JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE) ›› 2014, Vol. 49 ›› Issue (09): 97-102.doi: 10.6040/j.issn.1671-9352.2.2014.307

Previous Articles     Next Articles

A reputation evaluation algorithm based on transitive mode of reputation optimization in P2P system

PENG Hao, ZHAO Dan-dan, HAN Jian-min, LU Jian-feng   

  1. 1. Department of Computer Science and Engineering, College of Mathematics, Physics and Information Engineering, Zhejiang Normal University, Jinhua 321004, Zhejiang, China
  • Received:2014-06-24 Revised:2014-08-27 Online:2014-09-20 Published:2014-09-30

Abstract: In P2P(Peer-to-Peer)system,peers present the characteristics of random and dynamic, and then how to establish a trust relationship between peers is a difficult and key problem that is urgent to solve. At present, the algorithm of reputation computing based on transitive mode is used in P2P system. In this paper, this algorithm was optimized based on analyzing its distortion problem of reputation assessing value. The simulation results show that the reputation assessing value of the optimized algorithm is closer to the ideal value. In this way, the discovery ability of malicious peers is enhanced at the same time.

Key words: P2P (peer-to-peer), transitive mode, local reputation value, global reputation value

CLC Number: 

  • TP393
[1] GOOD N S, KREKELBERG A. Usability and privacy:a study of Kazaa P2P file-sharing[C]//Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. New York: ACM Press, 2003: 137-144.
[2] BOUKERCHE A, ZARRAD A, ARAUJO R B. A Cross-layer approach-based gnutella for collaborative virtual environments over Mobile Ad Hoc networks[J]. IEEE Transactions on Parallel and Distributed Systems, 2010, 21(7): 911-924.
[3] 苗光胜,冯登国,苏璞睿.P2P信任模型中基于模糊逻辑的共谋团体识别方法[J].计算机研究与发展,2011, 48(12):2187-2200. MIAO Guangsheng, FENG Dengguo, SU Purui. A collusion detector based on fuzzy logic in P2P trust model[J]. Journal of Computer Research and Development, 2011, 48(12): 2187-2200.
[4] 孙波,丁雪峰,司成祥,等.P2P环境下的具有隐私保护的信誉协议[J].计算机科学,2013, 40(z1):334-336, 371. SUN Bo, DING Xuefeng, SI Chengxiang, et al. Privacy preserving reputation protocol for P2P environment[J]. Computer Science, 2013, 40(z1):334-336, 371.
[5] Van Der Heide B, JOHNSON B K, VANG M H.The effects of product photographs and reputation systems on consumer behavior and product cost on eBay[J]. Computers in Human Behavior, 2013, 29(3):570-576.
[6] ZUO Fang, ZHANG Wei. An auction based distribute mechanism for P2P adaptive bandwidth allocation [J]. IEICE Transactions on Information and Systems, 2013, E96D(12):2704-2712.
[7] 蒋越.P2P网络节点信息信任度计算模型仿真研究[J].计算机仿真,2014, 31(1):298-301. JIANG Yue. Research and simulation on information trust calculation model of P2P network nodes[J]. Computer Simulation, 2014, 31(1):298-301.
[8] 周慎,祝跃飞.P2P环境下抗共谋攻击的自适应信任反馈聚合方法[J].计算机应用研究,2013, 30(2):494-496. ZHOU Shen, ZHU Yuefei. Adaptive P2P trust aggregation method for resisting collusion attack[J]. Application Research of Computers, 2013, 30(2):494-496.
[9] WANG Haoyu, ZHAO Yunfeng, MENG Xiangde, et al. Achieving quick trust transmission in P2P network based on matrix operation [J]. Applied Mechanics and Materials, 2013, 325:1717-1721.
[10] SONG Fei, WANG Xiaojing, CUI Zhe. A trust model of P2P in cloud computing environment [J]. Applied Mechanics and Materials, 2013, 278:1962-1965.
[11] 韩磊磊,陈越,于丽莉.P2P网络的恶意节点检测模型[J].计算机工程与设计,2011, 32(2):484-488. HAN Leilei, CHEN Yue, YU Lili. Malicious node detecting model for P2P networks [J]. Computer Engineering and Design, 2011, 32(2):484-488.
[12] LI Xiaoyong, ZHOU Feng, YANG Xudong. A multi-dimensional trust evaluation model for large-scale P2P computing[J]. Journal of Parallel and Distributed Computing, 2011, 71(6):837-847.
[13] FAN Xinxin, LI Mingchu, REN Yizhi, et al. Dual-EigenRep: a reputation-based trust model for P2P File-Sharing networks[C]//Proceedings of the 7th International Conference on Ubiquitous Intelligence & Computing and the 7th International Conference on Autonomic & Trusted Computing (UIC/ATC 2010). Los Alamitos: IEEE Computer Society, 2010:358-363.
[14] HSIAO H W, LIN C S, CHEN Kunyu. How the information and communications technology threaten our privacy:the case of email and P2P propagation models[J]. Computer Technology and Application, 2011, 2(10):765-773.
[15] ZHANG Xiaohong, HANG Jian, LI Lou. Research of P2P searching technology based on distributed hash table [J]. Applied Mechanics and Materials, 2013, 263:2271-2276.
[16] 孙苏,仲红,石润华,等.基于信任评估的Ad hoc网络安全路由协议[J].计算机工程,2012, 38(20):76-80. SUN Su, ZHONG Hong, SHI Runhua, et al. Secure routing protocol based on trust evaluation in Ad hoc network[J]. Computer Engineering, 2012, 38(20):76-80.
[17] 王海晟,桂小林.基于不满意度的网络安全模型[J].计算机应用研究,2013, 30(2):566-569. WANG Haisheng, GUI Xiaolin. New network security model based on degree of dissatisfaction [J]. Application Research of Computers, 2013, 30(2):566-569.
[18] 孙秋景,曾凡平,曹勇.基于可信推荐节点集合的P2P信誉模型[J].计算机工程,2010, 36(20):142-144. SUN Qiujing, ZENG Fanping, CAO Yong. P2P reputation model based on credible recommendation node set[J]. Computer Engineering, 2010, 36(20):142-144.
[19] LI Xiaoyong, FENG Zhou, YANG Xudong. Scalable feedback aggregating (SFA) overlay for Large-Scale P2P trust management[J]. IEEE Transactions on Parallel and Distributed Systems, 2012, 23(10):1944-1957.
[20] FAN Xinxin, LI Mingchu, ZHAO Hui, et al. Peer cluster: a maximum flow-based trust mechanism in P2P file sharing networks [J]. Security and Communication Networks, 2013, 6(9):1126-1142.
[21] 郝黎明,杨树堂,陆松年,等.基于可信度的传递模式信誉值计算改进算法[J].计算机工程,2008, 34(3):18-20. HAO Liming, YANG Shutang, LU Songnian, et al. Improved algorithm of transitive mode reputation value computing based on certain factor[J]. Computer Engineering, 2008, 34(3):18-20.
[22] 郝黎明.P2P信誉系统中基于可信计算技术的匿名机制研究[D].上海:上海交通大学,2008. HAO Liming. Research on anonymous schemes in P2P reputation systems based on trusted computing technology[D]. Shanghai: Shanghai Jiaotong University, 2008.
[23] 杨绪兵,王一雄,陈斌.马氏度量学习中的几个关键问题研究及几何解释[J].南京大学学报:自然科学版,2013, 49(2):133-141. YANG Xubing, WANG Yixiong, CHEN Bin. Research on several key problems of Mahalanobis metric learning and corresponding geometrical interpretaions[J]. Journal of Nanjing University: Natural Sciences, 2013, 49(2):133-141.
[1] LI Yan-ping, QI Yan-jiao, ZHANG Kai, WEI Xu-guang. Multi-authority and revocable attribute-based encryption scheme [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2018, 53(7): 75-84.
[2] ZHANG Guang-zhi, CAI Shao-bin, MA Chun-hua, ZHANG Dong-qiu. Application of maximum distance separable codes in the error correction of the network coding [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2018, 53(1): 75-82.
[3] LI Yang, CHENG Xiong, TONG Yan, CHEN Wei, QIN Tao, ZHANG Jian, XU Ming-di. Method for threaten users mining based on traffic statistic characteristics [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2018, 53(1): 83-88.
[4] ZHAO Guang-yuan, QIN Feng-lin, GUO Xiao-dong. Design and implementation of P2P-based network measurement cloud platform [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2017, 52(12): 104-110.
[5] HUANG Shu-qin, XU Yong, WANG Ping-shui. User similarity calculation method based on probabilistic matrix factorization and its recommendation application [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2017, 52(11): 37-43.
[6] WANG Ya-qi, WANG Jing. Rumor spreading on dynamic complex networks with curious psychological mechanism [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2017, 52(6): 99-104.
[7] CHEN Guang-rui, CHEN Xing-shu, WANG Yi-tong, GE Long. A software update mechanism for virtual machines in IaaS multi-tenant environment [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2017, 52(3): 60-67.
[8] ZHUANG Zheng-mao, CHEN Xing-shu, SHAO Guo-lin, YE Xiao-ming. A time-relevant network traffic anomaly detection approach [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2017, 52(3): 68-73.
[9] SONG Yuan-zhang, LI Hong-yu, CHEN Yuan, WANG Jun-jie. P2P botnet detection method based on fractal and adaptive data fusion [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2017, 52(3): 74-81.
[10] ZHU Sheng, ZHOU Bin, ZHU Xiang. EIP: discovering influential bloggers by user similarity and topic timeliness [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2016, 51(9): 113-120.
[11] . An approach of detecting LDoS attacks based on the euclidean distance of available bandwidth in cloud computing [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2016, 51(9): 92-100.
[12] LI Yu-xi, WANG Kai-xuan, LIN Mu-qing, ZHOU Fu-cai. A P2P network privacy protection system based on anonymous broadcast encryption scheme [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2016, 51(9): 84-91.
[13] SU Bin-ting, XU Li, FANG He, WANG Feng. Fast authentication mechanism based on Diffie-Hellman for wireless mesh networks [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2016, 51(9): 101-105.
[14] LIN Li. News event extraction based on kernel dependency graph [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2016, 51(9): 121-126.
[15] . Construction of expert relationship network based on random walk strategy [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2016, 51(7): 30-34.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!