Community-based Trust Mechanism in P2P Social Networks

被引:0
作者
Yu, Jian [1 ,2 ]
Wang, Jianrong [2 ]
Liu, Xiao [2 ]
Yu, Mei [2 ,3 ]
Zhao, Zheng [2 ]
Zhang, Yan [3 ,4 ]
机构
[1] Tianjin Univ, Sch Elect & Informat Engn, Tianjin, Peoples R China
[2] Tianjin Univ, Sch Comp Sci & Technol, Tianjin, Peoples R China
[3] Simula Res Lab, Lysaker, Norway
[4] Univ Oslo, Dept Informat, Oslo, Norway
来源
2010 IEEE INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND INFORMATION SECURITY (WCNIS), VOL 2 | 2010年
关键词
Community-based; Trust Mechanism; P2P Social Networks;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Malicious behaviors is always the problem to solve in P2P social networks. Building the trust model is effective method. In this paper a community-based trust mechanism is presented in the semantic-based P2P Social Networks. The ordinary peers form a community based on similar semantic and intra-community reputation of peers is calculated. The super peers constitute the structured P2P network and inter-community reputation is evaluated. This mechanism combines the local trust and the global trust. The experiments show that this trust mechanism can be effective in reducing effects caused by a variety of malicious behavior.
引用
收藏
页码:669 / +
页数:2
相关论文
共 20 条
  • [1] Aberer K., 2001, Proceedings of the 2001 ACM CIKM. Tenth International Conference on Information and Knowledge Management, P310, DOI 10.1145/502585.502638
  • [2] AHMAN J, 2003, TR120306 SUN MICR
  • [3] PKI-based security for peer-to-peer information sharing
    Berket, K
    Essiari, A
    Muratas, A
    [J]. FOURTH INTERNATIONAL CONFERENCE ON PEER-TO-PEER COMPUTING, PROCEEDINGS, 2004, : 45 - 52
  • [4] SPACE/TIME TRADE/OFFS IN HASH CODING WITH ALLOWABLE ERRORS
    BLOOM, BH
    [J]. COMMUNICATIONS OF THE ACM, 1970, 13 (07) : 422 - &
  • [5] BUCHEGGER S, P SOCIALNETS 2009
  • [6] Buchmann E, 2004, LECT NOTES COMPUT SC, V3290, P337
  • [7] Buragohain C., P 3 INT C PEER TO PE
  • [8] DOU W, 2003, THESIS NATL DEFENSE
  • [9] Ellison C., 2000, Computer Security Journal, V16, P1
  • [10] Fan L., 1998, ACM SIGCOMM COMP COM, P254