Font Size: a A A

Prestige Model Research And Privacy Security Analysis

Posted on:2013-12-28Degree:MasterType:Thesis
Country:ChinaCandidate:Z X TangFull Text:PDF
GTID:2248330374486706Subject:Computer software and theory
Abstract/Summary:PDF Full Text Request
Reputation systems which help users to select a good network can provide users anevaluation mechanism to avoid the attacks of some types of malicious behavior.Regardless of the architecture of reputation systems, the lifecycle and visibility ofreputation values and the feedbacks of the users, the security and reliability are twomajor concerns of the reputation system, and reflected by the ability of resistance ofsome types of attacks and the ability of privacy protection, which ensure the normaloperation of the reputation system.In general, a reputation system needs a safe and reliable computing model toensure the privacy of users’ identities. And at the same time, the reputation system mustensure the privacy of the relationship between the corresponding users’ identities andthe information they submitted so that users can submit the honest opinions of theresources owners, without fear of reprisal. However, due to the difference among users’role in the network, the definations of their own privacy are different from each other.And different reputation systems need to achieve the distinct degree of privacy notions.Therefore, starting from the concept of privacy, this thesis proposed nine distinctbut interrelated notions of privacy. They are all based on the amount and types ofinformation the reputation system may leak. In addition, because of the selfishness,users in the system may launch several attacks to improve their credibility or reduce thecredibility of other users. Therefore, in order to better resistance to some commonattacks. An existing overlay network-based reputation model has been improved. Forthis improved model, this paper analyzes the concept of privacy the model can achieve.This paper also analyzes the ability of resistance some types of attack through severalsimulation experiments, such as Slandering attack, Oscillation attack and Collusionattack。...
Keywords/Search Tags:reputation system, privacy, slandering attack
PDF Full Text Request
Related items