Research of Trust Model Based on Peer-to-Peer Network Security

被引:2
作者
Kun, Huang [1 ]
Lu, Wang [1 ]
机构
[1] China Ship Dev & design Ctr, Wuhan, Peoples R China
来源
2013 INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY AND APPLICATIONS (ITA) | 2013年
关键词
Peer-to-Peer Network; Trust Model; Network Attack; Access Control;
D O I
10.1109/ITA.2013.35
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
P2P network is dynamic, self-organized, and anonymous and has some other features. P2P network cannot guarantee that all the peers can provide reliable resources and good service. Some Peers even have malicious behavior, such as Provision of false information, spread of illegal advertising, dissemination of Trojans and worms. In order to solve these Problems, the trust mechanism is introduced to P2P network and trust model is built to establish trust relationship between Peers. The popular research directions were introduced. The major sorts and key technologies were analyzed, and the algorithms in recent research were summarized. Based on the analysis of the capabilities of the trust model, its shortages were presented. Finally, some directions for future research were discussed.
引用
收藏
页码:126 / 129
页数:4
相关论文
共 50 条
  • [21] Popularity based network statistical analysis in peer-to-peer application
    Wang Jing-Xin
    Wang Yue
    Li Yi-Peng
    Yuan Jian
    Shan Xiu-Ming
    Feng Zhen-Ming
    Ren Yong
    ACTA PHYSICA SINICA, 2011, 60 (11)
  • [22] Trust-based Decentralized Service Discovery in Structured Peer-to-Peer Networks
    Rout, Rashmi Ranjan
    Talreja, Dolly
    2014 ANNUAL IEEE INDIA CONFERENCE (INDICON), 2014,
  • [23] Active distributed Peer-to-Peer network architecture
    Huang, DY
    Li, ZP
    Zhang, Y
    Huang, JH
    2003 INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY, VOL 1 AND 2, PROCEEDINGS, 2003, : 111 - 114
  • [24] Network statistical analysis in peer-to-peer application
    Li Yi-Peng
    Ren Yong
    Yuan Jian
    Wang Yue
    Huang Xiao-Hong
    Shan Xiu-Ming
    ACTA PHYSICA SINICA, 2011, 60 (05)
  • [25] p-Trust: A New Model of Trust to Allow Finer Control Over Privacy in Peer-to-Peer Framework
    Chakraborty, Sudip
    Ray, Indrajit
    JOURNAL OF COMPUTERS, 2007, 2 (02) : 13 - 24
  • [26] The Case for Validating ADDIE Model as a Digital Forensic Model for Peer-to-Peer Network Investigation
    Musa, Ahmad Sanda
    Awan, Irfan-Ullah
    Zahrah, Fatima
    INFORMATION SYSTEMS FRONTIERS, 2022, 26 (6) : 2305 - 2321
  • [27] PNECOS: A Peer-to-Peer Network Coding Streaming System
    Chung, Tein-Yaw
    Wang, Chih-Cheng
    Chen, Yung-Mu
    Chang, Yang-Hui
    JOURNAL OF INTERNET TECHNOLOGY, 2009, 10 (03): : 261 - 270
  • [28] A study of parallel data mining in a peer-to-peer network
    Guan, Huiwei
    Ip, Horace H. S.
    CONCURRENT ENGINEERING-RESEARCH AND APPLICATIONS, 2007, 15 (03): : 281 - 289
  • [29] A unified trust management strategy for content sharing in Peer-to-Peer networks
    Anand, P. M. Rubesh
    Bhaskar, Vidhyacharan
    APPLIED MATHEMATICAL MODELLING, 2013, 37 (04) : 1992 - 2007
  • [30] A Secured Key Issuing Protocol for Peer-to-Peer Network
    Jagadale, Nirmala N.
    Parvat, Thaksen J.
    2014 IEEE GLOBAL CONFERENCE ON WIRELESS COMPUTING AND NETWORKING (GCWCN), 2014, : 213 - 218