欢迎来到天天文库
浏览记录
ID:7524381
大小:519.59 KB
页数:10页
时间:2018-02-17
《reputation management algorithms for dht-based peer-to-peer environment》由会员上传分享,免费在线阅读,更多相关内容在工程资料-天天文库。
1、ComputerCommunications32(2009)1400–1409ContentslistsavailableatScienceDirectComputerCommunicationsjournalhomepage:www.elsevier.com/locate/comcomReputationmanagementalgorithmsforDHT-basedpeer-to-peerenvironmentNatalyaFedotova*,LucaVeltriUniversityofParma,Viale
2、Usberti,181/AParma,ItalyarticleinfoabstractArticlehistory:Thispaperaddressestheproblemofintegrationofreputationmanagementmechanismsintodatalook-Availableonline13March2009upandroutingprocessestocopewithsomespecificsecurityproblemsinpeer-to-peer(P2P)networksbase
3、donDistributedHashTables(DHT).Thegoalistofindamodefor‘‘good”peerstocooperateinorderKeywords:towithstandmaliciousactivityofsinglemalevolentpeersandtheircollusionsaswell.ReputationWestartfromconsiderationofindividualinstrumentsforreputationevaluationthateverysin
4、glepeerDistributedHashTablesshouldbeprovidedwithtoautonomouslydefinethelevelofitsowntrusttowardsothers.Wealsopro-Peer-to-peerposeapossiblescenarioofintegrationofsomeexistingreputationmanagementtechniquesandroutingSecuritymechanismsinaP2Pnetworkbasedonthepopula
5、rKademliaalgorithm.Then,wepresentaninteractionalgorithmthatallowspeerstoobtaintheglobaltrustvalueforeachsinglenodethroughexchangingopinionsintheformoflocaltrustvaluesindependentlycalculatedbyeverypeerwithothermembersofthecommunity.Suchcollaborationbetweenpeer
6、sisindispensabletocopewithmaliciousactivityofinconsistentnaturespecifictoDHT-basedenvironment.Torenderthealgorithmresilienttothepres-enceofmaliciousparticipantsweproposetoapplysolutionsforByzantineAgreementtoexchangeopin-ionsamongpeers.Wealsoprovidemathematica
7、levaluationsconcerningthecomplexityandcomputationalcostsoftheproposedalgorithmthatevidenceapparentimprovementsoverthepreviousone.Ó2009ElsevierB.V.Allrightsreserved.1.Introductionwithstandthemaliciousactivity.Inparticular,DHT-basedP2Pnet-worksarevulnerabletosp
8、ecificthreatsandattacks,typicalforthisenvironment,thataregenerallyprovokedbymaliciousbehaviour‘‘...Ideasthathavegreatresultsarealwayssimpleones.Mywholeofsomenodes:routingattacks,storageand
此文档下载收益归作者所有