Hierarchical Fuzzy Trust management for Peer-To-Peer Network

被引:6
作者
Lin, Huaiqing [1 ]
Wu, Xuezhi [1 ]
Lin, Haitao [1 ]
机构
[1] Naval Univ Engn, Coll Elect Engn, Wuhan, Peoples R China
来源
2009 ISECS INTERNATIONAL COLLOQUIUM ON COMPUTING, COMMUNICATION, CONTROL, AND MANAGEMENT, VOL IV | 2009年
关键词
trust; reputation; peer-to-peer; fuzzy logic; TRANSACTIONS;
D O I
10.1109/CCCM.2009.5270416
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
One way to minimize threats in P2P system is to exploit reputation to help evaluate the trustworthiness and predict the future behaviors of peers. Most existing methods for trust management, which are based on reputation, focus on preventing network from the malicious peers. In fact, peers' capabilities to fulfill the tasks are also important factors, which will greatly impact the efficiency of P2P applications. In this study, a set of parameters were identified for describing the trust of a peer. And a trust model based on fuzzy techniques is presented. In simulation, this trust model has been shown to improve the efficiency of P2P system by significantly decreasing the number of inauthentic files on the network.
引用
收藏
页码:377 / 380
页数:4
相关论文
共 21 条
[1]  
Aberer K., 2001, Proceedings of the 2001 ACM CIKM. Tenth International Conference on Information and Knowledge Management, P310, DOI 10.1145/502585.502638
[2]  
ALTMAN J, 2003, TR120306 SUN MICR PA
[3]  
[Anonymous], P 12 INT WORLD WID W
[4]  
[Anonymous], 2002, Peer-to-Peer Computing
[5]  
Dou Wen, 2004, Journal of Software, V15, P571
[6]  
GRIFFITHS N, 2006, P 26 IEEE INT C WORK, V1, P73
[7]  
Hou Mengshu, 2005, Operating Systems Review, V39, P56, DOI 10.1145/1044552.1044558
[8]   A role-based trust model for peer-to-peer communities and dynamic coalitions [J].
Khambatti, M ;
Dasgupta, P ;
Ryu, KD .
SECOND IEEE INTERNATIONAL INFORMATION ASSURANCE WORKSHOP, PROCEEDINGS, 2004, :141-154
[9]   Design of a role-based trust-management framework [J].
Li, NH ;
Mitchell, JC ;
Winsborough, WH .
2002 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2002, :114-130
[10]  
QIAN Z, 2006, J SOFTWARE, V17, P96