P2P trust model: The resource chain model

被引:1
作者
Lee, Sinjae [1 ]
Zhu, Shaojian [1 ]
Kim, Yanggon [1 ]
机构
[1] Towson Univ, Dept Comp & Informat Sci, Towson, MD 21252 USA
来源
SNPD 2007: EIGHTH ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ARTIFICIAL INTELLIGENCE, NETWORKING, AND PARALLEL/DISTRIBUTED COMPUTING, VOL 2, PROCEEDINGS | 2007年
关键词
D O I
10.1109/SNPD.2007.521
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
As is well known, computer security has been given more attention; many mechanisms have been developed to increase P2P security like encryption, sandboxing, reputation, and firewall. Among those technologies, reputation mechanism as an active method is especially useful to automatically record, analyze and adjust peers' reputation, trust, histories among the different peers, and this method is suitable for our anonymous and dynamic P2P environment. Therefore, reputation-based trust mechanism is a secure enough reputation system. In this paper, we present a new reputation-based trust management model to prevent the spread of malicious content in the open community using a resource chain model. The main idea of the resource chain model is using a routing table to record the information of nodes' credibility and their recommending nodes' credibility. Therefore, using this model can help us to find the best and safest resource location efficiently and decrease the number of malicious transactions.
引用
收藏
页码:357 / +
页数:2
相关论文
共 11 条
[1]  
[Anonymous], IEEE T KNOWLEDGE DAT
[2]  
[Anonymous], 2003, P 12 INT WORLD WID W
[3]  
BHAT V, 2004, REPUTATION MANAGEMEN
[4]  
DAMIANI E, 2002, CCS 02 WASH DC US
[5]  
GUPTA M, 2003, NOSSDAV 03 JUN 1 3 M
[6]  
KARMVAR S, 2003, WWW2003 MAY 20 24 HU
[7]  
Milojicic D.S., 2003, PEER TO PEER COMPUTI
[8]  
Oram A., 2001, PEER TO PEER HARNESS
[9]  
SELCUK A. A., 2004, 4 IEEE ACM INT S CLU
[10]  
WANG Y, 2004, TRUST REPUTATION MOD