浏览全部资源
扫码关注微信
[ "林伟,男,福州大学数学与计算机科学学院硕士生,主要研究方向为云计算应用。" ]
[ "郑相涵,男,博士,福州大学数学与计算机科学学院副研究员,主要研究方向为云计算、大数据挖掘及新一代网络技术。" ]
网络出版日期:2015-01,
纸质出版日期:2015-01-20
移动端阅览
林伟, 郑相涵. 基于私有云信任度量的对等网络节点安全互联模型[J]. 电信科学, 2015,31(1):46-52.
Wei Lin, Xianghan Zheng. Private Cloud Assistant Trust Model for P2P Secure Transactions[J]. Telecommunications science, 2015, 31(1): 46-52.
林伟, 郑相涵. 基于私有云信任度量的对等网络节点安全互联模型[J]. 电信科学, 2015,31(1):46-52. DOI: 10.11959/j.issn.1000-0801.2015015.
Wei Lin, Xianghan Zheng. Private Cloud Assistant Trust Model for P2P Secure Transactions[J]. Telecommunications science, 2015, 31(1): 46-52. DOI: 10.11959/j.issn.1000-0801.2015015.
在缺乏必要信任关系的对等网络环境中,节点的安全互联对系统的稳定运行具有重要意义。针对对等网络存在的信任缺陷,借助私有云平台在计算与存储过程中的高效性、安全性等特点,提出一种私有云协助的对等网络信任度量模型。该模型基于主观逻辑理论对连接过程中的节点可信度进行度量,针对网络环境中存在的低质量服务、节点虚假推荐及策略性欺骗等问题开展研究,提出了应对机制。实验仿真结果表明,提出的模型具有较好的可行性、有效性和动态适应性。
Secure transactions among P2P peers are critical for system stability. Considering existing security breaches
a private cloud assistant trust model for P2P session negotiation and connection was proposed. With a few characteristics during computing and storage process(e.g. high efficiency
security
neutrality)
private cloud platform is capable to provide trustworthiness calculation
storage and evaluation for each peer in P2P network. Some coping mechanisms were proposed to curb malicious behaviors
such as low quality services
false recommendation and strategic fraud attaches. Simulation result shows that the proposed model has feasibility
efficiency and dynamic adaptability.
Tomas I , Michael P , Arvind K , et al . A privacy-preserving P2P data sharing with one swarm . ACM SIGCOMM Computer Communication Review , 2010 , 40 ( 4 ): 111 ~ 122
eBay . http://www.ebay.com http://www.ebay.com , 2013
Spora . http://www.spora.ws/en http://www.spora.ws/en , 2013
Kamvar S D , Schlosser M T , Garcia-Molina H . The eigentrust algorithm for reputation management in p2p networks . Proceedings of the 12th International Conference on World Wide Web , Budapest, Hungary , 2003 : 640 ~ 651
Zhou R F , Hwang K . Powertrust: arobust and scalable reputation system for trusted peer-to-peer computing . IEEE Transactions on Parallel and Distributed Systems , 2007 , 18 ( 4 ): 460 ~ 473
Li X , Ling L . Peertrust: supporting reputation-based trust for peer-to-peer electronic communities . IEEE Transaction on Knowledge Data Engineering , 2004 , 16 ( 7 ): 843 ~ 857
J∅sang A , Haller J . Dirichlet reputation systems . Proceedings of International Conference on Availability, Reliability and Security , Vienna, Austria , 2007 : 112 ~ 119
Armbrust M , Fox A , Griffith R . A view of cloud computing . Communications of the ACM , 2010 , 53 ( 4 ): 50 ~ 58
罗军舟 , 金嘉晖 , 宋爱波 . 云计算:体系架构与关键技术 . 通信学报 , 2011 , 32 ( 7 ): 3 ~ 17
Luo J Z , Jin J H , Song A B . Cloud computing: architecture and key technologies . Journal of Communications , 2011 , 32 ( 7 ): 3 ~ 17
Basmadjian R , De Meer H , Lent R , et al . Cloud computing and its interest in saving energy: the use case of a private cloud . Journal of Cloud Computing , 2012 , 1 ( 1 ): 1 ~ 25
J∅sang A , Hayward R , Pope S . Trust network analysis with subjective logic . Proceedings of the 29th Australasian Computer Science Conference , Hobart, Australian , 2006 : 85 ~ 94
Denko M K , Sun T , Woungang I . Trust management in ubiquitous computing: a bayesian approach . Computer Communications , 2011 , 34 ( 3 ): 398 ~ 406
Quercia D , Hailes S , Capra L . B-trust: bayesian trust framework for pervasive computing . Proceedings of 4th International Conference , iTrust, Pisa, Italy , 2006 : 289 ~ 312
Teacy W T , Patel J , Jennings N R , et al . Coping with inaccurate reputation sources: experimental analysis of a probabilistic trust model . Proceedings of the 4th International Conference on Autonomous Agents and Multiagent Systems , Ultrecht,Netherlands , 2005 : 997 ~ 1004
Whitby A , J∅sang A , Indulska J . Filtering out unfair ratings in bayesian reputation systems . Journal of Management Research , 2005 , 4 ( 2 ): 48 ~ 64
Sun Y L , Han Z , Yu W , et al . A trust evaluation framework in distributed networks: vulnerability analysis and defense against attacks . Proceedings of the 25th IEEE International Conference on Computer Communications , Barcelona, Spain , 2006 : 1 ~ 13
0
浏览量
637
下载量
0
CSCD
关联资源
相关文章
相关作者
相关机构