期刊文献+

基于信任模糊评价的P2P访问控制模型 被引量:1

Access Control Model of P2P Based on Trust Fuzzy Evaluation
下载PDF
导出
摘要 应用社会信任网络构建的基本原理,给出一种新的P2P访问控制模型。将P2P节点间的信任关系分为直接信任、信任知识和推荐信任3个方面,利用模糊理论对P2P节点进行信任评价,通过扩展多级安全机制实现访问控制,在P2P中的节点间进行交互时,主体节点根据目标节点的信任等级授予其不同的访问权限,以达到保护P2P网络安全的目标,引入加密与数字签名等安全机制,有效地抑制冒名、窃听和女巫攻击等一系列安全性攻击。在P2P网络中恶意节点比重变化的情况下,对引入该访问控制模型前后的情况进行对比实验,结果表明,引入模型后P2P网络中的节点交互成功率有较大提高。 Drawing lessons from the basic principles of social trust network,this paper proposes an access control mode of P2P based on trust of fuzzy evaluation. The trust relationship between nodes is divided into three aspects,direct trust,knowledge of trust,and recommendation trust. It adopts fuzzy theory to evaluate the trust of nodes in P2P network,and realizes access control by extending the Multi-level Security(MLS)mechanism. Before the transaction can be generated between the nodes,according to the trust level of the object node,the subject node grants it different access privileges,so that,the goal of P2P network security is achieved. Some security mechanisms,such as encryption and digital signature,are introduced into this model,as a result,this model is capable of effectively restraining several typical security attacks such as impostor,eavesdrop,and sybil attack. When the proportion of malicious nodes in P2P network is changing,the contrast experiment is doing with the network containing the access control model and without this model. Results show that the success interaction rate of nodes is greatly improved.
作者 龚翱 刘浩
出处 《计算机工程》 CAS CSCD 北大核心 2015年第3期125-129,共5页 Computer Engineering
基金 湖南省自然科学基金资助项目(11JJ3074) 湖南省科技计划基金资助项目(2012GK3117) 湖南省教育厅科学研究基金资助项目(12C0744)
关键词 P2P网络 模糊评价 访问控制 多级安全 授权 安全策略 P2P network fuzzy evaluation access control Multi-level Security(MLS) authorization security strategy
  • 相关文献

参考文献7

二级参考文献48

  • 1林闯,彭雪海.可信网络研究[J].计算机学报,2005,28(5):751-758. 被引量:253
  • 2沈海波,洪帆.基于企业环境的访问控制模型[J].计算机工程,2005,31(14):144-146. 被引量:17
  • 3刘益和,沈昌祥.一个信息安全函数及应用模型[J].计算机辅助设计与图形学学报,2005,17(12):2734-2738. 被引量:7
  • 4廖俊国,洪帆,朱更明,杨秋伟.基于信任度的授权委托模型[J].计算机学报,2006,29(8):1265-1270. 被引量:30
  • 5Blaze M, Feigenbaum J, Lacy J. Decentralized trust management //Proceedings of the 1996 IEEE Symposium on Security and Privacy. Washington, DC, USA, 1996 : 164-173
  • 6Chakraborty S, Ray I. TrustBAC - Integrating Trust Relation - ships into the RBAC Model for Access Control in Open Systems //SACMAT'06. Lake Tahoe, California, USA, 2006 :49-58
  • 7Hong Fan, Zhu Xian, Wang Shaobin. Delegation Depth Control in Trust-management SystemffProeeedings of the 19th International Conference on Advanced Information Networking and Applications. 2005 : 1-4
  • 8Chu Yang-Hua, Feigenbaum J, et al. REFEREE: Trust management for Web applications. World Wide Web Journal, 1997,2 (3):127-139
  • 9Li Ning-Hui,Mitchell J C,Winsborough W H. Design of a rolebased trust-management framework // Proeeedings of the 2002 IEEE Symposium on Security and Privacy. Oakland,CA, USA, 2002:114-130
  • 10Bertino E, Ferrara E, Squicciarini A C. Trust-X: A Peer to Peer framework for trust negotiations. IEEE Transactions on Knowledge and Data Engineering, 2004,16(7) : 827-842

共引文献84

同被引文献6

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部