Font Size: a A A

P2p Networks Reputation-based Trust Model In A Number Of Key Issues

Posted on:2008-02-13Degree:MasterType:Thesis
Country:ChinaCandidate:L M LiFull Text:PDF
GTID:2208360212478939Subject:Software engineering
Abstract/Summary:PDF Full Text Request
At present, the Peer-to-Peer network (P2P) technology is one of the popular research field, it produces very big impingement to traditional network's service pattern of "centering on content". The P2P technology has vast application in the field of document share, distributed computing, cooperative system, Electronic Commerce, depth search engine cooperating etc. The P2P network is owning the broad development prospect, but it is confronted with significant challenge, especially safe problem. Building-up confidence between the nodes is one part of safe problem, therefore how to build up a rational confidence administrative system in P2P network is very necessary.Firstly, this paper mtroduces the advantages and applications of the P2P network, analyses the security of P2P network's main applications, summarizes the security needs of P2P network's applications, introduces P2P network's reputation-based trust management and its characters. And then, according to the security and characters of P2P implements a reputation-based trust model. Proposes the tactics of trust value memory and trust value share, efficiently the tactics control times of interaction and rate of flow between nodes. Proposes node dignity marks method and dignity attestation tactics, preventing the evil intention node from pretending to be the network node. Implements the mechanism of trust value memory, being able to judge the dishonesty node and the conspiracy node. Implements the collection, update and announce of direct trust, redirect trust and recommended trust. Implements recommender trust, according to history information of trust value, judges the honest node and dishonest, adopts incentive mechanism to encourage and reward the honest node, to punish a dishonesty.The implementing method is fairly satisfied with P2P network's security needs, however it has some faults and shortages.
Keywords/Search Tags:reputation-based trust model, direct trust, disdirect trust, recommended trust, recommender trust
PDF Full Text Request
Related items