A Global Trust Model of P2P Network Based on Distance-Weighted recommendation

被引:5
作者
Li, Xueming [1 ]
Wang, Jianke [1 ]
机构
[1] Chongqing Univ, Coll Comp Sci, Chongqing 630044, Peoples R China
来源
NAS: 2009 IEEE INTERNATIONAL CONFERENCE ON NETWORKING, ARCHITECTURE, AND STORAGE | 2009年
关键词
p2p network; trust; distributed hash table; the distance between peers; anonymity;
D O I
10.1109/NAS.2009.77
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
We propose a global trust model, which is based on the distance-weighted recommendations under P2P circumstance, with the model's mathematical expressions and realization methods under distributed circumstance, to quantify and evaluate the credibility of peers. The results of the simulation show that our model is more tolerant under comprehensive attacks, and also makes significant improvements on the rate of successful down-loading.
引用
收藏
页码:281 / 284
页数:4
相关论文
共 50 条
[41]   A trust-based minimum cost and quality aware data collection scheme in P2P network [J].
Yingying Ren ;
Zhiwen Zeng ;
Tian Wang ;
Shaobo Zhang ;
Guoming Zhi .
Peer-to-Peer Networking and Applications, 2020, 13 :2300-2323
[42]   Preserving Privacy in a P2P Social Network [J].
Mordonini, Monica ;
Poggi, Agostino ;
Tomaiuolo, Michele .
SMART OBJECTS AND TECHNOLOGIES FOR SOCIAL GOOD, 2017, 195 :203-212
[43]   A trust-based minimum cost and quality aware data collection scheme in P2P network [J].
Ren, Yingying ;
Zeng, Zhiwen ;
Wang, Tian ;
Zhang, Shaobo ;
Zhi, Guoming .
PEER-TO-PEER NETWORKING AND APPLICATIONS, 2020, 13 (06) :2300-2323
[44]   Impact of feedback on trust in P2P networks [J].
Huang, Zhihua ;
Lu, Songnian ;
Zhang, Aixin ;
Gu, Jie .
Journal of Networks, 2012, 7 (08) :1182-1188
[45]   Simulating trust overlay in P2P networks [J].
Zhang, Yan ;
Wang, Wei ;
Lu, Shunying .
COMPUTATIONAL SCIENCE - ICCS 2007, PT 1, PROCEEDINGS, 2007, 4487 :632-+
[46]   A Search Algorithm Based on Referral Trust in Unstructured P2P Systems [J].
Ping, Wang ;
Jing, Qiu ;
Hui, Qiu Yu .
PROCEEDINGS OF THE SECOND INTERNATIONAL SYMPOSIUM ON ELECTRONIC COMMERCE AND SECURITY, VOL I, 2009, :453-457
[47]   A P2P Recommended Trust Nodes Selection Algorithm Based on Topological Potential [J].
Han, Qiyi ;
Yu, Lin ;
Zhang, Rui ;
Wen, Hong ;
Xie, Yuanpeng ;
Zhu, Xiping ;
Jiang, Yixin ;
Guo, Xiaobin .
2013 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2013, :395-+
[48]   A Trust-based Routing Strategy in Structured P2P Overlay Networks [J].
Han, Yang ;
Koyanagi, Keiichi ;
Tsuchiya, Takeshi ;
Miyosawa, Tadashi ;
Hirose, Hiroo .
2013 INTERNATIONAL CONFERENCE ON INFORMATION NETWORKING (ICOIN), 2013,
[49]   A generic trust overlay simulator for P2P networks [J].
Wang, Wei ;
Zeng, Guosun .
12TH PACIFIC RIM INTERNATIONAL SYMPOSIUM ON DEPENDABLE COMPUTING, PROCEEDINGS, 2006, :401-+
[50]   Taxonomy of trust: Categorizing P2P reputation systems [J].
Marti, S ;
Garcia-Molina, H .
COMPUTER NETWORKS, 2006, 50 (04) :472-484