计算机科学与技术专业外文翻译p2p信任模型_第1页
计算机科学与技术专业外文翻译p2p信任模型_第2页
计算机科学与技术专业外文翻译p2p信任模型_第3页
计算机科学与技术专业外文翻译p2p信任模型_第4页
计算机科学与技术专业外文翻译p2p信任模型_第5页
已阅读5页,还剩8页未读 继续免费阅读

下载本文档

版权说明:本文档由用户提供并上传,收益归属内容提供方,若内容存在侵权,请进行举报或认领

文档简介

外文原文P2P trust modelSummary of the P2P network problems are analyzed, described the establishment of P2P network trust model needs.P2P network on the existing trust models are summarized, pointing out the direction of future research.IntroductionWith the Internets widespread popularity, the rich end users system resources, as well as the rapid increase in network bandwidth, the traditional Client / Server Network Application Mode server performance bottlenecks and single point of failure issue is not only limited the full use of end system resources,also increasingly unable to meet the new distributed applications.The P2P networks to work together, distributed information sharing, large-scale parallel computing such as showing the unique advantages of the new development to make it hot.P2P networks are willing to share resources on the node the basic assumption that each node share its own resources and from other nodes where the resources for their own needs.However, such individuals to provide resources for the public, and node behavior result in unconstrained mode of P2P network there are three problems.(1) ride (Free-Riding) problemFree-Rriding consumption of other nodes that node only contribution to the resources without sharing their own resources.To Gnutella P2P file sharing system, for example, 70% of the nodes is the Free-Rider.The latest monitoring also shows that in the eDonkey file-sharing network, about 80% of the nodes is the Free-Rider.(2) Public Goods and sorrow (the Tragedy of the Commons) problemPublic Goods and sorrow means the network resources as a non-exclusive public resources are most uncontrolled use of P2P nodes, according to statistics, P2P traffic accounted for 60% of Internet Zong traffic flow, and the user is not the total number of significant growthcases, P2P traffic is still growing rapidly.In fact, P2P network users of its fundamental purpose is rational to maximize their utility, but does not consider the networks overall effectiveness.(3) not reliable services, and fraudP2P network, there are a large number of unreliable service quality, and fraud.To the many file-sharing application, for example, 25% of the documents were forged documents (Faked Files).This is similar to eBay in e-commerce, this is not a reliable service and fraud to the user impact is more serious.Therefore, effective mechanisms must be designed to regulate the behavior of nodes in P2P networks to address these three issues, to improve the availability of P2P services to promote effective collaboration node and the rational use of network resources.Why is the trust modelNodes that have their own rights, self-organizing P2P network, how to regulate the behavior of the node? In fact, P2P networks provide real-world network environment of human communication, human-centered networks, and social networks with the same configurationsex.The trust as an integral part of social existence, is the social network in the core of relations between people.Human society, reputation-based trust relationship with the incentive mechanism to restrict peoples daily behavior.Trust-based P2P network and the similarity of human social networks embodied in the P2P network between individuals interact with each other for each other left sporadic credit information; individual objects on the interaction with the full right to choose; individuals are often not the absolute valuereliability or quality of service that individuals can tolerate a small amount of damage caused by the wrong choice, such as file-sharing application; individual obligation to the network to provide recommended information to other individuals.Therefore, we can describe P2P networks using the trust relationship between nodes, and to take trust-based incentive mechanisms to address these issues.(1) to provide differentiated services based on trust valuesIn file sharing P2P network, nodes on the network resources according to the contribution level, to provide differentiated services.For example, Kazaa nodes provide the resources and the ratio of consumption of resources into the system as a node in the level of participation and access to services as a priority of the node.BitTorrent nodes upload rate under each other to determine their own upload rate.EDonkey network node in accordance with the request of local trust values to set the node in the download queue priority.Malicious use of network resources on the node to punish.For example, proposed incentives RTBMa focus on the Gnutella network file transfer type when the bandwidth allocation problem, according to the contribution of the node on the network for distribution of bandwidth resources.When a node share data, contribute to stimulate nodes to increase share value.When the node from the node overload to download a file, contribution to reducing the value of the node to suppress the consumption of public resources.Differentiated services based incentives to encourage cooperation between nodes, and the rational use of network resources, in order to address free-riding and the tragedy of public goods problem.(2) According to the trust value of node selection service providerNode can be based on trust values to choose to trade with each other.For example, in the eBay network, high trust value to buy the products business, which encourage businesses to maintain good sales practices and improve reliability of products.Effectively inhibit the P2P network is not reliable services, and fraud.The concept of trustTrust is a multidisciplinary concept, describes specific situations, an individual may have adverse consequences in the circumstances, want to believe that another individual has some ability to complete a task or a subjective belief.Close contact with the concept of trust the credibility of credit from the individuals social network, is based on observed past behavior or past behavior of individual information and expectations on individual behavior.The difference between reputation and trust can I trust you because you have good credit or I trust you despite your credit is not good to show.This shows that the credibility of the stress that a group of individuals or groups to a common level of reliability and trust more to emphasize that trust in the individuals subjective trust trusted party.Mentioned in this article refers to the trust the trust side of the trusted partys subjective trust, that trust in parties according to their own experience or to both the trusted partys reputation and resulting reliability of trusted parties.In resource sharing in P2P networks, reflecting the extent of not only the reliable nodes such as computing nodes, storage, network bandwidth and other aspects of the objective ability, and participate in P2P networks with nodes in the behavior traits, such as duration of the node-line, friendly, and so on.P2P networks in e-commerce category, the sellers trustworthiness and product description, communication with the buyer, delivery time, delivery and related charges.In practical applications, the nodes will affect the credibility of all the factors that quantify the confidence and credibility of integrated reached node is not feasible.Therefore, under normal circumstances, the trust model in P2P networks, according to the node between satisfaction with the transaction to determine credibility.credibility, trust and mutually beneficial relationshipShown in Figure 1, if node A has a reciprocal behavior of other nodes, then A will have a good reputation, so node A will be other nodes in the trust, and transaction reciprocal behavior by other nodes.The plan involves a trusted network of reciprocity, or you can call it incentive mechanism.As the social field, only when the behavior of the past affect the future (for sociology as the future of the shadow (Shadow of Future) phenomenon), people have incentive to build mutual trust.Therefore, the trust model and the incentive mechanism of interaction between the good, P2P networks can effectively promote the cooperation between nodes.Figure 1 credit, trust and mutually beneficial relationship between a simple modelTrust Model classificationIn P2P network, there are all kinds of attack models, including: fraud, counterfeiting, defamation, fraud combined with a front-end node (head-end node generally provide reliable service, the cooperative nodes give a fair evaluation. However, these front-end nodetrying to give a high internal malicious nodes to disguise malicious node positive behavior) of the joint fraud, change the ID to re-enter the network node and the nodes intermittently to provide credible information and services, or the accumulation of credit to a certain height, the use ofits high trust value, fraud, slander or joint fraud attacks.Most of the current trust model focused on solving the problem of certain types of attacks, according to the method to establish trust relationships can be broadly divided into the trust model based on trusted third parties, and based on the feedback / evaluation of two types of trust model.Trust Model based on trusted third partySuch trust model in the traditional PKI security system technology, a small number of leaders through the network node to monitor the operation of the whole network, and regularly circular nodes or to punish violations.The legitimacy of these leaders node certificates issued by CA to be guaranteed.Such systems often rely on a small central node, so there is a single point of failure, and scalability issues.Based on feedback / evaluation of the trust modelTrust model for P2P networks generally fall into this category, according to the different objects to be trusted, there is as resources to build the credibility and the credibility of the transaction nodes in two categories.The former focuses on P2P networks can access the informations credibility, and credibility of information providers do not establish direct contact.In this type of trust model, the nodes determine the reliability of the information, and gives a positive or negative feedback rating, and further calculate the trust value.For example, in file-sharing application Kazaa, only consider the positive feedback to the data signature way to build credibility, that is, if the user accepted the authenticity of the information, then the signature, the information obtained more signatures, the authenticity of the morehigh.Such as resources, limited trust model to establish the credibility of information sharing applications, does not have broad applicability.Below the node for the transaction to establish the credibility of the trust model are explained.(1) global trust modelTrust model of such a network analysis and feedback of all transactions for each node to establish a unique credibility.The worlds largest auction site eBay by the end of trading, trading parties are given a positive, negative or neutral feedback rating, and use the number of positive minus the number of negative rating reached a certain individuals credibility.The method is simple and easy to understand, but can not deal with the unfair trader is given feedback.S. Kamvar global trust model EigenTrust proposed transaction history according to the node to calculate the local trust, and trust information to consider the recommendation of the node, through the iterative trust between nodes to achieve the spread of the trust, thus calculated for each node in the globalcredibility.W. Dou and EigenTrust similar to the proposed global trust model, to solve the EigenTrust credibility in solving global problems when the existence of solutions.A. Yamamoto proposed a distributed trust model for P2P networks of trust between the nodes are modeled as Web page links, Pagerank algorithm using a distributed approach to calculating the trust value of nodes.But this model neglects the nodes and relations of trust between the different nodes differ, their rationality is questionable.L. Xiong proposed PeerTrust to more effectively assess the trustworthiness of peers and describes a variety of malicious acts P2P community will not only deal satisfaction feedback for evaluating the parameters of the trust, taking the total number of transactions, feedbackcredibility, the transaction context factor, the community context factor.Simulation results show that the trust model can effectively inhibit the malicious node attacks.L. Mekouar made part of the distributed P2P network (such as KaZaa) the credibility of the management mechanism RMS_PDN.Super nodes in RMS_PDN passed between nodes in the trust evaluation, so that each super-node to its leaf node record of effective contribution to the system and the credibility as a leaf node.However, all the nodes directly RMS_PDN feedback vulnerable to malicious nodes of joint fraud attacks.Global trust model ignores the private trust of features for a particular node, other nodes on the trust of his values are the same.Simple global trust model vulnerable to malicious nodes joint fraud attacks.And complex needs of global trust model of cooperation between the processing nodes trust the information, computing and communication costs are higher.In addition, large-scale P2P network, each node in the global trust value computing the necessity and feasibility of further study.(2) the local trust modelOn P2P networks have mostly focused on the trust model provides a mechanism which nodes can share information for a given node, the local trust value calculation.Y. Wang proposed a P2P environment based on Bayesian network trust model.The trust model describes the main focus on different aspects of trust, which nodes can be based on different scenarios for on-demand access to different aspects of the performance of the node.The trust model can be adapted to smaller scale Gnutella network, or nodes of the Gnutella network interactive focus.S. Lee proposed a fully distributed way to store the users credit information.And other trust system is different in the NICE system, the node i trust information stored in other nodes of the services provided i satisfied with feedback, so trust in the information storage node motivated.L-Xiong PeerTrust proposed mechanism allows nodes to provide feedback according to the node with its own individual choices similar feedback to calculate a given node of the subjective reliability of this method to prevent fraud attacks the joint node, but in largescale P2P networks because of the sparsity of the transaction, there is not necessarily sufficient similarity with the individual nodes.Share information based on local trust model, shared access to information in two ways: first, to the other nodes by flooding a request for trust, poor scalability of the method; the other is the mechanism through the use of P2P DHT storage systems such asChord and other access, this method is not suitable for frequent node join and leave the system P2P system.Moreover, such sharing of information based on local trust model is not suitable for management information between nodes can not directly interact with some of the distributed P2P network.ConclusionIn the absence of an effective management mechanism in P2P networks, the establishment can suppress all the attack patterns of the trust model is very difficult, apart from the node to be able to suppress the attacks, the time of the establishment of trust model, trust model to fully consider whether the scale can be extendednature of trust in the trusted computing and information storage scalability, and trust in the process of information transmission bandwidth overhead problems.In addition, dynamic access to the network node frequent cases, the trust model of fault tolerance or robustness also needs to be stressed.In fact, in the P2P network trust model, the community should be fully learn the true reputation management system, different scenarios for the transaction to establish credibility for the node, and nodes into a particular group to restrict and regulate the nodes Xing Wei.Therefore, based on group reputation mechanism is the direction of future research, research work has been useful in the exploration of aspects, but still not mature.In addition, the model of incentive mechanisms based on trust, not only to consider the P2P networks of cooperation between the internal nodes should also be considered P2P applications and networks of cooperation between other applications.For example, in P2P file sharing applications, when the network bandwidth utilization reaches a certain threshold, still predatory on the node using the network resources to punish.P2P applications and networks in harmony with other applications, P2P applications is the development of long-term solution.Journal of Harbin Institute of Technology中文译文p2p信任模型对P2P网络存在的问题进行了分析,阐述了建立P2P网络信任模型的需求。在对现有P2P网络中的信任模型进行总结归纳后,指出了以后研究的方向。引言:随着Internet的广泛普及,端用户系统资源的丰富,以及网络带宽的快速增加,传统的Client/Server网络应用模式中服务器的性能瓶颈以及单点失效的问题不仅限制了端系统资源的充分利用,同时也越来越无法满足新的分布式应用的需求。而P2P网络在协同工作、分布式信息共享、大规模并行计算等方面显示出的独特优势,使其成为新的发展热点。P2P网络是基于节点愿意共享资源这一基本假设的,即每个节点共享自己的资源,并从其他节点那里获取自己需要的资源。然而,这种个人为公众提供资源,且节点行为无约束的工作模式导致P2P网络存在三个问题。(1)搭便车(Free-Riding)问题Free-Rriding指节点只消费其他节点贡献的资源,而不共享自己的资源。以Gnutella P2P文件共享系统为例,70%的节点是Free-Rider。最新的监测也表明在eDonkey文件共享网络中,大约有80%的节点是Free-Rider。(2)“公共物品的悲哀”(the Tragedy of the Commons)问题“公共物品的悲哀”指网络资源作为一种非排他的公共资源,被大多数P2P节点无节制地使用,据统计,P2P数据流量占因特网总流量达60%,并且在用户总数没有显着增长的情况下,P2P数据流量仍然在快速持续增长。事实上,P2P网络理性用户的根本目的是最大化自己效用,而并不考虑网络的整体效用。(3)不可靠服务和欺诈问题P2P网络中存在着大量不可靠的服务质量以及欺诈行为。以众多的文件共享应用为例,25%的文件是伪造文件(Faked Files)。而在类似于eBay这样的电子商务中,这种不可靠服务和欺诈行为给用户带来的影响则更为严重。因此,必须设计有效的机制来规范P2P网络中节点的行为来解决上述三个问题,从而提高P2P服务的可用性,促使节点进行有效的协作并合理使用网络资源。为什么是信任模型在节点具有自主权利,自组织的P2P网络中,如何来规范节点的行为呢?事实上,P2P网络提供了真实世界中人类交流的网络环境,是以人为中心的网络,与社会网络具有同构性。而信任作为社会存在的一个整体部分,是社会网络中人与人之间的核心关系。人类社会通过基于信誉的信任关系与激励机制来约束人们的日常生活行为。基于信任的P2P网络与人类社会网络的相似性体现在P2P网络中个体之间的彼此交

温馨提示

  • 1. 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。图纸软件为CAD,CAXA,PROE,UG,SolidWorks等.压缩文件请下载最新的WinRAR软件解压。
  • 2. 本站的文档不包含任何第三方提供的附件图纸等,如果需要附件,请联系上传者。文件的所有权益归上传用户所有。
  • 3. 本站RAR压缩包中若带图纸,网页内容里面会有图纸预览,若没有图纸预览就没有图纸。
  • 4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
  • 5. 人人文库网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对用户上传分享的文档内容本身不做任何修改或编辑,并不能对任何下载内容负责。
  • 6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
  • 7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。

评论

0/150

提交评论