A trusted small world Peer-to-Peer (P2P) model with role and reputation based access control policies (SW-R2P) was designed to combine the network topology and trust evaluation in P2P network. The model utilizes the zero knowledge interactive proof (ZKIP) scheme to authenticate the group information between peers without transferring any related data. The group information is used to cluster the peers to construct a small world topology. The Bayesian trust network is involved into the SW-R2P model to evaluate the multi-faceted trust of the peer and the group, which supporting the action protocols of peers and the long links between groups. Simulation shows that the SW-R2P model performs much better than the Chord and R2P models in the resources lookup, clustering coefficient and peer reputation error. The SW-R2P model integrates the advantages of small world topology, ZKIP scheme and Bayesian trust network, therefore implements a trustworthy, secure and efficient P2P network.
JIA Ying-Jie, SONG An-Hua, SHU Meng-Zhe, et al. Trusted small world P2P model based on zero knowledge interactive proof and Bayesian trust network. J4, 2010, 44(1): 56-60.
[1] FERRAIOLO D F, KUHN D R, CHANDRAMOULI R. Role-based access control [M]. Norwood: Artech House, 2003: 28-30.
[2] PARK J S, HWANG J. Trusted P2P computing environments with role-based access control [J]. IET Information Security, 2007, 1(1): 27-35.
[3] ABDUL-RAHMAN A, HAILES S. Supporting trust in virtual communities [C]∥ Proceedings of the International Conference on System Sciences. Hawaii: IEEE, 2000: 1-9.
[4] WANG Y, VASSILEVA J. Bayesian network based trust model [C]∥ Proceedings of International Conference on Web Intelligent. Halifax: IEEE, 2003:372-378.
[5] HUI K, LUI J, YAU D. Small world overlay P2P networks: construction, management and handling of dynamic flash crowds [J]. Computer Networks, 2006, 50(15): 2727-2746.
[6] MERUGU S, SRINIVASAN S, ZEGURA E. Adding structure to unstructured peer-to-peer networks: the use of small world graphs [J]. Journal of Parallel and Distributed Computing, 2005, 65(2): 142-153.
[7] GOLDWASSER S, RACKOFF C. Knowledge complexity of interactive proof systems [J]. SIAM Journal on Computing, 1989, 18(1): 186-208.
[8] XIA Y, SONG G, ZHENG Y, et al. R2P: a peer-to-peer transfer system based on role and reputation [C]∥Proceedings of International Workshop on Knowledge Discovery and Data Mining. Adelaide: IEEE, 2008:136-141.
[9] STOICA I, MORRIS R, KARGER D, et al. Chord: a scalable peer-to-peer lookup service for internet applications [C]∥ Proceedings of ACM SIGCOMM. San Diego: ACM, 2001:149-160.