山东大学学报(理学版) ›› 2014, Vol. 49 ›› Issue (09): 97-102.doi: 10.6040/j.issn.1671-9352.2.2014.307
彭浩, 赵丹丹, 韩建民, 鲁剑锋
PENG Hao, ZHAO Dan-dan, HAN Jian-min, LU Jian-feng
摘要: P2P系统中的节点具有随机性和动态性,如何建立节点间的信任关系,是亟需解决的难点和关键性问题。目前P2P系统中主要采用传递模式算法计算节点的信誉值,分析了该算法存在的信誉值评估结果失真的问题,并对算法进行了优化。实验结果表明,信誉评估的优化算法得出的信誉值更加接近理想值,从而提高了P2P系统对恶意节点的识别能力。
中图分类号:
[1] GOOD N S, KREKELBERG A. Usability and privacy:a study of Kazaa P2P file-sharing[C]//Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. New York: ACM Press, 2003: 137-144. [2] BOUKERCHE A, ZARRAD A, ARAUJO R B. A Cross-layer approach-based gnutella for collaborative virtual environments over Mobile Ad Hoc networks[J]. IEEE Transactions on Parallel and Distributed Systems, 2010, 21(7): 911-924. [3] 苗光胜,冯登国,苏璞睿.P2P信任模型中基于模糊逻辑的共谋团体识别方法[J].计算机研究与发展,2011, 48(12):2187-2200. MIAO Guangsheng, FENG Dengguo, SU Purui. A collusion detector based on fuzzy logic in P2P trust model[J]. Journal of Computer Research and Development, 2011, 48(12): 2187-2200. [4] 孙波,丁雪峰,司成祥,等.P2P环境下的具有隐私保护的信誉协议[J].计算机科学,2013, 40(z1):334-336, 371. SUN Bo, DING Xuefeng, SI Chengxiang, et al. Privacy preserving reputation protocol for P2P environment[J]. Computer Science, 2013, 40(z1):334-336, 371. [5] Van Der Heide B, JOHNSON B K, VANG M H.The effects of product photographs and reputation systems on consumer behavior and product cost on eBay[J]. Computers in Human Behavior, 2013, 29(3):570-576. [6] ZUO Fang, ZHANG Wei. An auction based distribute mechanism for P2P adaptive bandwidth allocation [J]. IEICE Transactions on Information and Systems, 2013, E96D(12):2704-2712. [7] 蒋越.P2P网络节点信息信任度计算模型仿真研究[J].计算机仿真,2014, 31(1):298-301. JIANG Yue. Research and simulation on information trust calculation model of P2P network nodes[J]. Computer Simulation, 2014, 31(1):298-301. [8] 周慎,祝跃飞.P2P环境下抗共谋攻击的自适应信任反馈聚合方法[J].计算机应用研究,2013, 30(2):494-496. ZHOU Shen, ZHU Yuefei. Adaptive P2P trust aggregation method for resisting collusion attack[J]. Application Research of Computers, 2013, 30(2):494-496. [9] WANG Haoyu, ZHAO Yunfeng, MENG Xiangde, et al. Achieving quick trust transmission in P2P network based on matrix operation [J]. Applied Mechanics and Materials, 2013, 325:1717-1721. [10] SONG Fei, WANG Xiaojing, CUI Zhe. A trust model of P2P in cloud computing environment [J]. Applied Mechanics and Materials, 2013, 278:1962-1965. [11] 韩磊磊,陈越,于丽莉.P2P网络的恶意节点检测模型[J].计算机工程与设计,2011, 32(2):484-488. HAN Leilei, CHEN Yue, YU Lili. Malicious node detecting model for P2P networks [J]. Computer Engineering and Design, 2011, 32(2):484-488. [12] LI Xiaoyong, ZHOU Feng, YANG Xudong. A multi-dimensional trust evaluation model for large-scale P2P computing[J]. Journal of Parallel and Distributed Computing, 2011, 71(6):837-847. [13] FAN Xinxin, LI Mingchu, REN Yizhi, et al. Dual-EigenRep: a reputation-based trust model for P2P File-Sharing networks[C]//Proceedings of the 7th International Conference on Ubiquitous Intelligence & Computing and the 7th International Conference on Autonomic & Trusted Computing (UIC/ATC 2010). Los Alamitos: IEEE Computer Society, 2010:358-363. [14] HSIAO H W, LIN C S, CHEN Kunyu. How the information and communications technology threaten our privacy:the case of email and P2P propagation models[J]. Computer Technology and Application, 2011, 2(10):765-773. [15] ZHANG Xiaohong, HANG Jian, LI Lou. Research of P2P searching technology based on distributed hash table [J]. Applied Mechanics and Materials, 2013, 263:2271-2276. [16] 孙苏,仲红,石润华,等.基于信任评估的Ad hoc网络安全路由协议[J].计算机工程,2012, 38(20):76-80. SUN Su, ZHONG Hong, SHI Runhua, et al. Secure routing protocol based on trust evaluation in Ad hoc network[J]. Computer Engineering, 2012, 38(20):76-80. [17] 王海晟,桂小林.基于不满意度的网络安全模型[J].计算机应用研究,2013, 30(2):566-569. WANG Haisheng, GUI Xiaolin. New network security model based on degree of dissatisfaction [J]. Application Research of Computers, 2013, 30(2):566-569. [18] 孙秋景,曾凡平,曹勇.基于可信推荐节点集合的P2P信誉模型[J].计算机工程,2010, 36(20):142-144. SUN Qiujing, ZENG Fanping, CAO Yong. P2P reputation model based on credible recommendation node set[J]. Computer Engineering, 2010, 36(20):142-144. [19] LI Xiaoyong, FENG Zhou, YANG Xudong. Scalable feedback aggregating (SFA) overlay for Large-Scale P2P trust management[J]. IEEE Transactions on Parallel and Distributed Systems, 2012, 23(10):1944-1957. [20] FAN Xinxin, LI Mingchu, ZHAO Hui, et al. Peer cluster: a maximum flow-based trust mechanism in P2P file sharing networks [J]. Security and Communication Networks, 2013, 6(9):1126-1142. [21] 郝黎明,杨树堂,陆松年,等.基于可信度的传递模式信誉值计算改进算法[J].计算机工程,2008, 34(3):18-20. HAO Liming, YANG Shutang, LU Songnian, et al. Improved algorithm of transitive mode reputation value computing based on certain factor[J]. Computer Engineering, 2008, 34(3):18-20. [22] 郝黎明.P2P信誉系统中基于可信计算技术的匿名机制研究[D].上海:上海交通大学,2008. HAO Liming. Research on anonymous schemes in P2P reputation systems based on trusted computing technology[D]. Shanghai: Shanghai Jiaotong University, 2008. [23] 杨绪兵,王一雄,陈斌.马氏度量学习中的几个关键问题研究及几何解释[J].南京大学学报:自然科学版,2013, 49(2):133-141. YANG Xubing, WANG Yixiong, CHEN Bin. Research on several key problems of Mahalanobis metric learning and corresponding geometrical interpretaions[J]. Journal of Nanjing University: Natural Sciences, 2013, 49(2):133-141. |
[1] | 宋元章,李洪雨,陈媛,王俊杰. 基于分形与自适应数据融合的P2P botnet检测方法[J]. 山东大学学报(理学版), 2017, 52(3): 74-81. |
[2] | 李宇溪,王恺璇,林慕清,周福才. 基于匿名广播加密的P2P社交网络隐私保护系统[J]. 山东大学学报(理学版), 2016, 51(9): 84-91. |
[3] | 刘健1,尹春霞2*,原福永3. 基于非结构化P2P网络用户模型的协同过滤推荐机制[J]. J4, 2011, 46(5): 28-33. |
[4] | 秦丰林1,2,江林3,葛连升2*. P2P流媒体系统的激励机制[J]. J4, 2010, 45(3): 29-33. |
[5] | 孟 雷,孙彦杰 . 基于P2P的异构数据库数据同步研究[J]. J4, 2008, 43(11): 61-66 . |
[6] | 陈 坤,刘方爱,邢长明 . 一种基于分层P2P结构的教育资源网格检索模型[J]. J4, 2008, 43(11): 72-76 . |
|