对等网络文件共享系统中的信誉机制研究
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
互联网的迅速发展给传统的网络应用模式带来了新的挑战,促成了对等网络P2P系统的产生,使得互联网系统的计算模式从客户端/服务器模式向对等模式转变。目前,P2P技术已广泛应用于很多领域,其中文件共享系统可以说始终是P2P技术发展的动力之源。但是,因为动态性和异构性的特点,P2P文件共享系统仍然存在着诸如共享文件的可靠性、节点间的信任等亟待解决的问题。
     P2P网络的信誉机制通过对系统中的用户或资源进行定性或定量的评价来预测该用户或资源未来的行为,从而起到鼓励良性行为、抑制恶意行为、辅助用户决策的重要作用。因此,对P2P文件共享系统中的信誉机制展开研究,设计和实现具有抵抗各种攻击行为能力的信誉系统,对提高P2P网络的可用性,具有十分重要的现实意义。
     本文在深入研究和总结相关领域已有成果的基础上,分别针对P2P网络文件共享系统的对象信誉层、节点信誉层、拓扑结构层三部分内容展开研究,设计实现了一个完整的P2P网络上的信誉系统。本文的主要研究工作如下:
     首先,分析了P2P用户的一般操作流程和节点动作对文件对象扩散的影响,建立了基于文件对象的污染传播模型,描述了系统中的文件传播过程和节点状态转换,揭示了文件共享系统中对象信誉机制对抑制污染的重要作用。
     在此模型的基础上,针对基于节点信誉机制的不足,建立了基于对象信誉的P2P文件共享防污染系统。利用查询消息来触发节点传播和收集投票,通过计算节点间投票向量的夹角余弦来衡量节点投票的相似性,以此赋予投票权重,运用自适应的信誉阈值来判断文件的可信性。
     为了实现节点间信任关系的传播和信任信息的有效利用,针对现有的基于最大流算法经典方案的局限,提出了基于基尔霍夫定律的信任传播方案。该方案基于电阻网络理论构建电阻信任网络图,更加精确的刻画了信任传播现象,更为自然的反映了信任关系的实质,同时还对算法时间复杂度进行了优化。
     最后,从宏观上考虑P2P网络的拓扑结构与信誉机制的相互影响,受到自然免疫原理的启发,采用人工免疫系统方法,研究了P2P网络中基于信誉的邻居选择方法和拓扑构造方案,优化了网络中的节点连接,在覆盖层网络层次上抑制了污染文件的传播。
     通过仿真实验和实际系统验证,该信誉系统以较低开销有效抑制了污染文件在网络中的传播,并且能够惩罚搭便车行为,应对各种攻击情形。
The rapid development of Intemet has brought new challenge to the traditional network model,resulting in the emergence of P2P system.It makes the transfer of Internet computing model,from client/server model to peer-to-peer.At present,P2P technology has been widely utilized in many fields,especially the P2P file sharing system,as the power source of the P2P technology development.However,due to the nature of dynamics and heterogeneity,there are many issues worthing to research in P2P file sharing system,such as the reliability of sharing files and the trustness between nodes.
     The reputation mechanism of P2P network predicts future behavior of users or resources by making qualitative or quantitative evaluation of them.It can encourage benign behavior and inhibit malicious behavior,to play an important role in system. Therefore,it is of a very important and practical significance to carry out the research on the reputation mechanism in P2P file sharing system,and design and implement the attack proof reputation system,to improve the availability of P2P network.
     After investigating related works deeply,this dissertation focuses on three main parts of P2P file sharing system respectively,the object reputation,the node reputation and the overlay topology.A complete reputation system on the P2P file sharing network is designed and implemented.The main structure of this dissertation is as follows:
     At first,we analyse the general operation flow of users and the impact of the user action on the document propagation,and establish object-based model of pollution proliferation.The model describes the process of document propagation and state transition diagram of node,and revealed the important role of reputation mechanism in file sharing system.
     Based on the propagation model above,we establish an object reputation based P2P file sharing anti-pollution system,instead of node reputation.We utilize the query message to trigger the dissemination and collection of votes,and measure the similarity between nodes by calculating the cosine between voting vectors,then weight the votes.Self-adaptive threshold is used to determine the credibility of documents.
     In order to achieve effective utilization of reputation information,we propose a trust propagation algorithm based on Kirchhoffs law,instead of the classic maximum flow based algorithm.The resistance reputation network is established based on the resistor network theory.It is more precise and more natural to reflect the relationship and transitivity of trust.We also optimize the time complexity of algorithm.
     Finally,we consider the interactivity between network topology and reputation system in the macroscopical view.Inspired by the natural immune principles,we employ the artificial immune algorithm based reputation system to achieve the neighbor selection,connection optimization,and topology construction.The spread of pollution is inhibited at the level of overlay network.
     The simulation experiment and practical system show that our reputation system can control the pollution prolification effectively at a low cost.And it can punish the free-riding behavior,and cope with various attack situations.
引文
iResearch Consulting Group.2006.中国P2P流媒体研究报告[R].
    窦文.2003.信任敏感的P2P拓扑构造及其相关技术研究[D].国防科大博士毕业论文.
    冯沁原,代亚非.2007.P2P网络信任机制综述[J].中国计算机学会通讯,3(3):31-40.
    黄道颖,黄建华,庄雷,李祖鹏.2004.基于主动网络的分布式P2P网络模型[J].软件学报,15(7):1081-1089.
    刘琼,徐鹏,杨海涛,等.2006.Peer-to-peer文件共享系统的测量研究[J].软件学报,2006,17(10):2131-2140.
    汪小帆,李翔,陈关荣.2006.复杂网络理论及其应用[M].清华大学出版社.
    张宪超,陈国良,万颖瑜.2003.网络最大流问题研究进展[J].计算机研究与发展,40(9):1281-1292.
    郑纬民.2007.对等计算研究转变:从理论到实践[J].中国计算机学会通讯,3(3):6-7.
    中国互联网络信息中心.2009.中国互联网络发展状况统计报告[R].北京:中国互联网络信息中心.
    朱峻茂.2005.开放网络中的信任问题研究[D].中国科学技术大学博士毕业论文.
    A.Abdul-Rahman,S.Hailes.2000.Supporting Trust in Virtual Communities[C].Proceedings Hawaii International Conference on System Sciences 33,Maui,Hawaii,4-7 January 2000.
    A.Josang and R.Ismail.2002.The beta reputation system[C].Proceedings of the 15th Bled Electropic Commerce Conference,2002.
    A.Josang and S.Pope.2005.Semantic constraints for trust transitivity[C].Proceedings of the 2nd Asia-Pacific conference on Conceptual modelling-Volume 2005(43):59-68.
    A.Josang,R.Ismail and C.Boyd.2007.A Survey of Trust and Reputation Systems for Online Service Provision[J].Decision Support Systems,43(2),618-644.
    A.Rowstron,P.Druschel.Pastry:Scalable,Decentralized Object Location and Routing for Large-Scale P2P Systems[C].18th IFIP/ACM Conference on Distributed Systems Platforms.Heidelberg.
    Abdul-Rahman A,Hailes S.1998.A decentralized trust model[C].Proceedings of the 1997New security Paradigms Workshop,Cambrian,ACM Press.
    Aberer K and Hauswirth M.2002.Peer-to-Peer information systems:Concepts and models,state-of-the-art,and future systems[C].Proceedings of the 18th International Conference on Data Engineering(ICDE'02),Tutorial Slides.San Jose,CA,USA.
    Androutsellis-Theotokis S and Spinellis D.2002.A Survey of peer-to-peer File Sharing Technologies[R].White paper,Electronic Trading Research Unit(ELTRUN),Athens University of Economics and Business.http://citeseer.ist.psu.edu/androutsellis-theoto02survey.html
    Beth,T.,BorcheSDing,M.,Klein,B..1994.Valuation of trust in open networks[C].Gollmann D,ed.Proceedings of the European Symposium on Research in Security(ESORICS).Brighton:Springer-Verlag,3-18.
    Bhagwan R,Savage S,Voelker GM.2003.Understanding availability[C].Kaashoek F,Stoica I,eds.IPTPS 2003.LNCS 2735,Springer-Verlag Berlin Heidelberg,256-267.
    Bin Yu and Munindar P.Singh.2002.An Evidential Model of Distributed Reputation Management[C].Proc.of First Int.Joint Conf.on Autonomous agents and Multi-agent Systems,294-301.
    C.Delarocas.2000.Immunizing Online Reputation Reporting Systems against Unfair Ratings and Discriminatory Behavior[C].ACM Conference on Electronic Commerce,150-157.
    C.Duma,N.Shahmehri and G.Caronni.2005.Dynamic trust metrics for peer-to-peer systems[C].Proc.of 2nd IEEE Workshop on P2P Data Management,Security and Trust.
    C.Fraleigh,S.Moon,B.Lyles,C.Cotton,M.Khan,R.Rockell,D.Moll,T.Seely and C.Diot.2003.Packet-level Traffic Measurements from the Sprint IP Backbone[J].IEEE Network Magazine,17(6).
    Carter J H.2000.The immune system as a model for pattern recognition and classification[J].Journal of the American Medical Informatics Association,2000,7(3):28-41.
    Christin N,Weigend A S,Chuang J.2005.Content availability,pollution and poisoning in peer to peer file sharing networks[C].Proc of ACM E-Commerce Conference.
    Christos Gkantsidis,Milena Mihail,and Amin Saberi.2004.Random walks in peer-to-peer networks[C].Proceedings of IEEE INFOCOM 2004.
    Chun J S,Lim J P,Jung H K.1999.Optimal design of synchronous motor with parameter correction using immune algorithm[J].IEEE Transaction on Energy Conversion,1999,14(3):610-615.
    Clip2com.2001.The Gnutella protocol specification v0.4[S].http://rfc-gnutella.sourceforge.net/Development.
    Cohen E,Fiat A and Kaplan H.2003.A case for associative peer-to-peer overlays[J].ACM SIGCOMM Computer Communication Review,33(1):95-100.
    Cooper BF,Garcia-Molina H.Ad hoe.2003.self-supervising peer-to-peer search networks[R].Technical Report,Stanford University.
    D Dumitriu,E Knightly,A Kuzmanovic,I Stoica,W Zwaenepoel.2005.Denial-of-service resilience in peer-to-peer file-sharing systems[C].Proceedings of ACM Sigmetrics 2005,Banff,Canada,June 2005.New York,NY,USA:ACM,2005:38-49.
    D.Gambetta.1988.Can we trust trust[M].Trust:Making and Breaking Cooperative Relations.213-237.
    D.H.Knight and N.L.Chervany.1996.The meaning of trust[R].Tech.Rep.WP9604,Universoty of Minnesota,Management Information Systems Research Center.
    D.Hughes,G.Coulson and J.Walkerdine.2005.Free riding on Gnutella revisited:the bell tolls?[J].Distributed Systems Online,IEEE,2005(6).
    Dasgupta D,Attoh-Okine N.1997.Immunity based systems:A survey[C].Proceedings of IEEE International Conference on Systems,Man,and Cybernetics,Orlando,Florida,1997.369-374.
    Diego Gambetta.1990.Can We Trust?[M].Trust:Making and Breaking Cooperative elations,Gambetta,D(ed.).Basil Blackwell.Oxford,1990,213-237.
    Dumitriu D,Knightly E,Stoica I,et al.2005.Denial of service res ilience in peer to peer file sharing systems[J].ACM Sigmetrics Performance Evaluation Review,2005,33(1):38-49.
    E Damiani,S D C di Vimercati,S Paraboschi,P Samarati,F Violante.2002.A Reputation-Based Approach for Choosing Reliable Resources in Peer-to-Peer Networks[C].ACM Conference on Computers and Communications Security,Washington,DC,USA,October 2002.New York,NY,USA:ACM,2002:207-216.
    E.Adar and B.A.Huberman.2000.Free Riding on Gnutella[J].First Monday,2000(5):2.
    E.Damiani,S.Paraboschi,P.Samarati and F.Violante.2002.A reputation-based approach for choosing reliable resources in peer-to-peer networks[C].Proceedings of the 9th ACM conference on Computer and communications security,2002:207-216.
    E.Lua,J.Crowcroft,M.Pias,et al.2005.A survey and comparison of peer-to-peer overlay network schemes[J].IEEE Communications Survey and Tutorial,7(2):72-93.
    eDonkey.2000.eDonkey home page[EB/OL].http://www.edonkey.com.
    Eytan Adar and Bernardo A.Huberman.2000.Free riding on gnutella[R].Technical report,Xerox PARC,10 Aug 2000.
    F.Cornelli,E.Damiani,S.D.C.di Vimercati,S.Paraboschi,and P.Samarati.2002.Choosing reputable servents in a p2p network[C].Proc of the 11th World Wide Web Conference.Honolulu,Hawaii,USA.
    Faloutsos M,Faloutsos P and Faloutsos C.1999.On Power-law Relationship of the Internet Topology[C].Proceedings of the ACM SIGCOMM 1999 Conference on Applications,Technologies,Architectures,and Protocols for Computer Communication,251-262.Cambridge, Massachusetts,USA:ACM Press.
    Frank Dabek,M.Frans Kaashoek,David Karger,Robert Morris and Ion Stoica.2001.Wide-area cooperative storage with CFS[C].ACM SOSP 2001,Banff.
    G Caronni.2000.Walking the web of trust[C].Proceedings of the 9th Workshop on Enabling Technologies(WET ICE'2000),IEEE Computer Society Press.
    G Sakaryan,M Wulff,H Unger.2004.Search methods in P2P networks:a survey[C].Proceedings of I2CS-Innovative Internet Community Systems.
    G.Hasdin.1968.The Tragedy of the Commons[J].Science,162:1243-1248.
    Gallaugher.J.M,Ramanathan.S.C.1996.Choosing a Client/Server Architecture[J].Information Systems Management.1996,13(2):7-13.
    Gediminas Adomavicius and Alexander Tuzhilin.2005.Toward the Next Generation of Recommender Systems:A Survey of the State-of-the-Art and Possible Extensions[J].IEEE Transactions on Knowledge and Date Engineering.June 2005,17(6):734-749.
    Graham RL.2001.Peer-to-Peer:Towards a Definition[C].Proceedings of the 1st International Conference on Peer-to-Peer Computing(P2P'01),Lecture.Linkoping,Sweden:IEEE Computer Society.
    Gray Jim.1997.The Revolution Yet to Happen.Appeared as a chapter of Beyond Calculation:The Next Fifty Years of Computing[M].
    Gu Q,Bai K,Wang H,et al.2006.Modeling of pollution in p2p file sharing systems[C]Proc of IEEE CCNC 2006.Las Vegas,USA:IEEE,2006:1033-1037.
    H.Homayounfar,F.Wang and S.Areibi.2002.Advanced P2P Architecture Using Autonomous Agents[C].The ISC A 15th International Conference on Computer Applications in Industry and Engineering.ACM Press,San Diego,California,115-118.
    Ian Clarke,Oskar Sandberg,Brandon Wiley,Theodore W.Hong.2000.Freenet:A Distributed Anonymous Information Storage and Retrieval System[C].International Workshop on Design Issues in Anonymity and Unobservability.Berkeley,CA,USA.
    iMesh.2000.iMesh home page[EB/OL].http://www.imesh.com.
    Inc B.2001.Bittorrent[EB/OL].http://www.bittorrent.com.
    Inc.Napster.1999.Napster website[EB/OL].http://www.napster.com.
    J Liang,R Kumar,Y Xi,K W Ross.2005.Pollution in P2P File Sharing Systems[C].Proceedings of IEEE Infocom 2005,Miami,FL,USA.USA:IEEE Press,March 2005.
    J Risson,T Moors.2004.Survey of Research towards Robust Peer-to-Peer Networks:Search Methods[R].University of New South Wales,Tech.Rep.UNSW-EE-P2P-1-1.
    J.Liang,N.Naoumov,K.W.Ross.2006.The Index Poisoning Attack in P2P File-Sharing Systems[C].Proceedings of IEEE Infocom 2006,Barcelona,Spain.USA:IEEE Press.
    J.Scott.2000.Social Network Analysis:a handbook[M].SAGE Publications.
    Jia Zhao,Jiande Lu.2006.Solving Overlay Mismatching of Unstructured P2P Networks using Physical Locality Information[C].Proceedings of the Sixth IEEE International Conference on Peer-to-Peer Computing(P2P'06),IEEE.
    Jing Tian,Yafei Dai.2007.Understanding the Dynamic of Peer-to-Peer Systems[C].IPTPS 2007.
    Jingtao Li.2006.The Research on Trust Model and Replication Scheme in P2P Environments[D].Shanghai:Fudan University.
    K Walsh,E Sirer.2005.Fighting Peer-to-Peer SPAM and Decoys with Object Reputation[C].P2PECON Workshop,Philadelphia,Pennsylvania,USA,August 2005.New York,NY,USA:ACM,2005:138-143.
    K.Hildrum,J.D.Kubiatowicz,S.Rao,B.Y.Zhao.2002.Distributed Object Location in a Dynamic Network[C].Proceedings of 14th ACM Symposium on Parallel Algorithms and Architectures(SPAA).
    K.Walsh and E.G.Siren.2005.Fighting peer-to-peer SPAM and decoys with object reputation[J].Applications,Technologies,Architectures,and Protocols for Computer Communication(2005):138-143.
    K.Walsh and E.G.Siren.2006.Experience with an Object Reputation System for Peer-to-Peer Filesharing[C].Proceedings of the 3rd Symposium on Networked Systems Design and Implementation,San Jose,CA.
    Kim J,Bentley P.2001.Towards an artificial immune system for network intrusion detection:An investigation of clonal selection with a negative selection operator[C].Proceedings of Congress on Evolutionary Computation,Seoul,Korea,2001.27-30.
    Krishna Kant,Ravi Iyer,Vijay Tewari.On the Potential of Peer-to-Peer Computing[EB/OL].http://www-info3.inforrnatik.uni-wuerzburg.de/HTML/vorl_ss_01 /seminar_planung.html.
    Krishnamurthy B and Wang J.2001.Topology modeling via cluster graphs[C].Proceedings of the 1st ACM SIGCOMM Workshop on Internet Measurement(IMW'01),19-23.San Francisco,Califonia,USA:ACM Press.
    Kubiatowicz J,Bindei D,Chen Y,Czerwinski S,Eaton P,Geels D,Gummadi R,Rhea S,Weatherspoon H,Weiner W,Wells C.2000.OceanStore:An Architecture for Global-Scale Persistant Storage[C].Proceedings of the 9th International Conference on Architectural Support for Programming Languages and Operating Systems,190-201.
    Kutzner K,Fuhrmann T.2005.Measuring large overlay networks-The overnet example[C].Proc.of KiVS2005.
    L.Page,S.Brin,R.Motwani and T.Winograd.1998.The pagerank citation ranking:Bringing order to the web[R].Technical report,Stanford Digital Library Technologies Project.
    L.Xiong and L.Liu.2003.A reputation-based trust model for peer-to-peer ecommerce communities[C].IEEE Conference on E-Commerce(CEC'03),Newport Beach,California,USA.
    L.Xiong and L.Liu.2004.Peertrust:Supporting reputation-based trust for peer-to-peer electronic communities[C].IEEE Transactions on Knowledge and Data En 乡 neering,2004(16):843-857.
    L.Zhou,L.Zhang,F.McSherry,N.Immorlica,M.Costa and S.Chien.2005.A First Look at Peer-to-Peer Worms:Threats and Defenses[C].Proceedings of 4th International Workshop on Peer-to-Peer Systems(IPTPS).
    Lab O.2003.Fightaids@home project home page[EB/OL].http://fightaidsathome.stripps.edu.
    Lee U,Choi M,Cho J,et al.2006.Understanding pollution dynamics in P2P file sharing[C].Proc of the 5th International Workshop on Peer-to-Peer Systems.Santa Babara.
    Li Xiao,Yunhao Liu,and Lionel M Ni.2005.Improving Unstructured Peer-to-Peer Systems by Adaptive Connection Establishment[J].IEEE Transactions on Computers(TC),54(9),September 2005,1091-1103.
    Lidong Zhou,Fred B Schneider,Robbert Van Renesse.2002.COCA:A Secure Distributed Online Certification Authority[J].ACM Transactions on Computer Systems,20(4):329-368.
    Liu Y,Liu X,Xiao L,Ni LM,Zhang X.2004.Location-Aware topology matching in P2P systems[C].Proc.of the IEEE INFOCOM 2004,Hong Kong.
    Liu,Y,Gao,B.,Liu,T.-Y,Zhang,Y,Ma,Z.,He,S.,Li,H.2008.Browserank:letting web users vote for page importance[C].Proceedings of the 31st annual international ACM SIGIR conference on Research and development in information retrieval.
    LLC LW.2000.LimeWire website[EB/OL].http://www.limewire.com.
    LLC LW.2002.Rfc-Gnutella 0.6[S].http://rfc-gnutella.sourceforge.net/development.
    LTD SN.2002.KaZaA media desktop[EB/OL].http://www.kazaa.com.
    M.Bouklit and F.Mathieu.2005.BackRank:an alternative for PageRank?[C].Proc.WWW Special interest tracks and posters,1122-1123.
    M.Srivatsa,L.Xiong and L.Liu.2005.TrustGuard:countering vulnerabilities in reputation management for decentralized overlay networks[C].Proceedings of the 14th international conference on World Wide Web,2005:422-431.
    M.Yang,Z.Zhang,X.Li and Y.Dai.2005.An Empirical Study of Free-Riding Behavior in the Maze P2P File-Sharing System[C].IPTPS'05.
    M.Yang.2006.Research on Incentive and Reputation Mechanism in Peer-to-Peer File Sharing System Maze[D].Doctoral thesis,Peking University.
    M.Zhou,Y.Dai and X.Li.2006.A Measurement Study of the Structured Overlay Network in P2P File-Sharing Applications[C].IEEE International Symposium on Multimedia 2006.
    Michal Feldman,Kevin Lai,Ion Stoica,and John Chuang.2004.Robust Incentive Techniques For Peer-to-Peer Networks[C].Proc of the 5th ACM conference on Electronic commerce,New York,NY,USA,2004.ACM Press,102-111.
    Milojicic DS,Kalogeraki V and Lukose RM.2002.Peer-to-Peer computing[R].Technical report,Hewlett-Packard Company.
    Miniwatts Marketing Group.2009.WORLD INTERNET USAGE AND POPULATION STATISTICS[EB/OL].[2009-2-28].http://www.internetworldstats.com/stats.htm.
    Mor Harchol-alter,TOM Leighton,Daniel Lewin.1999.Resource Discovery in Distributed Networks[C].18th Annual ACM-SIGACT/SIGONS Symposium on Principles of Distributed Computing Atlanta,May 1999:229-238.
    Morpheus.2000.Morpheus file sharing network[EB/OL].http://www.musiccity.com.
    Moy.J.1998.OSPF Version 2,RFC 2328[S].Internet Society:Network Working Group.
    Mui,L.2003.Computaional Models of Trust and Reputaion:agents,Evolutionary Games,and Social Networks[D].Ph.D.Thesis MIT,2003.
    Mui,L.,Mohtashemi,M.,Halberstadt,A..2002.A Computational Model of Trust and Reputation[C].Proc.of the 35th Hawaii International Conference on System Sciences,Big Island,Hawaii,IEEE 2002.
    N Curtis,R Safavi-Naini,W Susilo.2004.X2Rep:Enhanced Trust Semantics for the XRep Protocol[C].Applied Cryptography and Network Security,Yellow Mountain,China,June 2004.London,UK:Springer-Verlag,2004:205-219.
    N.Christin,A.S.Weigend and J.Chuang.2005.Content availability,pollution and poisoning in file sharing peer-to-peer networks[C].Proceedings of the 6th ACM conference on Electronic Commerce,2005:68-77.
    Nadia Busi,Cristian Manfredini,Alberto Montresor,and Gianluigi Zavattaro.2002.Towards Adaptive,Resilient and Self-Organizing Peer-to-Peer Systems[C].A Workshop co-located with NETWORKING'02.CNR Research Area,Pisa,Italy.
    Nadia Busi,Cristian Manfredini,Alberto Montresor,Gianluigi Zavattaro.2002.Towards a Data-driven Coordination Infrastructure for Peer-to-Peer Systems[C].Proceedings of Workshop on Peer-to-Peer Computing Co-located with NETWORKING'02.
    Neil Daswani,Hector Garcia-Molina,Beverly Yang.2003.Open Problems in Data-Sharing Peer-to-Peer Systems[C].Proceedings of the 9th International Conference on Database Theory,January 08-10,2003.London,UK:Springer-Verlag,2003:1-15.
    O.E.Williamson,Calculativeness.1993.Trust,and Economic Organization[J].Journal of Law and Economics,36(1993):453-486.
    O-Hoon Kwon,So Young Lee,Jong Kim.2007.FileTrust:Reputation management for reliable resource sharing in structured peer-to-peer networks[J].IEEE Transactions On Communications,E90B(4):826-835.
    Overpeer.2006.http://www.overpeer.com[EB/OL].
    P.Resnick and R.Zeckhauser.2002.Trust Among Strangers in Internet Transactions:Empirical Analysis of eBay' s Reputation System[J].The Economics of the Internet and E-Commerce,2002(11):127-157.
    P.Resnick,K.Kuwabara,R.Zeckhauser and E.Friedman.2000.Reputation systems[J].Communications of the ACM,2000(43):45-48.
    P.Resnick,R.Zeckhauser.2001.Trust Among Strangers in Internet Transactions:Empirical Analysis of eBay's Reputation Systems[R].Working Paper for the NBER workshop on empirical studies of electronic commerce,Jan 2001.
    Padmanabhan VN and Subramanian L.2001.An investigation of geographic mapping techniques for internet hosts[C].Proceedings of the ACM SIGCOMM 2001 Conference on
    Applications,Technologies,Architectures,and Protocols for Computer Communications,173-185.San diego,CA,USA.
    Pandurangan G,Raghavan P and Upfal E.2001.Building P2P networks with good topological properties[R].Technical Report,Brown University.
    Pandurangan G,Raghavan P and Upfal E.2003.Building low-diameter P2P networks[J].IEEE Journal on Selected Areas in Communications,21(1):995-1002.
    Peer-To-Peer technology company P.2001.FastTrack[EB/OL].http://www.fasttrack.nu.
    Petar Maymounkov and David Mazieres.2002.Kademlia:A Peer-to-Peer Information System Based on the XOR Metric[C].IPTPS'02.
    Plissonneau L,Costeux JL,Brown P.2005.Analysis of Peer-to-Peer Traffic on ADSL[C].Dovrolis C,ed.Proc.of PAM 2005,LNCS 3431,Heidelberg:Springer-Verlag,69-82.
    Q.Feng and Y.Dai.2006.LIP:A Lifetime and Popularity Based Ranking Approach to Filter out Fake Files in P2P File Sharing Systems[J].Peking University.
    Q.Lian,Y.Peng,M.Yang,Z.Zhang,Y.Dai and X.Li.2006.Robust Incentives via Multi-level Tit-for-tat[C].Proceedings of 5th IPTPS.
    R Khare and A.Rifkin.1997.Weaving a web of trust[J].World Wide Web,2(3):77-112,1997.
    R.Guha,R.Kumar,P.Raghavan and A.Tomkins.2004.Propagation of trust and distrust[C].Proceedings of the 13th conference on World Wide Web,2004:403-412.
    R.Yahalom,B.Klein,and Th.Beth.1993.Trust relationships in secure systems-a distributed authentication perspective[C].Proceedings of the 1993 IEEE symp,On Research in Security and Privacy,1993,150-164.
    R.Bayya,et al.2001.Economic Models for Management of Resources in P2P Environments[C].SPIE International Conference on Commercial Applications for High-Performance Computing.Denver,USA,Computational Economics Press,1-12.
    Ramanathan MK,Kalogeraki V and Pruyne J.2002.Finding good peers in peer-to-peer networks[C].Proceedings of the 16th International Parallel and Distributed Processing Symposium(IPDPS'02),232-239.Fort Lauderdal,FL,USA:IEEE Computer Society.
    Ratnasamy S,Francis P,Handley M,Karp R and Shenker S.2001.A Scalable Content-Addressable Network[C].Proceedings of the ACM SIGCOMM 2001 Conference on Applications,Technologies,Architectures,and Protocols for Computer Communication.San Diego,CA,USA:ACM Press,161-172.
    Rowstron A and Druschel P.2001.Pastry:Scalable,decentralized object location and routing for Iargescale peer-to-peer systems[C].Proceedings of the IFTP/ACM International Conference on Distributed Systems Platforms(Middleware'01).Heidelberg,Germany:Springer-Verlag,329-350.
    Rowstron,A.and Druschel,P.2001.Storage management and caching in PAST,a large-scale,persistent peer-to-peer storage utility[C].Proceedings of the 18th ACM Symposium on Operating Systems Principles.
    Runfang Zhou,Kai Hwang.2007.PowerTrust:A robust and scalable reputation system for trusted Peer-to-Peer computing[J].IEEE Transactions On Parallel And Distributed Systems,18(4):460-473.
    S Joseph.2003.NeuroGrid[EB/OL].(November 2003)[October 2006].http://www.neurogrid.net.
    S Kamvar.2002.EigenRep:reputation management in P2P networks[R].Technical Report:SCCM-02-16,Stanford University.
    S.D.Kamvar,M.T.Schlosser and H.Garcia-Molina.2003.The Eigentrust algorithm for reputation management in P2P networks[C].Proceedings of the twelfth international conference on World Wide Web,2003:640-651.
    S.Marti and H.Garcia-Molina.2006.Taxonomy of trust:Categorizing P2P reputation systems[J].Computer Networks,2006(50):472-484.
    S.Rathasamy,P.Francis,M.Handley,R.KaSP and S.Shenker.2001.A Scalable Content-Addressable Network[C].Proceedings of ACM SIGCOMM.San Diego,149-160.
    S.S.Lee and R.B.Bhattacharjee.2003.Cooperative peer groups in NICE[C].INFOCOM 2003.Twenty-Second Annual Joint Conference of the IEEE Computer and Communications Societies.IEEE,2003(2).
    S.Song,K.Hwang,R.Zhou and Y.K.Kwok.2005.Trusted P2P transactions with fuzzy reputation aggregation[J].Internet Computing,IEEE,2005(9):24-34.
    S.Waterhouse,D.M.Doolin,G.Kan,Y.Faybishenko.2002.Distributed Search in Peer-to-Peer Networks[C].IEEE INTERNET COMPUTING.
    S.Edidenbenz,et al.2003.Equilibria in topology control games for ad hoc networks[C].Proceedings of the 2003 joint workshop on Foundations of mobil computing.ACM Press,San Diego,CA.
    S.Wasserman.1994.Social network analysis:methods and applications[M].Cambridge University Press.
    Saroiu,S.,Gummadi,P.K.,and Gribble.2002.A Measurement Study of Peer-to-Peer File Sharing Systems[C].Proceedings of Multimedia Computing Networking(MMCN),San Jose,CA,Jan.2002.
    Schollmeier R.2001.A definition of peer-to-peer networking for the classification of peer-to-peer architectures and applications[C].Proceedings of the 1st International Conference on Peer-to-Peer Computing(P2P'01).Linkoping,Sweden:IEEE Computer Society.101-102.
    Sen S and Wang J.2002.Analyzing peer-to-peer traffic across large networks[C].Proc.of the second ACM SIGCOMM Workshop on Internet measurement workshop.
    Shirk C.2001.What is P2P and what isn't 2001[EB/OL].http://www.openp2p.com/pub/a/p2p/2000/11/24/shirkyl-whatisp2p.html
    Society TP.1999.Seti@home project home page[EB/OL].http://setiathome.ssl.berkeley.edu.
    Sripanidkulchai K,Maggs B and Zhang H.2003.Efficient content location using interest-based locality in peer-to-peer systems[C].Proceedings of the Conference on Computer Communications(IEEE INFOCOM'03),volume 22,2166-2176.San Franciso,CA,USA.
    Stoica I,Morris R,Liben-Nowell D,Karger D R,KaashoeK MF,Dabek F and Balakrishnan H.2003.Chord:A scalable peer-to-peer lookup protocol for internet applications[J].IEEE/ACM Transactions on Networking,11(1):17-32.
    Stoica Ion,Morris R,Karger D,et al.2001.Chord:A Scalable Peer-to-peer Lookup Service for Internet Applications[C].Proceeding of ACM SIGCOMM 2001.San Diego,California,USA.
    Suel T,Mathur C,Wu J,Zhang J,Delis A,Kharrazi M,Long X and Shanmugasunderam K.2003.ODISSEA:A peer-to-peer architecture for scalable web search and information retrieval[C].Proceedings of the International Workshop on Web and Databases(WebDB'03).San Jose,California,67-72.
    Sylvia Ratnasamy,Scott Shenker,Ion Stoica.2002.Routing Algorithms for DHTs:Some Open Questions[C].Proceedings for the 1st International Workshop on Peer-to-Peer Systems(IPTPS'02).Cambridge,MA,USA.
    T.Grandison and M.Sloman.2000.A Survey of Trust in Internet Applications[J].IEEE Communications Surveys and Tutorials,2000(3):2-16.
    Thommes R,Coates M.2006.Epidemiological modeling of peer-to-peer viruses and pollution[C].Proc of INFO-COM'06.Barcelona,Spain,2006:1-12.
    Tian Hui-Rong,Zou Shi-Hong,Incentive Compatible Adaptive Topologies for P2P Networks.Journal of Software,2006,17(4):845-853.
    Timmis J,Neal M.2001.A resource limited artificial immune system for data analysis[J].Knowledge Based Systems,2001,14(3-4):121-130.
    Tyson Condie,Sepandar D.Kamvar,Hector Garcia-Molina.Adaptive Peer-To-Peer Topologies.Proceedings of the Fourth International Conference on Peer-to-Peer Computing(P2P'04).2004 IEEE.
    University S.2000.Folding@home project home page[EB/OL].http://folding.stanford.edu.
    VBS.Gnutella.Worm.2002.http://securityresponse.symantec.tom/avcenter/vent/data/vbs.gnutella.html[EB/OL].
    Wang.Y.,Vassileva.J..2003.Bayesian Network Trust Model in Peer-to-Peer Networks[C].Proceedings of Second International Workshop Peers and Peer-to-Peer Computing,July 14,Melbourne,Australia.
    Waterhouse S.2001.JXTASearch:Distributed search fordistributed networks[R].Technical report,Sun Microsystems Inc.
    Wolf J,Aggarwal C,Wu K-L,Yu P.1999.Horting hatches an egg:A new graph-theoretic approach to collaborative filtering[C].Proceedings of the ACM SIGMOD International Conference on Knowledge Discovery and Data Mining,San Diego,CA,USA,1999.New York, NY,USA:ACM,1999:201-212.
    Wouhaybi RH and Campbell AT.2004.Phenix:Supporting resilient low-diameter peer-to-peer topologies[C].Proceedings of the Conference on Computer Communications(IEEE INFOCOM'04),volume 23,108-119.Hong Kong,China.
    X Zhang,J Liu,B Li,TSP Yum.2005.CoolStreaming/DONet:A data-driven overlay network for efficient live media streaming[C].Proceedings of IEEE INFOCOM.
    XiaoYu Wang,Wee Siong Ng,Beng Chin Ooi,Kian Lee Tan and AoYing Zhou.BuddyWeb:A P2P-based Collaborative Web Caching System[C].Peer to Peer Computing Workshop.
    Y.Wang,J.Vassileva.2003.Bayesian Network-Based Trust Model[C].Proc.Of IEEE/WIC International Conference on Web Intelligence.October 13-17,Halifax,Canada(WI'2003):372-378.
    Yao Wang,Julita Vassileva.2003.Trust and Reputation Model in Peer-to-Peer Networks[C].Third International Conference on Peer-to-Peer Computing(P2P'03).
    Yunhao Liu,Zhenyun Zhung,Li Xiao and Lionel M.Ni.2004.A Distributed Approach to Solving Overlay Mismatching Problem[C].Proc.of the 24th International Conference on Distributed Computing Systems(ICDCS).
    Z.Liang and W.Shi.2005.PET:A Personalized Trust Model with Reputation and Risk Evaluation for P2P Resource Sharing,System Sciences[C].Proceedings of the 38th Annual Hawaii International Conference on HICSS'05,(2005):201b-201b.
    Zhang YF,Lei LH,Chen CJ.2004.Characterizing peer-to-peer traffic across Internet[C].Li M et al.eds.Proc.of GCC 2003,LNCS 3032,Heidelberg:Springer-Verlag,388-395.
    Zhao B,Kubiatowocz J and Joseph A.2001.Tapestry:An infrastructure for fault-tolerant wide-area location and routing[R].Technical Report UCB/CSD-01-1141,Computer Science Division,U.C.Berkeley.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700