Please wait a minute...
J4  2010, Vol. 44 Issue (1): 56-60    DOI: 10.3785/j.issn.1008-973X.2010.01.011
计算机科学技术     
基于零知识交互式证明和Bayesian信誉网的小世界P2P模型
夏莹杰,宋广华,朱明哲,郑耀
(浙江大学 计算机科学与技术学院,浙江 杭州 310027)
Trusted small world P2P model based on zero knowledge interactive proof and Bayesian trust network
XIA Ying-jie, SONG Guang-hua, ZHU Ming-zhe, ZHENG Yao
(College of Computer Science and Technology, Zhejiang University, Hangzhou 310027, China)
 全文: PDF  HTML
摘要:

针对当前P2P(Peer-to-Peer)系统在网络拓扑和信誉评估机制结合方面的不足,设计一种基于角色和信誉访问控制机制的可信小世界P2P(SW-R2P)模型.模型使用零知识交互式证明(ZKIP)算法,在不传输节点身份相关信息的前提下安全地验证对等节点的组信息,并以此作为构建小世界网络拓扑的基础.通过Bayesian信誉网对节点和组的多方面信誉进行评估,从而影响节点的各种操作和组之间连接的建立.仿真实验结果表明,SW-R2P模型在资源查找成功率、网络聚合度以及节点信誉偏差等方面的性能优于Chord和R2P模型.SW-R2P模型结合了ZKIP算法、Bayesian信誉网和小世界拓扑的优势,实现了一种可信、安全和高效的P2P网络架构.

Abstract:

A trusted small world Peer-to-Peer (P2P) model with role and reputation based access control policies (SW-R2P) was designed to combine the network topology and trust evaluation in P2P network. The model utilizes the zero knowledge interactive proof (ZKIP) scheme to authenticate the group information between peers without transferring any related data. The group information is used to cluster the peers to construct a small world topology. The Bayesian trust network is involved into the SW-R2P model to evaluate the multi-faceted trust of the peer and the group, which supporting the action protocols of peers and the long links between groups. Simulation shows that the SW-R2P model performs much better than the Chord and R2P models in the resources lookup, clustering coefficient and peer reputation error. The SW-R2P model integrates the advantages of small world topology, ZKIP scheme and Bayesian trust network, therefore implements a trustworthy, secure and efficient P2P network.

出版日期: 2010-02-26
:  TP 393.03  
基金资助:

浙江省科技计划国际合作重点资助项目(2009C14031).

通讯作者: 宋广华,男,副教授.     E-mail: ghsong@zju.edu.cn
作者简介: 夏莹杰(1982-),男,浙江奉化人,博士生,从事分布式网络和计算研究.
服务  
把本文推荐给朋友
加入引用管理器
E-mail Alert
RSS
作者相关文章  

引用本文:

夏莹杰, 宋广华, 朱明哲, 等. 基于零知识交互式证明和Bayesian信誉网的小世界P2P模型[J]. J4, 2010, 44(1): 56-60.

JIA Ying-Jie, SONG An-Hua, SHU Meng-Zhe, et al. Trusted small world P2P model based on zero knowledge interactive proof and Bayesian trust network. J4, 2010, 44(1): 56-60.

链接本文:

http://www.zjujournals.com/eng/CN/10.3785/j.issn.1008-973X.2010.01.011        http://www.zjujournals.com/eng/CN/Y2010/V44/I1/56

[1] FERRAIOLO D F, KUHN D R, CHANDRAMOULI R. Role-based access control [M]. Norwood: Artech House, 2003: 28-30.
[2] PARK J S, HWANG J. Trusted P2P computing environments with role-based access control [J]. IET Information Security, 2007, 1(1): 27-35.
[3] ABDUL-RAHMAN A, HAILES S. Supporting trust in virtual communities [C]∥ Proceedings of the International Conference on System Sciences. Hawaii: IEEE, 2000: 1-9.
[4] WANG Y, VASSILEVA J. Bayesian network based trust model [C]∥ Proceedings of International Conference on Web Intelligent. Halifax: IEEE, 2003:372-378.
[5] HUI K, LUI J, YAU D. Small world overlay P2P networks: construction, management and handling of dynamic flash crowds [J]. Computer Networks, 2006, 50(15): 2727-2746.
[6] MERUGU S, SRINIVASAN S, ZEGURA E. Adding structure to unstructured peer-to-peer networks: the use of small world graphs [J]. Journal of Parallel and Distributed Computing, 2005, 65(2): 142-153.
[7] GOLDWASSER S, RACKOFF C. Knowledge complexity of interactive proof systems [J]. SIAM Journal on Computing, 1989, 18(1): 186-208.
[8] XIA Y, SONG G, ZHENG Y, et al. R2P: a peer-to-peer transfer system based on role and reputation [C]∥Proceedings of International Workshop on Knowledge Discovery and Data Mining. Adelaide: IEEE, 2008:136-141.
[9] STOICA I, MORRIS R, KARGER D, et al. Chord: a scalable peer-to-peer lookup service for internet applications [C]∥ Proceedings of ACM SIGCOMM. San Diego: ACM, 2001:149-160.

[1] 占志峰, 邢卫, 鲁东明. 延迟变化紧密的多核心组播树快速构建算法[J]. J4, 2013, 47(1): 29-36.
[2] 宋广华, 夏莹杰, 郑耀, 毛小云. 基于多层Bayesian信任网的P2P负载均衡模型[J]. J4, 2010, 44(9): 1676-1680.