GT-Bidding: Group Trust Model of P2P Network Based on Bidding

被引:3
|
作者
Zhang, Lin [1 ,2 ]
Wei, Xinyan [1 ]
Huang, Yanwen [1 ]
Huang, Haiping [1 ,2 ]
Fu, Xiong [1 ,2 ]
Wang, Ruchuan [1 ,2 ]
机构
[1] Nanjing Univ Posts & Telecommun, Sch Comp, Nanjing 210003, Peoples R China
[2] Jiangsu High Technol Res Key Lab Wireless Sensor, Nanjing 210003, Peoples R China
基金
中国国家自然科学基金;
关键词
MANAGEMENT; FUZZY;
D O I
10.1155/2021/8842181
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Due to the lack of trusted third parties as guarantees in peer-to-peer (P2P) networks, how to ensure trusted transactions between peers has become a research hotspot. However, the open and distributed characteristics of P2P networks have brought challenges to network security, and there are problems such as node fraud and unavailability of services in the network. To solve the problem of how to select trusted transaction peers in P2P groups, a new trust model, GT-Bidding, is proposed in this paper. This model follows the bidding process of human society. First, each service peer applies for a group of guarantee peers and carries out credit mortgages for this service. Second, based on the entropy and TOPSIS method (Technology for Order Preference by Similarity to an Ideal Solution) approaching the ideal solution, a set of ideal trading sequences is selected. Then, the transaction impact function is used to assign weights to the selected guarantee peers and service nodes, respectively; thus, the comprehensive trust of each service node can be calculated. Finally, the service peer is verified using feedback based on the specific confidence level, which encourages the reputation of the service and its guarantee peers to update. Experiments show that GT-Bidding improves the successful transaction rate and resists complex attacks.
引用
收藏
页数:13
相关论文
共 50 条
  • [21] Research on trust model in the mobile P2P network
    Chen, Jiahua
    Guo, Xiaobin
    Li, Zhihuai
    [J]. 2017 4TH INTERNATIONAL CONFERENCE ON INFORMATION, CYBERNETICS AND COMPUTATIONAL SOCIAL SYSTEMS (ICCSS), 2017, : 528 - 532
  • [22] A P2P trust model based on preference
    Yu, Zhen
    Zheng, Xue-feng
    Wang, Shao-jie
    Li, Ming-xiang
    [J]. 2008 4TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-31, 2008, : 4778 - 4781
  • [23] Self-contained trust model in P2P networks based on group
    Zhang, Guanghua
    Zhang, Yuqing
    [J]. Huazhong Keji Daxue Xuebao (Ziran Kexue Ban)/Journal of Huazhong University of Science and Technology (Natural Science Edition), 2010, 38 (08): : 61 - 64
  • [24] An Anonymous Trustful-agents-based Trust Model for P2P Network
    Liu, Hao
    Zhang, Lian-Ming
    Zeng, Bing
    [J]. 2009 ASIA-PACIFIC CONFERENCE ON INFORMATION PROCESSING (APCIP 2009), VOL 2, PROCEEDINGS, 2009, : 426 - +
  • [25] Research of Access Authorization Model Based on Trust Negotiation in the P2P Network
    Ye, Junyao
    Wang, Yanhong
    Wang, Yinglian
    [J]. ADVANCES IN INFORMATION TECHNOLOGY AND EDUCATION, PT I, 2011, 201 : 422 - 427
  • [26] Trust-based dynamic access control model for P2P network
    Liu, Yichun
    Liu, Huafu
    [J]. 2006 INTERNATIONAL CONFERENCE ON COMMUNICATIONS, CIRCUITS AND SYSTEMS PROCEEDINGS, VOLS 1-4: VOL 1: SIGNAL PROCESSING, 2006, : 1542 - +
  • [27] P2P trust model in the trust value
    Jiang Haowei
    Tan Yubo
    [J]. PROCEEDINGS OF 2010 3RD IEEE INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY (ICCSIT 2010), VOL 8, 2010, : 365 - 367
  • [28] Recommendation trust model scheme for P2P network environment
    Dai, Zhan-Feng
    Wen, Qiao-Yan
    Li, Xiao-Biao
    [J]. Beijing Youdian Daxue Xuebao/Journal of Beijing University of Posts and Telecommunications, 2009, 32 (03): : 69 - 72
  • [29] Trust Model: Providing Witness Anonymity in P2P Network
    Elangovan, Bhavani
    Bharath
    [J]. 2011 THIRD INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING (ICOAC), 2011, : 100 - 105
  • [30] Bidding in P2P content distribution networks using the Lightweight Currency paradigm
    Elrufaie, E
    Turner, DA
    [J]. ITCC 2004: INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: CODING AND COMPUTING, VOL 2, PROCEEDINGS, 2004, : 129 - 130