Research of Trust Model Based on Peer-to-Peer Network Security

被引:2
|
作者
Kun, Huang [1 ]
Lu, Wang [1 ]
机构
[1] China Ship Dev & design Ctr, Wuhan, Peoples R China
来源
2013 INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY AND APPLICATIONS (ITA) | 2013年
关键词
Peer-to-Peer Network; Trust Model; Network Attack; Access Control;
D O I
10.1109/ITA.2013.35
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
P2P network is dynamic, self-organized, and anonymous and has some other features. P2P network cannot guarantee that all the peers can provide reliable resources and good service. Some Peers even have malicious behavior, such as Provision of false information, spread of illegal advertising, dissemination of Trojans and worms. In order to solve these Problems, the trust mechanism is introduced to P2P network and trust model is built to establish trust relationship between Peers. The popular research directions were introduced. The major sorts and key technologies were analyzed, and the algorithms in recent research were summarized. Based on the analysis of the capabilities of the trust model, its shortages were presented. Finally, some directions for future research were discussed.
引用
收藏
页码:126 / 129
页数:4
相关论文
共 50 条
  • [31] Trust estimation in peer-to-peer network using BLUE
    Ruchir Gupta
    Yatindra Nath Singh
    Antriksh Goswami
    Peer-to-Peer Networking and Applications, 2021, 14 : 888 - 897
  • [32] Hierarchical Fuzzy Trust management for Peer-To-Peer Network
    Lin, Huaiqing
    Wu, Xuezhi
    Lin, Haitao
    2009 ISECS INTERNATIONAL COLLOQUIUM ON COMPUTING, COMMUNICATION, CONTROL, AND MANAGEMENT, VOL IV, 2009, : 377 - 380
  • [33] Trust estimation in peer-to-peer network using BLUE
    Gupta, Ruchir
    Singh, Yatindra Nath
    Goswami, Antriksh
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2021, 14 (02) : 888 - 897
  • [34] A Survey of Reputation and Trust Mechanism in Peer-to-Peer Network
    Gong Shang-Fu
    Zhu Jian-Lei
    2012 INTERNATIONAL CONFERENCE ON INDUSTRIAL CONTROL AND ELECTRONICS ENGINEERING (ICICEE), 2012, : 116 - 119
  • [35] Research of peer discovery method in peer-to-peer network
    Li, ZP
    Huang, DY
    Zhuang, L
    Huang, JH
    2002 IEEE REGION 10 CONFERENCE ON COMPUTERS, COMMUNICATIONS, CONTROL AND POWER ENGINEERING, VOLS I-III, PROCEEDINGS, 2002, : 383 - 386
  • [36] Peer-to-peer networks based on hierarchies of trust
    Tramantzas, A
    Cheetham, BMG
    van Harmelen, M
    Walker, AC
    Fifth IEEE International Conference on Peer-to-Peer Computing, Proceedings, 2005, : 160 - 161
  • [37] Fuzzy Trust for Peer-to-Peer Based Systems
    Azzedin, Farag
    Ridha, Ahmad
    Rizvi, Ali
    PROCEEDINGS OF WORLD ACADEMY OF SCIENCE, ENGINEERING AND TECHNOLOGY, VOL 21, 2007, 21 : 123 - +
  • [38] A Group-Based Trust and Reputation Model in Peer-to-Peer Networks
    Kong, Chuan
    Wang, Qingxian
    PROCEEDINGS OF THE 14TH YOUTH CONFERENCE ON COMMUNICATION, 2009, : 882 - 886
  • [39] A New Reputation Model Based on Trust Cluster in Peer-to-Peer Networks
    Jin, Yu
    Zhao, Hongwu
    ADVANCES IN ELECTRICAL ENGINEERING AND AUTOMATION, 2012, 139 : 287 - 292
  • [40] Security Clustering Algorithm Based on Reputation in Hierarchical Peer-to-Peer Network
    Chen, Mei
    Luo, Xin
    Wu, Guowen
    Tan, Yang
    Kita, Kenji
    INTERNATIONAL CONFERENCE ON GRAPHIC AND IMAGE PROCESSING (ICGIP 2012), 2013, 8768