCZH142);浙江省自然科学基金资助项目(LQ13F020007);上海市信息安全综合管理技术研究重点实验室开放课题项目(AGK2013003)

A reputation evaluation algorithm based on transitive mode of reputation optimization in P2P system

PENG Hao, ZHAO Dan-dan, HAN Jian-min, LU Jian-feng   

  1. 1. Department of Computer Science and Engineering, College of Mathematics, Physics and Information Engineering, Zhejiang Normal University, Jinhua 321004, Zhejiang, China
  • Received:2014-06-24 Revised:2014-08-27 Online:2014-09-20 Published:2014-09-30

摘要: P2P系统中的节点具有随机性和动态性,如何建立节点间的信任关系,是亟需解决的难点和关键性问题。目前P2P系统中主要采用传递模式算法计算节点的信誉值,分析了该算法存在的信誉值评估结果失真的问题,并对算法进行了优化。实验结果表明,信誉评估的优化算法得出的信誉值更加接近理想值,从而提高了P2P系统对恶意节点的识别能力。

关键词: P2P, 本地信誉值, 传递模式, 全局信誉值

Abstract: In P2P(Peer-to-Peer)system,peers present the characteristics of random and dynamic, and then how to establish a trust relationship between peers is a difficult and key problem that is urgent to solve. At present, the algorithm of reputation computing based on transitive mode is used in P2P system. In this paper, this algorithm was optimized based on analyzing its distortion problem of reputation assessing value. The simulation results show that the reputation assessing value of the optimized algorithm is closer to the ideal value. In this way, the discovery ability of malicious peers is enhanced at the same time.

Key words: P2P (peer-to-peer), transitive mode, local reputation value, global reputation value

中图分类号: 

  • TP393
[1] GOOD N S, KREKELBERG A. Usability and privacy:a study of Kazaa P2P file-sharing[C]//Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. New York: ACM Press, 2003: 137-144.
[2] BOUKERCHE A, ZARRAD A, ARAUJO R B. A Cross-layer approach-based gnutella for collaborative virtual environments over Mobile Ad Hoc networks[J]. IEEE Transactions on Parallel and Distributed Systems, 2010, 21(7): 911-924.
[3] 苗光胜,冯登国,苏璞睿.P2P信任模型中基于模糊逻辑的共谋团体识别方法[J].计算机研究与发展,2011, 48(12):2187-2200. MIAO Guangsheng, FENG Dengguo, SU Purui. A collusion detector based on fuzzy logic in P2P trust model[J]. Journal of Computer Research and Development, 2011, 48(12): 2187-2200.
[4] 孙波,丁雪峰,司成祥,等.P2P环境下的具有隐私保护的信誉协议[J].计算机科学,2013, 40(z1):334-336, 371. SUN Bo, DING Xuefeng, SI Chengxiang, et al. Privacy preserving reputation protocol for P2P environment[J]. Computer Science, 2013, 40(z1):334-336, 371.
[5] Van Der Heide B, JOHNSON B K, VANG M H.The effects of product photographs and reputation systems on consumer behavior and product cost on eBay[J]. Computers in Human Behavior, 2013, 29(3):570-576.
[6] ZUO Fang, ZHANG Wei. An auction based distribute mechanism for P2P adaptive bandwidth allocation [J]. IEICE Transactions on Information and Systems, 2013, E96D(12):2704-2712.
[7] 蒋越.P2P网络节点信息信任度计算模型仿真研究[J].计算机仿真,2014, 31(1):298-301. JIANG Yue. Research and simulation on information trust calculation model of P2P network nodes[J]. Computer Simulation, 2014, 31(1):298-301.
[8] 周慎,祝跃飞.P2P环境下抗共谋攻击的自适应信任反馈聚合方法[J].计算机应用研究,2013, 30(2):494-496. ZHOU Shen, ZHU Yuefei. Adaptive P2P trust aggregation method for resisting collusion attack[J]. Application Research of Computers, 2013, 30(2):494-496.
[9] WANG Haoyu, ZHAO Yunfeng, MENG Xiangde, et al. Achieving quick trust transmission in P2P network based on matrix operation [J]. Applied Mechanics and Materials, 2013, 325:1717-1721.
[10] SONG Fei, WANG Xiaojing, CUI Zhe. A trust model of P2P in cloud computing environment [J]. Applied Mechanics and Materials, 2013, 278:1962-1965.
[11] 韩磊磊,陈越,于丽莉.P2P网络的恶意节点检测模型[J].计算机工程与设计,2011, 32(2):484-488. HAN Leilei, CHEN Yue, YU Lili. Malicious node detecting model for P2P networks [J]. Computer Engineering and Design, 2011, 32(2):484-488.
[12] LI Xiaoyong, ZHOU Feng, YANG Xudong. A multi-dimensional trust evaluation model for large-scale P2P computing[J]. Journal of Parallel and Distributed Computing, 2011, 71(6):837-847.
[13] FAN Xinxin, LI Mingchu, REN Yizhi, et al. Dual-EigenRep: a reputation-based trust model for P2P File-Sharing networks[C]//Proceedings of the 7th International Conference on Ubiquitous Intelligence & Computing and the 7th International Conference on Autonomic & Trusted Computing (UIC/ATC 2010). Los Alamitos: IEEE Computer Society, 2010:358-363.
[14] HSIAO H W, LIN C S, CHEN Kunyu. How the information and communications technology threaten our privacy:the case of email and P2P propagation models[J]. Computer Technology and Application, 2011, 2(10):765-773.
[15] ZHANG Xiaohong, HANG Jian, LI Lou. Research of P2P searching technology based on distributed hash table [J]. Applied Mechanics and Materials, 2013, 263:2271-2276.
[16] 孙苏,仲红,石润华,等.基于信任评估的Ad hoc网络安全路由协议[J].计算机工程,2012, 38(20):76-80. SUN Su, ZHONG Hong, SHI Runhua, et al. Secure routing protocol based on trust evaluation in Ad hoc network[J]. Computer Engineering, 2012, 38(20):76-80.
[17] 王海晟,桂小林.基于不满意度的网络安全模型[J].计算机应用研究,2013, 30(2):566-569. WANG Haisheng, GUI Xiaolin. New network security model based on degree of dissatisfaction [J]. Application Research of Computers, 2013, 30(2):566-569.
[18] 孙秋景,曾凡平,曹勇.基于可信推荐节点集合的P2P信誉模型[J].计算机工程,2010, 36(20):142-144. SUN Qiujing, ZENG Fanping, CAO Yong. P2P reputation model based on credible recommendation node set[J]. Computer Engineering, 2010, 36(20):142-144.
[19] LI Xiaoyong, FENG Zhou, YANG Xudong. Scalable feedback aggregating (SFA) overlay for Large-Scale P2P trust management[J]. IEEE Transactions on Parallel and Distributed Systems, 2012, 23(10):1944-1957.
[20] FAN Xinxin, LI Mingchu, ZHAO Hui, et al. Peer cluster: a maximum flow-based trust mechanism in P2P file sharing networks [J]. Security and Communication Networks, 2013, 6(9):1126-1142.
[21] 郝黎明,杨树堂,陆松年,等.基于可信度的传递模式信誉值计算改进算法[J].计算机工程,2008, 34(3):18-20. HAO Liming, YANG Shutang, LU Songnian, et al. Improved algorithm of transitive mode reputation value computing based on certain factor[J]. Computer Engineering, 2008, 34(3):18-20.
[22] 郝黎明.P2P信誉系统中基于可信计算技术的匿名机制研究[D].上海:上海交通大学,2008. HAO Liming. Research on anonymous schemes in P2P reputation systems based on trusted computing technology[D]. Shanghai: Shanghai Jiaotong University, 2008.
[23] 杨绪兵,王一雄,陈斌.马氏度量学习中的几个关键问题研究及几何解释[J].南京大学学报:自然科学版,2013, 49(2):133-141. YANG Xubing, WANG Yixiong, CHEN Bin. Research on several key problems of Mahalanobis metric learning and corresponding geometrical interpretaions[J]. Journal of Nanjing University: Natural Sciences, 2013, 49(2):133-141.
[1] 宋元章,李洪雨,陈媛,王俊杰. 基于分形与自适应数据融合的P2P botnet检测方法[J]. 山东大学学报(理学版), 2017, 52(3): 74-81.
[2] 李宇溪,王恺璇,林慕清,周福才. 基于匿名广播加密的P2P社交网络隐私保护系统[J]. 山东大学学报(理学版), 2016, 51(9): 84-91.
[3] 刘健1,尹春霞2*,原福永3. 基于非结构化P2P网络用户模型的协同过滤推荐机制[J]. J4, 2011, 46(5): 28-33.
[4] 秦丰林1,2,江林3,葛连升2*. P2P流媒体系统的激励机制[J]. J4, 2010, 45(3): 29-33.
[5] 孟 雷,孙彦杰 . 基于P2P的异构数据库数据同步研究[J]. J4, 2008, 43(11): 61-66 .
[6] 陈 坤,刘方爱,邢长明 . 一种基于分层P2P结构的教育资源网格检索模型[J]. J4, 2008, 43(11): 72-76 .
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!