Please wait a minute...
J4  2010, Vol. 44 Issue (1): 56-60    DOI: 10.3785/j.issn.1008-973X.2010.01.011
计算机科学技术     
基于零知识交互式证明和Bayesian信誉网的小世界P2P模型
夏莹杰,宋广华,朱明哲,郑耀
(浙江大学 计算机科学与技术学院,浙江 杭州 310027)
Trusted small world P2P model based on zero knowledge interactive proof and Bayesian trust network
XIA Ying-jie, SONG Guang-hua, ZHU Ming-zhe, ZHENG Yao
(College of Computer Science and Technology, Zhejiang University, Hangzhou 310027, China)
 全文: PDF 
摘要:

针对当前P2P(Peer-to-Peer)系统在网络拓扑和信誉评估机制结合方面的不足,设计一种基于角色和信誉访问控制机制的可信小世界P2P(SW-R2P)模型.模型使用零知识交互式证明(ZKIP)算法,在不传输节点身份相关信息的前提下安全地验证对等节点的组信息,并以此作为构建小世界网络拓扑的基础.通过Bayesian信誉网对节点和组的多方面信誉进行评估,从而影响节点的各种操作和组之间连接的建立.仿真实验结果表明,SW-R2P模型在资源查找成功率、网络聚合度以及节点信誉偏差等方面的性能优于Chord和R2P模型.SW-R2P模型结合了ZKIP算法、Bayesian信誉网和小世界拓扑的优势,实现了一种可信、安全和高效的P2P网络架构.

关键词: P2P小世界零知识交互式证明Bayesian信誉网SW-R2P    
Abstract:

A trusted small world Peer-to-Peer (P2P) model with role and reputation based access control policies (SW-R2P) was designed to combine the network topology and trust evaluation in P2P network. The model utilizes the zero knowledge interactive proof (ZKIP) scheme to authenticate the group information between peers without transferring any related data. The group information is used to cluster the peers to construct a small world topology. The Bayesian trust network is involved into the SW-R2P model to evaluate the multi-faceted trust of the peer and the group, which supporting the action protocols of peers and the long links between groups. Simulation shows that the SW-R2P model performs much better than the Chord and R2P models in the resources lookup, clustering coefficient and peer reputation error. The SW-R2P model integrates the advantages of small world topology, ZKIP scheme and Bayesian trust network, therefore implements a trustworthy, secure and efficient P2P network.

Key words: P2P    small world    zero knowledge interactive proof (ZKIP)    Bayesian trust network    SW-R2P
出版日期: 2010-02-04
:  TP 393.03  
基金资助:

浙江省科技计划国际合作重点资助项目(2009C14031).

通讯作者: 宋广华,男,副教授.     E-mail: ghsong@zju.edu.cn
作者简介: 夏莹杰(1982-),男,浙江奉化人,博士生,从事分布式网络和计算研究.
服务  
把本文推荐给朋友
加入引用管理器
E-mail Alert
RSS
作者相关文章  
夏莹杰
宋广华
朱明哲

引用本文:

夏莹杰, 宋广华, 朱明哲, 等. 基于零知识交互式证明和Bayesian信誉网的小世界P2P模型[J]. J4, 2010, 44(1): 56-60.

JIA Ying-Jie, SONG An-Hua, SHU Meng-Zhe, et al. Trusted small world P2P model based on zero knowledge interactive proof and Bayesian trust network. J4, 2010, 44(1): 56-60.

链接本文:

http://www.zjujournals.com/xueshu/eng/CN/10.3785/j.issn.1008-973X.2010.01.011        http://www.zjujournals.com/xueshu/eng/CN/Y2010/V44/I1/56

[1] FERRAIOLO D F, KUHN D R, CHANDRAMOULI R. Role-based access control [M]. Norwood: Artech House, 2003: 28-30.
[2] PARK J S, HWANG J. Trusted P2P computing environments with role-based access control [J]. IET Information Security, 2007, 1(1): 27-35.
[3] ABDUL-RAHMAN A, HAILES S. Supporting trust in virtual communities [C]∥ Proceedings of the International Conference on System Sciences. Hawaii: IEEE, 2000: 1-9.
[4] WANG Y, VASSILEVA J. Bayesian network based trust model [C]∥ Proceedings of International Conference on Web Intelligent. Halifax: IEEE, 2003:372-378.
[5] HUI K, LUI J, YAU D. Small world overlay P2P networks: construction, management and handling of dynamic flash crowds [J]. Computer Networks, 2006, 50(15): 2727-2746.
[6] MERUGU S, SRINIVASAN S, ZEGURA E. Adding structure to unstructured peer-to-peer networks: the use of small world graphs [J]. Journal of Parallel and Distributed Computing, 2005, 65(2): 142-153.
[7] GOLDWASSER S, RACKOFF C. Knowledge complexity of interactive proof systems [J]. SIAM Journal on Computing, 1989, 18(1): 186-208.
[8] XIA Y, SONG G, ZHENG Y, et al. R2P: a peer-to-peer transfer system based on role and reputation [C]∥Proceedings of International Workshop on Knowledge Discovery and Data Mining. Adelaide: IEEE, 2008:136-141.
[9] STOICA I, MORRIS R, KARGER D, et al. Chord: a scalable peer-to-peer lookup service for internet applications [C]∥ Proceedings of ACM SIGCOMM. San Diego: ACM, 2001:149-160.

[1] 张启飞, 张尉东, 李文娟, 潘雪增, 沈雁. 基于对等网络的面向小文件的云存储系统[J]. J4, 2013, 47(1): 8-14.
[2] 徐建, 黄孝喜, 郭鸣, 金正平, 郑宁. 动态P2P网络中基于匿名链的位置隐私保护[J]. J4, 2012, 46(4): 712-718.
[3] 宣琦, 吴铁军. Open shop复杂调度网络模型及特征分析[J]. J4, 2011, 45(4): 589-595.
[4] 钱剑锋, 尹建伟, 董金祥. 结构化P2P网络的语义发布/订阅系统
负载均衡算法
[J]. J4, 2011, 45(10): 1710-1719.
[5] 张引, 何浩, 赵丽娜, 张三元. 网构软件模型中的抽象状态机设计[J]. J4, 2010, 44(5): 923-929.
[6] 吴超,周波. 基于复杂网络的社会化标签分析[J]. J4, 2010, 44(11): 2194-2197.
[7] 尹建伟 施冬材 钱剑锋 董金祥 熊乃学. 结构化P2P网络上语义发布/订阅事件路由算法[J]. J4, 2008, 42(9): 1616-1624.
[8] 赵丽娜 张引 叶修梓 张三元. 基于P2P网络的网构软件自适应性研究[J]. J4, 2008, 42(8): 1316-1322.
[9] 胡昔祥. 面向大规模分布式计算的发布/订阅系统[J]. J4, 2008, 42(5): 736-741.
[10] 丁理杰 曹一家 刘美君. 复杂电力网络的连锁故障动态模型与分析[J]. J4, 2008, 42(4): 641-646.