Satistiability and trustworthiness of peers in peer-to-peer overlay networks

被引:2
|
作者
Nakajima, Yoshio [1 ]
Watanabe, Kenichi
Hayashibara, Naohiro [1 ]
Enokido, Tomoya [2 ]
Takizawa, Makoto [1 ]
Deen, S. Misbah [3 ]
机构
[1] Tokyo Denki Univ, Tokyo, Japan
[2] Rissho Univ, Tokyo, Japan
[3] Keele Univ, Keele ST5 5BG, Staffs, England
关键词
D O I
10.1109/ARES.2006.116
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Service supported by an object is modeled to be a set of methods and quality of service(QoS). In addition to finding a peer which holds a target object, it is critical to discuss what peer is allowed to manipulate the target object in what method. In this paper we take an acquaintance approach to finding and manipulating objects in P2P overlay networks. An acquaintance peer of a peer p is a peer whose service the peer p know and with which the peer p can directly communicate. If an access request is issued, a peer has to find where a target object exists, how to obtain an access right on the target object, and how to manipulate the target object. In this paper we discuss ways to obtain results which satisfying an access requests by the cooperation of acquaintances. Acquaintance peers of a peer p may knows different information on target peers since it takes time to propagate change information of the target peers and peers may be faulty. Here, it is critical to discuss how much a peer can trust each acquaintance. We define the trustworthiness of an acquaintance peer in terms of the acquaintance relations among the peers.
引用
收藏
页码:42 / +
页数:2
相关论文
共 50 条
  • [21] Consistency maintenance in dynamic peer-to-peer overlay networks
    Liu, XT
    Lan, J
    Shenoy, P
    Ramaritham, K
    [J]. COMPUTER NETWORKS, 2006, 50 (06) : 859 - 876
  • [22] Hierarchical architectures in structured peer-to-peer overlay networks
    Dmitry Korzun
    Andrei Gurtov
    [J]. Peer-to-Peer Networking and Applications, 2014, 7 : 359 - 395
  • [23] Message passing in semantic peer-to-peer overlay networks
    Cudre-Mauroux, Philippe
    Aberer, Karl
    [J]. IEEE SIGNAL PROCESSING MAGAZINE, 2007, 24 (05) : 131 - 135
  • [24] Scalable supernode selection in peer-to-peer overlay networks
    Lo, V
    Zhou, DY
    Liu, YH
    GauthierDickey, C
    Li, J
    [J]. Second International Workshop on Hot Topics in Peer-to-Peer Systems, Proceedings, 2005, : 18 - 25
  • [25] LOCALITY AND RESOURCE AWARE PEER-TO-PEER OVERLAY NETWORKS
    Wu, Chun-Hung
    Chiang, Kuo
    Yu, Ruo-Jian
    Wang, Sheng-De
    [J]. JOURNAL OF THE CHINESE INSTITUTE OF ENGINEERS, 2008, 31 (07) : 1207 - 1217
  • [26] Topology and resource discovery in peer-to-peer overlay networks
    Li, DS
    Nong, X
    Lu, XC
    [J]. GRID AND COOPERATIVE COMPUTING GCC 2004 WORKSHOPS, PROCEEDINGS, 2004, 3252 : 221 - 228
  • [27] Secure routing for structured peer-to-peer overlay networks
    Castro, M
    Druschel, P
    Ganesh, A
    Rowstron, A
    Wallach, DS
    [J]. USENIX ASSOCIATION PROCEEDINGS OF THE FIFTH SYMPOSIUM ON OPERATING SYSTEMS DESIGN AND IMPLEMENTATION, 2002, : 299 - 314
  • [28] Hierarchical architectures in structured peer-to-peer overlay networks
    Korzun, Dmitry
    Gurtov, Andrei
    [J]. PEER-TO-PEER NETWORKING AND APPLICATIONS, 2014, 7 (04) : 359 - 395
  • [29] Probabilistic model for semantic Peer-to-Peer overlay networks
    Department of Automation and Applied Informatics, Budapest University of Technology and Economics, Goldmann György tér 3, H-1111 Budapest, Hungary
    [J]. WSEAS Trans. Inf. Sci. Appl., 2006, 4 (691-697):
  • [30] ALASA: When service overlay networks meet peer-to-peer networks
    Zhou, S
    Hogan, M
    Ardon, S
    Portman, M
    Hu, T
    Wongrujira, K
    Seneviratne, A
    [J]. 2005 Asia-Pacific Conference on Communications (APCC), Vols 1& 2, 2005, : 1053 - 1057