Towards a trust model in P2P system based on trusted computing

被引:0
|
作者
Hao, Liming [1 ]
Lu, Songnian [1 ]
Yang, Shutang [1 ]
机构
[1] Shanghai Jiao Tong Univ, Dept Elect Engn, Shanghai 200240, Peoples R China
关键词
P2P; trusted computing; trust model; PKI and threshold signature;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Security is a crucial issue when it comes to design and implement Peer-to-Peer (P2P) system. The constant running theme in the security of P2P is that of trust. In this paper, we propose a trust model named F-PKI (Freely organized one level Public Key Infrastructure) in P2P system based on Trusted Computing (TC) technology which is used to enhance PC security by incorporating hardware platform. In this model, peers are organized freely by group, each of which is a one level PKI. Preliminary evaluation results show that the proposed model is realistic and argue that not only the security of the trust model proposed is enhanced, but also facilitates authentication and trust establishment between peers in P2P systems.
引用
收藏
页码:98 / 103
页数:6
相关论文
共 50 条
  • [41] An optimized and improved network trust model based on P2P
    Wei, Li
    Zhao, Chunjian
    [J]. Journal of Networks, 2013, 8 (10) : 2293 - 2301
  • [42] A Robust Trust Model Based on Group for P2P Environments
    Zhang, Guanghua
    Chen, Zhenguo
    [J]. ADVANCED MEASUREMENT AND TEST, PARTS 1 AND 2, 2010, 439-440 : 98 - +
  • [43] Domain recommendation similarity based P2P trust model
    Xing, Changyou
    Yang, Li
    Zhang, Yusen
    Suo, Yan
    [J]. Dongnan Daxue Xuebao (Ziran Kexue Ban)/Journal of Southeast University (Natural Science Edition), 2012, 42 (05): : 803 - 807
  • [44] TRUST MODEL BASED ON PERSONAL PREFERENCE IN P2P NETWORK
    Ma Shuqin
    [J]. 2011 INTERNATIONAL CONFERENCE ON INSTRUMENTATION, MEASUREMENT, CIRCUITS AND SYSTEMS (ICIMCS 2011), VOL 2: FUTURE COMMUNICATION AND NETWORKING, 2011, : 163 - 166
  • [45] Intuitionistic Fuzzy Theory based P2P Trust Model
    Yang, Li
    Zhang, Tao
    Xing, Changyou
    Zhang, Yusen
    [J]. 2011 7TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING (WICOM), 2011,
  • [46] Developing P2P Trust Computing Mechanism based on Risk Evaluation Properties
    Li Xiao-yong
    Zhou Feng
    [J]. 2ND IEEE INTERNATIONAL CONFERENCE ON ADVANCED COMPUTER CONTROL (ICACC 2010), VOL. 3, 2010, : 409 - 413
  • [47] A simulation model for trust and reputation system evaluation in a P2P network
    Aringhieri, Roberto
    Bonomi, Daniele
    [J]. COMPUTATIONAL INTELLIGENCE, THEORY AND APPLICATION, 2006, : 169 - +
  • [48] Research of Trust Model in P2P File-Sharing System
    Zhao Yulan
    Jiang Chunfeng
    [J]. 2011 INTERNATIONAL CONFERENCE OF ENVIRONMENTAL SCIENCE AND ENGINEERING, VOL 12, PT B, 2012, 12 : 1208 - 1212
  • [49] P2P trust model: The resource chain model
    Lee, Sinjae
    Zhu, Shaojian
    Kim, Yanggon
    [J]. SNPD 2007: EIGHTH ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ARTIFICIAL INTELLIGENCE, NETWORKING, AND PARALLEL/DISTRIBUTED COMPUTING, VOL 2, PROCEEDINGS, 2007, : 357 - +
  • [50] TACS, a Trust Model for P2P Networks
    Félix Gómez Mármol
    Gregorio Martínez Pérez
    Antonio F. Gómez Skarmeta
    [J]. Wireless Personal Communications, 2009, 51 : 153 - 164