A Global Trust Model of P2P Network Based on Distance-Weighted recommendation

被引:5
作者
Li, Xueming [1 ]
Wang, Jianke [1 ]
机构
[1] Chongqing Univ, Coll Comp Sci, Chongqing 630044, Peoples R China
来源
NAS: 2009 IEEE INTERNATIONAL CONFERENCE ON NETWORKING, ARCHITECTURE, AND STORAGE | 2009年
关键词
p2p network; trust; distributed hash table; the distance between peers; anonymity;
D O I
10.1109/NAS.2009.77
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
We propose a global trust model, which is based on the distance-weighted recommendations under P2P circumstance, with the model's mathematical expressions and realization methods under distributed circumstance, to quantify and evaluate the credibility of peers. The results of the simulation show that our model is more tolerant under comprehensive attacks, and also makes significant improvements on the rate of successful down-loading.
引用
收藏
页码:281 / 284
页数:4
相关论文
共 50 条
[31]   A Trust Evaluating Model Based on Reputation with Multifactor for P2P E-Commerce [J].
Cao Huaihu ;
Zhang Yanmei ;
Zhu Jianming .
INFORMATION TECHNOLOGY FOR MANUFACTURING SYSTEMS II, PTS 1-3, 2011, 58-60 :153-157
[32]   A Group-Recommend based P2P E-commerce Trust Model [J].
Lu, Zhigang ;
Mu, Hong .
IEEE/SOLI'2008: PROCEEDINGS OF 2008 IEEE INTERNATIONAL CONFERENCE ON SERVICE OPERATIONS AND LOGISTICS, AND INFORMATICS, VOLS 1 AND 2, 2008, :677-679
[33]   Social computing-based trust model in P2P E-Commerce [J].
Xie, Fu ;
Liu, Fengming ;
Wang, Xincheng ;
Yang, Rongrong .
PROCEEDINGS OF THE 2008 12TH INTERNATIONAL CONFERENCE ON COMPUTER SUPPORTED COOPERATIVE WORK IN DESIGN, VOLS I AND II, 2008, :789-+
[34]   CL-PKC-Based Security for Trust Data Sharing in Hybrid P2P Network [J].
Lin, Huaiqing ;
Li, Zhitang ;
Zhang, Yejiang ;
Lu, Chuiwei .
NSWCTC 2009: INTERNATIONAL CONFERENCE ON NETWORKS SECURITY, WIRELESS COMMUNICATIONS AND TRUSTED COMPUTING, VOL 1, PROCEEDINGS, 2009, :108-111
[35]   An Efficient Attack-Resistant Trust Model for P2P Networks [J].
Tian, Chunqi ;
Zou, Shihong ;
Wang, Wendong ;
Cheng, Shiduan .
INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2006, 6 (11) :251-258
[36]   The design of distance education system based on P2P technology [J].
Fu Xiaoling ;
Zhou Huixiang .
2009 INTERNATIONAL FORUM ON COMPUTER SCIENCE-TECHNOLOGY AND APPLICATIONS, VOL 1, PROCEEDINGS, 2009, :329-331
[37]   A new reputation model for P2P network based on set pair analysis [J].
Chaokai, He ;
Meng, Wu .
Open Cybernetics and Systemics Journal, 2015, 9 (01) :1393-1398
[38]   FCTrust: A Robust and Efficient Feedback Credibility-Based Distributed P2P Trust Model [J].
Hu, Jianli ;
Wu, Quanyuan ;
Zhou, Bin .
PROCEEDINGS OF THE 9TH INTERNATIONAL CONFERENCE FOR YOUNG COMPUTER SCIENTISTS, VOLS 1-5, 2008, :1963-1968
[39]   APR: A Trust Model Based on Perceived Risk for P2P E-commerce System [J].
Tian, Junfeng ;
Liu, Qian .
ISCSCT 2008: INTERNATIONAL SYMPOSIUM ON COMPUTER SCIENCE AND COMPUTATIONAL TECHNOLOGY, VOL 1, PROCEEDINGS, 2008, :239-242
[40]   Personalized Pre-trust Reputation Management in Social P2P Network [J].
Li, Mingchu ;
Guan, Quanhua ;
Jin, Xing ;
Guo, Cheng ;
Tan, Xing ;
Gao, Yongli .
2016 INTERNATIONAL CONFERENCE ON COMPUTING, NETWORKING AND COMMUNICATIONS (ICNC), 2016,