摘要
由于P2P网络去中心化特性,导致无法直接使用传统集中式网络的节点信用评价指标。为了得到可信的数据,融合hash链的帕特里夏树和电商行业区块链,通过对经典模型的剖析,给出了较为完善的信用指标体系,引入节点信用指标的时间敏感函数,构建节点信任评价模型,并进行了效能分析。通过分析表明,该模型能保证P2P网络数据安全性。
As a result of the decentration of P2 P network,node credit evaluation indexes of traditional centralized network can not be directly used. In order to obtain credible data,the Patricia tree and SEC Blockchain are integrated with the hash chain. Through the analysis of the classical model,a more complete credit index system is proposed. The time-sensitive function of node credit is introduced to construct the node trust evaluation model,and the efficiency analysis is also carried out. The analysis shows that this model can guarantee the data security of P2 P network.
引文
[1]罗杰文. P2P应用研究与展望[N].计算机世界,2006-09-04(B16).
[2]GARMEHI M,ANALOUI M,PATHAN M,et al. An economic replica placement mechanism for streaming content distribution in Hybrid CDN-P2P networks[J]. Computer Communications,2014,15(1):52-78.
[3]LI J.On peer-to-peer(P2P)content delivery[J].Peer-to-Peer Networking and Applications,2018,1(1):46-55.
[4]开源网站Sourceforge[CP/OL].https://sourceforge.net/directory/os:windows/? q=P2P.
[5]WU J Y,CHO K. P2P and P2P botnet traffic classification in two stages[J].Soft Computing,2017,21(5):1315-1326.
[6]孙玉星,黄松华,陈力军,等.贝叶斯决策的自组织网推荐信任度修正模型[J].软件学报,2011,20(9):270-281.
[7]ZHENG Q L,SHI W S. Enforcing cooperative resource sharing in untrusted P2P computing environments[J].Mobile Networks and Applications,2015,2(6):45-56.
[8]SABRINA W,VICKY L H,RAY Z K J L,et al. Incentive cooperation strategies for peer-to-peer live multimedia streaming social networks[J].IEEE Transactions on Multimedia,2009,11(3):396-412.
[9]王小峰.信任管理策略表示与量化模型研究[D].长沙:国防科学技术大学,2017.
[10]KOACZEK G. Agent and multi-agent technology for internet and enterprise systems[M]. Berlin Heidelberg:Springer-Verlag,2015:36-39.
[11]李小青.移动Ad Hoc网络中安全路由协议的研究[D].西安:西安电子科技大学,2011.
[12]FULTON B. Review of introduction to modern crytography by Jonathan Katz and Yehuda Lindell Publisher:Chapman&Hall-CRC[J].ACM SIGACT News,2010,41(4):44-47.
[13]雷新雨.新型公开密钥交换算法的理论与应用研究[D].重庆:重庆大学,2015.
[14]ZHU L H,GAO F. Survery on privacy preserving techniques for blockchain technology[J].Journal of Computer Research and Development,2017,54(10):2170-2186.
[15]LI Y,ZHENG K,AN Y,et al. EtherQL:a query layer for blockchain system[J]. Database Systems for Advanced Applications,2017,556-567.
[16]窦文,王怀民,贾焰,等.构造基于推荐的Peer-to-Peer环境下的Trust模型[J].软件学报,2004,15(4):571-538.