Research of Trust Model Based on Peer-to-Peer Network Security

被引:2
作者
Kun, Huang [1 ]
Lu, Wang [1 ]
机构
[1] China Ship Dev & design Ctr, Wuhan, Peoples R China
来源
2013 INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY AND APPLICATIONS (ITA) | 2013年
关键词
Peer-to-Peer Network; Trust Model; Network Attack; Access Control;
D O I
10.1109/ITA.2013.35
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
P2P network is dynamic, self-organized, and anonymous and has some other features. P2P network cannot guarantee that all the peers can provide reliable resources and good service. Some Peers even have malicious behavior, such as Provision of false information, spread of illegal advertising, dissemination of Trojans and worms. In order to solve these Problems, the trust mechanism is introduced to P2P network and trust model is built to establish trust relationship between Peers. The popular research directions were introduced. The major sorts and key technologies were analyzed, and the algorithms in recent research were summarized. Based on the analysis of the capabilities of the trust model, its shortages were presented. Finally, some directions for future research were discussed.
引用
收藏
页码:126 / 129
页数:4
相关论文
共 50 条
  • [31] DEVELOPEMENT ON GOSSIP TRUST FOR REPUTATION SYSTEM IN UNSTRUCTURED PEER-TO-PEER NETWORKS
    Zhang, Yulu
    Ha, John
    Jiang, Hai
    INTERNATIONAL SYMPOSIUM ON COMPUTER SCIENCE & TECHNOLOGY: PROCEEDINGS, 2012, : 70 - 74
  • [32] Proof of Reputation: A Reputation-Based Consensus Protocol for Peer-to-Peer Network
    Gai, Fangyu
    Wang, Baosheng
    Deng, Wenping
    Peng, Wei
    DATABASE SYSTEMS FOR ADVANCED APPLICATIONS (DASFAA 2018), PT II, 2018, 10828 : 666 - 681
  • [33] Constructing a Churned Peer-to-Peer Network for Efficient Search
    Lin, Fuhong
    Chen, Changjia
    Wu, Hengkui
    Zhang, Hongke
    Kou, Lili
    2009 WASE INTERNATIONAL CONFERENCE ON INFORMATION ENGINEERING, ICIE 2009, VOL I, 2009, : 271 - +
  • [34] A Peer-to-Peer RFID Resolution Framework for Supply Chain Network
    Shrestha, Safal
    Kim, Dong Seong
    Lee, Seulki
    Park, Jong Sou
    SECOND INTERNATIONAL CONFERENCE ON FUTURE NETWORKS: ICFN 2010, 2010, : 318 - 322
  • [35] Priority-based scheduling scheme for live video streaming in peer-to-peer network
    Kunwar Pal
    Mahesh Chandra Govil
    Mushtaq Ahmed
    Multimedia Tools and Applications, 2018, 77 : 24427 - 24457
  • [36] Context-aware routing for peer-to-peer network on MANETs
    Shah, Nadir
    Qian, Depei
    NAS: 2009 IEEE INTERNATIONAL CONFERENCE ON NETWORKING, ARCHITECTURE, AND STORAGE, 2009, : 135 - +
  • [37] Cooperative caching by clients constructing a peer-to-peer network for push-based broadcast
    Hara, Takahiro
    Maeda, Kazuhiko
    Ishi, Yoshimasa
    Uchida, Wataru
    Nishio, Shojiro
    DATA & KNOWLEDGE ENGINEERING, 2010, 69 (02) : 229 - 247
  • [38] Adaptive replication management algorithm based on location and file popularity for peer-to-peer network
    Department of Computer Science and Technology, Tsinghua University, Beijing 100084, China
    Jisuanji Xuebao, 2009, 10 (1927-1937): : 1927 - 1937
  • [39] Priority-based scheduling scheme for live video streaming in peer-to-peer network
    Pal, Kunwar
    Govil, Mahesh Chandra
    Ahmed, Mushtaq
    MULTIMEDIA TOOLS AND APPLICATIONS, 2018, 77 (18) : 24427 - 24457
  • [40] Overview of peer-to-peer network and its applications: Pros and cons
    Saito, Nobuo
    3rd International Conference on Computing, Communications and Control Technologies, Vol 2, Proceedings, 2005, : 19 - 24