基于群体的P2P电子商务信任模型的研究
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
将P2P应用于电子商务成了近几年的研究热点,而信任安全问题不论是在电子商务,还是在P2P技术本身都是急待解决的问题。降低用户的风险,帮助用户选择可信的交易对象,是电子商务发展的充分条件。传统信任模型虽然在一定程度上可以降低交易风险,但是当面对一些策略性的网络欺骗(如恶意节点之间形成共谋群,联合欺骗好节点或信任系统等)时,则显得力不从心。在电子商务中加入信任机制,只能在一定程度上降低交易风险,并不能完全消除这种风险的存在。
     在分析了现有信任模型的基础上,本文提出了一种基于群体的P2P电子商务信任模型,它将整个网络中的节点划分为三个集合,其中信誉值高的Good集合再由若干信任群所组成,在此信任群之间的交易显得更可信、更稳定。同时在模型中还加入了奖惩激励机制,以信任值为奖惩手段,使得用户为了获得很大的利益必须不断维护自己的信任值。
     GTM能够有效识别一些策略性网络欺骗,与传统信任模型相比,在网络性能和交易成功率方面也有一定提高,第5章的仿真结果验证了该模型的有效性。
Recently, building Electronic-Commerce in P2P has become a hotspot. It is important that the problem of trust must be solved whether in Electronic-Commerce field or in P2P network. So it is necessary to reduce the venture of customer, and consequently accelerates the development of Electronic-Commerce. The conventional trust model could work in a certain extent, but it could not resist some skilled deceits, for example, some malicious nodes might collude and cheat the good nodes even the trust system. It would be noted that the trust mechanism embedded into electronic commerce only could reduce risk of exchange in a degree, and could not eliminate risk completely.
     According to the analysis of existing local trust model, in this paper, we proposed a group-based trust model for P2P Electronic-Commerce. It portioned the whole network into three sets, and the good set of high reputation is divided into some trust groups. The exchange among these trust groups is become more believable and stable. At the same time, this model introduces reward-punishment incentive mechanism with the means of trust value, and the customers must maintain high trust value in order to gain much more profits.
     GTM can availably identify some kinds of tactical deceits in network. Comparing to conventional trust model, the network performance and success rating of exchange are increased in a degree. Simulations in the fifth chapter validated the efficiency of the trust model.
引文
[1] 赵俊杰.对我国电子商务发展现考.市场周刊,财经论坛.2004/08
    [2] 中国工商报.2005年6月8同
    [3] Panayiotis Kotzanikolaou, Mike Burmester, Vassilios Chirssikopoulos. Secure Transactions with Mobile Agents in Hostile Environments. Information Security and Privacy [A]. Proceedings of the 5thAustralasian Conference, ACISP 2000 [C]. Springer - Verlag, 2000, LNCS 1841.
    [4] Q. Lv, P. Cao, E. Cohen, K. Li, and S. Shenker. Search and Replication in UnstructuredPeer-to-Peer Networks. Proceedings of 16th ACM International Conference on Supercomputing(ICS'02), dew York, USA, June 2002.
    [5] Karl A berer, Manfred Hauswirth. Peer-to-peer information systems: concepts and models, state-of-the-art, and future systems. Tutorial to be held at the 18th International Conference onData Engineering, February26-Marchl, 2002, SanJose, California.
    [6] Ion Stoica, Robert Morris, David Karger, M. Fr ans Kaashoek, Hari Balakrishnan, Chord: AScalable Peer-to-peer Lookup Service for Internet Applications, ACM SIGCOMM'01, Aug. 2001, San Diego, California, USA.
    [7] Frank Dabek, Emma Brunskill, M. Frans Kaashoek, David Karger, Robert Morris, Ion S toica, Hari Balakrishnan. Building Peer-to-Peer Systems With Chord, a Distributed Lookup S ervice. in Proceedings of the 8th Workshop on Hot Topics in Operating Systems(HotOS Ⅷ), Schloss Elmau, Oermany, May, 2001.)
    [8] Xiaodong Fu, Weisong Shi, Anatoly Akkerman, and Vijay Karamcheti. CANS: Composable, Adaptive Network Services Infrastructure. In proceedings of 3'd USENIX SymposiumInternet Technologies and Systems.
    [9] 张睿,陈卫华.基于电子商务信任问题的模型构建[J].科学进步与对策,2004-5月号:129~131.
    [10] D. Gambetta. Can We Trust Trust?. In: Trust: Making and Breaking Cooperative Relations, Basil Blackwell, Oxford, 1990, 213-237P.
    [11] P. Dasgupta. Trust as a Commodity. In Trust: Making and Breaking Cooperative Relations, Department of Sociology, University of Oxford, 2000.
    [12] Mayer, R. C., Davis, J. H., Schooman, F. D. An integrative model of organizational trust[J]. Academy of Management Review 1995, 20 (3): 709~734.
    [13] Yao Wang, Julita Vassileva. Bayesian network-Based Trust Model. In: Proceedings of the IEEE/WIC international conference on Web Intelligence (WI' 03), 2003.
    [14] 王茜,杜瑾珺.一种P2P电子商务安全信任模型.计算机科学,2006,33 (9):54~57
    [15] 沙赢,白硕.当前公开密钥基础设施的主要问题分析.微电子学与计算机.2002年 第6期 18-21页
    [16] Abdul-Rahman A, Hailes S. A distributed trust model. Proceedings of the 1997 New SecurityParadigms Workshop. Cumbria, ACM Press, 1998.
    [17] Sepandar D. Kamvar, Mario T. Schlosser and HectorGarciaMolina. The EigenTrust Algorithm for ReputationManagement in P2P Networks.
    [18] Y. Wang. Bayesian network-based trust model in peer-to-peer network. Proceedings of Workshop on "Deception, Fraud and Trust in Agent Societies" at the AutonomousAgents and Multi Agent Systems 2003 Conference(AAMAS-03), Melbourne, Australia. 200310
    [19] Heckerman, O. "A Tutorial on Learning with BayesianNetworks", Microsoft Research report MSR-TR-95-06, 1995
    [20] Lee, S., Sherwood, R., et al. Cooperative peer groups inNICE. In Proceedings of the IEEE Infocom. San Francisco, USA, Apr 1-3, 2003.
    [21]Sabater, J. Zeckhauser, C. REGRET:A reputationModel for Gregarious Societies. In Proceeding of the4th Workshop on Deception, Fraud and Trust in AgentSocieties. Montreal, Canada, 2001.
    [22] Guha R, Kumar R, Raghavan P. Propagation of trust and distrust. www2004, New York, USA, 2004: 17-22.
    [23] Yu B, Munindar P. An evidential model of distributed reputation management. In: AAMAS02, 2002-07:15-19.
    [24]Mujtaba Khambatti, Partha Dasgupta, Kyung Dong Ryu. A Role-Based Trust Model for Peer-to-Peer Communities and Dynamic Coalitions. Information Assurance Workshop, 2004. Proceedings. Second IEEE International , 8-9 April 2004, Pages:141-154.
    [25]Karl Aberer, Zoran Despotovic. Managing Trust in a Peer-2-Peer Information System. http://www.p-grid.org/Papers/CIKM2001.pdf.
    [26]Lik Mui, Mojdeh Mohtashemi, Ari Halberstadt. A Computational Model of Trust and Reputation. Proceedings of the 35th Hawaii International Conference on System Sciences-2002, IEEE 2002, Pages:2431-2439.
    [27]Makoto Iguchi, Masayuki Terada, Ko Fujimura. Managing Resource and Servent Reputation in P2P Networks. Proceedings of the 37th Hawaii International Conference on System Sciences-2004, IEEE 2004.
    [28]Abhilash Gummadi, Jong P. Yoon. Modeling Group Trust For Peer-to-Peer Access Control. Proceedings of the 15th International Workshop on Database and Expert System Applications(DEXA' 04), IEEE 2004,
    [29]Nolan Miller, Paul Resnick, Richard Zeckhauser. Eliciting Honest Feedback in Electronic Markets. http://ksghome. harvard. edu/~RZeckhauser/MRZ. pdf.
    [30]Zhaoyu Liu, Anthony W.Joy, Robert A.Thompson. A Dynamic Trust Model for Mobile Ad Hoc Networks. Proceedings of the 10th IEEE International Workshaop on Future Trends of Distributed Computing Systems(FTDCS' 04).
    [31] Rohit Gupta, Arun K. Somani. Reputation management framework and its use as currency in large-scale peer-to-peer networks[C]. Proceedings of the Fourth International Conference on Peer-to-Peer Computing (P2P' 04), IEEE, 2004.
    [32] Li Xiong, Ling Liu. PeerTrust: Supporting Reputation-Based Trustfor Peer-to-Peer Electronic Communities[J]. IEEE Transactions on Knowledge and Data Engineering, vol 16, NO. 7, July, 2004.
    [33] Abhilash Gummadi, Jong P. Yoon. Modeling Group Trust For Peer-to-Peer Access Control. Database and Expert Systems Applications, 2004. Proceedings. 15th International Workshop on 30 Aug. -3 Sept. 2004 Page (s): 971-978.
    [34] 徐巧枝,刘东升.一种用于P2P电子商务的信任模型.计算机工程与应用,2006,21:134-138.
    [35] Lamport L, Shostak R, Pease M. The Byzantine generals problem[J]. ACM Transactions on Programming Languages and Systems, 1982, 4 (3): 382-401.
    [36] Ghada Derbas, Ayman Kayssi, Hassan Artail, Ali Chehab. TRUMMAR-A Trust Model for Moblie Agent Systems Based on Reputation[C]. Proceedings of The IEEE/ACS International Conference on Pervasive Services, 2004. ICPS 2004.19-23 July 2004 Page(s): 113-120.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700