用户名: 密码: 验证码:
基于区块链的P2P节点信任评价模型
详细信息    查看全文 | 推荐本文 |
  • 英文篇名:P2P node trust evaluation model combined with Blockchain
  • 作者:张方 ; 王凤英
  • 英文作者:ZHANG Fang;WANG Fengying;School of Computer Science and Technology,Shandong University of Technology;
  • 关键词:P2P网络 ; hash链 ; 区块链 ; 信用指标 ; 信任评价模型 ; 时间敏感函数
  • 英文关键词:P2P network;;hash chain;;Blockchain;;credit index;;trust evaluation model;;time-sensitive function
  • 中文刊名:山东理工大学学报(自然科学版)
  • 英文刊名:Journal of Shandong University of Technology(Natural Science Edition)
  • 机构:山东理工大学计算机科学与技术学院;
  • 出版日期:2019-03-08 11:54
  • 出版单位:山东理工大学学报(自然科学版)
  • 年:2019
  • 期:03
  • 基金:国家自然科学基金项目(61473179);; 山东省重点研发计划项目(2016GGX101027);; 淄博市校城融合发展计划项目(2018ZBXC295)
  • 语种:中文;
  • 页:16-21
  • 页数:6
  • CN:37-1412/N
  • ISSN:1672-6197
  • 分类号:F832.4;F724.6;TP309
摘要
由于P2P网络去中心化特性,导致无法直接使用传统集中式网络的节点信用评价指标。为了得到可信的数据,融合hash链的帕特里夏树和电商行业区块链,通过对经典模型的剖析,给出了较为完善的信用指标体系,引入节点信用指标的时间敏感函数,构建节点信任评价模型,并进行了效能分析。通过分析表明,该模型能保证P2P网络数据安全性。
        As a result of the decentration of P2 P network,node credit evaluation indexes of traditional centralized network can not be directly used. In order to obtain credible data,the Patricia tree and SEC Blockchain are integrated with the hash chain. Through the analysis of the classical model,a more complete credit index system is proposed. The time-sensitive function of node credit is introduced to construct the node trust evaluation model,and the efficiency analysis is also carried out. The analysis shows that this model can guarantee the data security of P2 P network.
引文
[1]罗杰文. P2P应用研究与展望[N].计算机世界,2006-09-04(B16).
    [2]GARMEHI M,ANALOUI M,PATHAN M,et al. An economic replica placement mechanism for streaming content distribution in Hybrid CDN-P2P networks[J]. Computer Communications,2014,15(1):52-78.
    [3]LI J.On peer-to-peer(P2P)content delivery[J].Peer-to-Peer Networking and Applications,2018,1(1):46-55.
    [4]开源网站Sourceforge[CP/OL].https://sourceforge.net/directory/os:windows/? q=P2P.
    [5]WU J Y,CHO K. P2P and P2P botnet traffic classification in two stages[J].Soft Computing,2017,21(5):1315-1326.
    [6]孙玉星,黄松华,陈力军,等.贝叶斯决策的自组织网推荐信任度修正模型[J].软件学报,2011,20(9):270-281.
    [7]ZHENG Q L,SHI W S. Enforcing cooperative resource sharing in untrusted P2P computing environments[J].Mobile Networks and Applications,2015,2(6):45-56.
    [8]SABRINA W,VICKY L H,RAY Z K J L,et al. Incentive cooperation strategies for peer-to-peer live multimedia streaming social networks[J].IEEE Transactions on Multimedia,2009,11(3):396-412.
    [9]王小峰.信任管理策略表示与量化模型研究[D].长沙:国防科学技术大学,2017.
    [10]KOACZEK G. Agent and multi-agent technology for internet and enterprise systems[M]. Berlin Heidelberg:Springer-Verlag,2015:36-39.
    [11]李小青.移动Ad Hoc网络中安全路由协议的研究[D].西安:西安电子科技大学,2011.
    [12]FULTON B. Review of introduction to modern crytography by Jonathan Katz and Yehuda Lindell Publisher:Chapman&Hall-CRC[J].ACM SIGACT News,2010,41(4):44-47.
    [13]雷新雨.新型公开密钥交换算法的理论与应用研究[D].重庆:重庆大学,2015.
    [14]ZHU L H,GAO F. Survery on privacy preserving techniques for blockchain technology[J].Journal of Computer Research and Development,2017,54(10):2170-2186.
    [15]LI Y,ZHENG K,AN Y,et al. EtherQL:a query layer for blockchain system[J]. Database Systems for Advanced Applications,2017,556-567.
    [16]窦文,王怀民,贾焰,等.构造基于推荐的Peer-to-Peer环境下的Trust模型[J].软件学报,2004,15(4):571-538.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700