P2P Recommendation Trust Model

被引:6
|
作者
Wang, Xuan [1 ]
Wang, Lei [1 ]
机构
[1] Harbin Inst Technol, Shenzhen Grad Sch, Dept Comp Sci, Intelligence Comp Res Ctr, Shenzhen 518055, Peoples R China
关键词
P2P trust model; feedback mechanism; recommendation; punishment mechanism;
D O I
10.1109/ISDA.2008.227
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Security trust model is an important research topic for the P2P application. This paper firstly analyzes the existing P2P network security trust models, and then puts forward a new P2P recommendation trust model based on the network of social relationships. The model provides different types of services to show the user's interest in different areas, and gives recommendation based on the interested area. feedback mechanism and punishment mechanism have been used to improve the model. The simulation shows that the model can truly evaluate entity behavior and effectively isolated from malicious nodes.
引用
收藏
页码:591 / 595
页数:5
相关论文
共 50 条
  • [41] TD-Trust: A Time Domain Based P2P Trust Model
    Li, Dong
    Zhu, Zhengtao
    Cheng, Chunling
    Du, Fei
    [J]. ARTIFICIAL INTELLIGENCE AND COMPUTATIONAL INTELLIGENCE, PT I, 2011, 7002 : 467 - 474
  • [42] A P2P trust model based on multi-dimensional trust evaluation
    Wang, Xinsheng
    Liang, Peng
    Ma, Huidong
    Xing, Dan
    Wang, Baozong
    [J]. BIO-INSPIRED COMPUTATIONAL INTELLIGENCE AND APPLICATIONS, 2007, 4688 : 347 - 356
  • [43] Related cluster based trust model for P2P networks
    [J]. Ma, Y. (myron_my@163.com), 1600, Northeast University (34):
  • [44] Hybrid Trust Model for Worm Mitigation in P2P Networks
    Amine Rguibi, Mohamed
    Moussa, Najem
    [J]. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2018, 43 : 21 - 36
  • [45] Incentive Strategy Based on Trust Model in P2P Network
    Lu, Yang
    Wang, Xue
    [J]. 2010 2ND INTERNATIONAL ASIA CONFERENCE ON INFORMATICS IN CONTROL, AUTOMATION AND ROBOTICS (CAR 2010), VOL 3, 2010, : 192 - 195
  • [46] A Time-decay based P2P Trust Model
    Zhang, Yong
    Wang, Kewen
    Li, Keqiu
    Qu, Wenyu
    Xiang, Yang
    [J]. NSWCTC 2009: INTERNATIONAL CONFERENCE ON NETWORKS SECURITY, WIRELESS COMMUNICATIONS AND TRUSTED COMPUTING, VOL 2, PROCEEDINGS, 2009, : 235 - +
  • [47] A Novel Trust Evaluation Model for Mobile P2P Networks
    Wu, Xu
    [J]. NETWORK AND PARALLEL COMPUTING, 2010, 6289 : 210 - 219
  • [48] A distributed trust management model for mobile P2P networks
    Wu, Xu
    [J]. PEER-TO-PEER NETWORKING AND APPLICATIONS, 2012, 5 (02) : 193 - 204
  • [49] SECTrust: A Secure and Effective Distributed P2P Trust Model
    Hu, Jianli
    Li, Xiaohua
    Zhou, Bin
    Li, Yonghua
    [J]. 2010 THIRD INTERNATIONAL SYMPOSIUM ON INTELLIGENT INFORMATION TECHNOLOGY AND SECURITY INFORMATICS (IITSI 2010), 2010, : 34 - 38
  • [50] A Trust Model Based on Similarity Evaluation in P2P Networks
    Jin, Yingwei
    Zhang, Yong
    Qu, Wenyu
    Liu, Yining
    Li, Keqiu
    [J]. PROCEEDINGS OF THE 2008 INTERNATIONAL SYMPOSIUM ON PARALLEL AND DISTRIBUTED PROCESSING WITH APPLICATIONS, 2008, : 737 - +