期刊文献+

一种基于概率统计方法的P2P系统信任评价模型 被引量:28

A Reputation-Based Trust Model Based on Probability and Statistics for P2P Systems
下载PDF
导出
摘要 现有的P2P系统信任评价模型正面临着两种恶意节点的攻击行为——策略性欺骗和不诚实推荐,严重影响了模型计算节点信任评价的准确性和有效性.针对现有模型存在的不足,提出了一种基于概率统计方法的信任评价模型.该模型借鉴人类社会中主观信任关系的概念,依据直接经验和反馈信息,利用概率统计方法分别计算节点的直接信任和推荐信任,并通过区分直接经验的重要程度,区分反馈信息及其推荐者的可信度,提高信任评价模型的有效性.仿真实验分析说明,与已有的信任评价模型相比,该模型能够更有效地抑制策略性欺骗和不诚实推荐的威胁,特别是复杂的协同作弊方式对系统的攻击. Peer to peer (P2P) technology has been widely used in file-sharing, distributed computing, emarket and information management. One of the fundamental challenges for P2P systems is the ability to manage risks involved in interacting and collaborating with prior unknown and potentially malicious parties. Reputation-based trust management systems can successfully mitigate this risk by deriving the trustworthiness of a certain peer from that peer's behavior history. However, in current trust models employed by the existing P2P systems, the validity of peers' trust valuation is seriously affected by peers' malicious behaviors. For example, there are many strategic cheating and dishonest recommendation. To solve this problem, a novel reputation-based trust model based on probability and statistics for P2P systems is proposed. Referring to subjective trust relationship of sociological theory, the proposed model uses experience-based and recommendation-based trust relationship to compute the trustworthiness of peers. In particular, this model introduces three parameters, namely, experience's time-sensitivity, referee's credibility and recommended information's reliability, and thus it can provide adequate reaction to peers' malicious behaviors. Theoretical analysis and simulation show that the proposed model has advantages in coping with peers' malicious behaviors over the existing P2P reputation systems. It is highly effective in countering malicious peers regarding strategic cheating, dishonest recommendation, and collusion.
出处 《计算机研究与发展》 EI CSCD 北大核心 2008年第3期408-416,共9页 Journal of Computer Research and Development
基金 国家“八六三”高技术研究发展计划基金项目(2007AA01Z422) 国家发改委高技术研究发展计划基金项目(CNGI-04-16-18)
关键词 对等网络 推荐 信任 恶意行为 协同作弊 peer to peer recommendation trust malicious behavior collusion
  • 相关文献

参考文献15

  • 1E Adar, B A Huberman. Free riding on Gnutella [R]. Xerox Palo Alto Research Center, Tech Rep: CSL-00-3, 2000.
  • 2S Kamvar. EigenRep; Reputation management in P2P networks [R]. Stanford University, Tech Rep: SCCM-02-16, 2002.
  • 3K Aberer, Z Despotovic. Managing trust in a peer-2-peer information system [C]. In: Proc of the 10th Int'l Conf on Information and Knowledge Management. New York: ACM Press, 2001. 310-317.
  • 4S Lee, R Sherwood, B Bhattacharjee. Cooperative peer groups in NICE [C]. IEEE INFOCOM 2003, San Francisco, 2003.
  • 5L Mul, M Mohtashemi, A Halberstadt. A computational model of trust and reputation [C]. The 35th Hawaii Int'l Conf on System Science (HICSS 2002), Hawaii, 2002.
  • 6S Buchegger, J Y Le Boudec. A robust reputation system for P2P and mobile ad-hoc networks [C]. The 2nd Workshop on the Economics of Peer-to-Peer Systems, Cambridge, MA, 2004.
  • 7L Xiong, L Liu. PeerTrust: Supporting reputation-based trust for peer-to-peer electronic communities [J]. IEEE Trans on Knowledge and Data Engineering, 2004, 16(7) : 843-857.
  • 8朱峻茂,杨寿保,樊建平,陈明宇.Grid与P2P混合计算环境下基于推荐证据推理的信任模型[J].计算机研究与发展,2005,42(5):797-803. 被引量:44
  • 9D W Manchala. E-commerce trust metrics and models [J]. Internet Computing, 2000, 4(2) : 36-44.
  • 10A Davison. Statistical Models [M]. Cambridge: Cambridge University Press, 2003.

二级参考文献23

  • 1M. Burrows, M. Abadi, R. M. Needham. A logic of authentication. The Royal Society of London, DEC Systems Research Center, Tech. Rep.: 39, 1989.
  • 2R. Yahalom, B. Klein, Th. Beth. Trust relationships in secure systems-A distributed authentication perspective. In: Proc.1993 IEEE Symposium On Research in Security and Privacy. Los Alamitos: IEEE Computer Society Press, 1993. 150~164.
  • 3A. Jφsang. Prospectives for modeling trust in information security. Information Security and Privacy, Second Australasian Conf., ACISP'97, Syndey, NSW, Australia, 1997.
  • 4T. Beth, M. Borcherding, B. Klein. Valuation of trust in open networks. In: Proc. European Symposium on Research in Security (ESORICS). Berlin: Springer-Verlag, 1994. 3~18.
  • 5A.J. Sang. A logic for uncertain probabilities. Int'l Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, 2001, 9(3): 279~311.
  • 6E. Gerck. Toward real-world models of trust: Reliance on received information. http: ∥ www. mcg.org. br/trustdef. htm,1998.
  • 7D. Gambetta. Can we trust trust? In: Trust: Making and Breaking Cooperative Relations (Electronic edition), Department of Sociology, University of Oxford, Chapter 13. http: ∥www. sociology. ox. ac. uk/papers/gambetta 213 ~ 237. pdf, 2000.213~237.
  • 8LA扎德.模糊集合、语言变量及模糊逻辑[M].北京:科学出版社,1982.63-84.
  • 9C. C. Lee. Fuzzy logic in control systems: Fuzzy logic controller-Part Ⅱ. IEEE Trans. System, Man, and Cybernetics, 1990, 20(2): 419~435.
  • 10Ian Foster, Carl Kesselman, Steven Tuecke. The anatomy of the grid. International J. Supercomputer Applications. http://www.globus.org/research/papers/anatomy.pdf, 2001.

共引文献124

同被引文献326

引证文献28

二级引证文献105

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部