对等网络信任模型的研究
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
随着网络技术的飞速发展,用户端系统资源的丰富以及网络带宽的快速增加,传统的Client/Server网络应用模式中服务器的性能瓶颈以及单点失效的问题不仅限制了用户端资源的充分利用,同时越来越无法满足新的分布式应用的需求。而Peer-to-Peer(P2P)网络在协同工作、分布式信息共享、大规模并行计算等方面显示出独特优势,使其成为新的发展热点。
     虽然目前的P2P网络比传统的C/S有着诸多的优势,但其分布式的网络结构和非集中化管理的网络模式,也给网络带来了许多问题。如对整个网络的管理、监控都非常困难,许多P2P应用程序都对其对等设备只有微弱的控制能力,很容易导致整个网络陷入混乱无序的状态。并且因P2P网络高度的自治性和动态性也导致了许多安全策略方面的问题。显著的表现为应用中大量欺骗行为的存在以及不可靠的服务质量,网络的可用性差。在现实中人们很容易信任eBay这样的大型网站是安全的,而在P2P网络中共享的资源都是由网络的另一端某个素不相识的节点自愿提供的,且节点都是以自由和匿名的方式登陆,系统很难知道加入的节点是否是恶意节点,是否被攻击者控制等,因此建立一个有效的信任系统来管理网络是必要的。
     关于P2P信任模型的研究始于上世纪90年代后期,但由于已提出的信任模型结构复杂,对用户行为的要求也相对严格,其算法在对等网络里难以实现。基本上都停留在理论研究阶段,并不能推广到对等网络中去应用。本文将建立一种基于幂律的信任模型,这个模型利用了节点过去在网络中的历史经验,建立了两个节点之间的信任关系,更加有效的去解决网络中信任关系,而其算法比较简洁,比一些具有复杂算法的信任模型更适合在现实网络中的应用。该模型能够增强网络可用性,具有结构简单、可靠性强的优点。随后研究了如何在对等网络中建立信任系统,讨论了建立信任系统要考虑哪些问题以及具体的实现过程。
With the developing technology of network, enriching resource of consumer node system and increasing bandwidth of network, the problems brought by servers' function obstacle and nodes' losing efficiency in traditional Client/Server model not only restrict us to make the best of consumer node's resource but also cannot meet the need of distributed pattern. And the advantage shown at the collaboration, distributed information communion, large-scale parallel computing in Peer-to-Peer (P2P) network is so particular that it becomes a developmental hot point.
    Although there is a lot of advantage in P2P network compared with traditional C/S network, its distributed structure and nonconcentrated management also bring some questions to itself. Such as it is difficult to administer or control the whole network, and many application procedures have faint ability to dominate P2P equipments, it is easily to plunge the net into disordered state. At the same time, the problems of some security strategies are resulted in the altitude autonomous rule and dynamic manner of P2P. Especially, there are lots of cheating behaviors, unreliable quality of service and low usability of network. We usually believe that large-scale website, as eBay, is safe in practice, but in the P2P network, things are not like that. The shareable resource is provided by a complete unknown node which land the network freely and anonymously in the P2P, so it is hard to know the node is vicious or not, whether to be controlled, and therefore it is necessarily to make a reputation system to manage the P2P network.
    The research of reputation model began at last century 90s. The algorithm is hard to realize in the P2P because of complicated model in reputation system and strict demand for free consumers, and the study is rested on theory and cannot be spread. The thesis has set up a reputation model system based on power-law. This model makes fully use of the past experience of node itself and builds reputation relation between two interactional nodes, so it is effectively to solve the problem of lack trust in P2P network. Furthermore, this algorithm is compactly and more useful when apply it in real network, and this model can enhance P2P's usability and make it more sampler and trustable. Follow then, how to build the reputation system in P2P network is studied, and we also discuss the problem that we meet and explain the process of building the reputation system.
引文
[1] Todd Sundsted.对等网络中的信任和安全性.http://www.ppcn.net/n69c2.aspx,2003-04-16.
    [2] 熊俊.电信公司从P2P文件共享中获益.http://www.ppcn.net/n13c6.aspx,2003-02-22.
    [3] Dejan S. Milojicic, Vana Kalogeraki.Peer-to-Peer Computing[R].HP:Laboratories Palo Alto,2002:57.
    [4] Androutsellis-Theotokis S,Spinellis D.A survey of peer-to-peer content distribution technologies[J].ACM Computing Surveys,2004,36(4):335-371.
    [5] W Hoschek. A Unified Peer-to-Peer Database Framework for XQueries over Dynamic Distributed Content and its Application for Scalable Service Discovery[D]. Vienna:Technical University of Vienna 2002:3.
    [6] L.Lamport,R.Shostak,and M.Pease.The byzantine generals problem[J]. On Program Language and Systems,1982,4(3):382-401.
    [7] Dapeng Wu,et al.Streaming Video over the Interact:Approaches and Directions[J].IEEE Transactions on Circuits and Systems for Video Technology,2001,11(3):282-300.
    [8] M.Michael.Space Science Studies Come to the Internet[J].Aviation Week & Space Technology. 1998,12(6):59-66.
    [9] Washington, D.C. The O'Reilly Peer-to-Peer and Web Services Conference http://conferences.oreillynet.com/cs/p2pweb2001/view/e_sess/2021, November 5-8, 2001.
    [10] M. Panti, L.Penserini. A P2P Approach to Land Warriors Coordination[J].Kluwer Academic Press,2003,9(1): 109-117.
    [11] 高岭,刘红等译.Java P2P技术内幕[M].北京:人民邮电出版社,2003.
    [12] 苏忠,战晓雷等译.对等网[M].北京:清华大学出版社,2003.
    [13] 李静,常晓波译.Java P2P程序设计[M].北京:中国电力出版社,2003.
    [14] 许斌著.JXTA—Java P2P网络编程技术[M].北京:清华大学出版社,2003.
    [15] 易倍思工作室编著.无所不共享:P2P网络共享完全手册——无所不丛书[M].上海:上海科学技术出版社,2005.
    [16] 程学旗,余智华,陆天波,吕建明.P2P技术与信息安全.中国科学院计算技术研究所信息技术快报[N].2004.3.
    [17] 万淑超,金蓓弘,黄宇.P2P平台的关键技术[J].计算机科学,2005,32(6):21-24.
    [18] 徐恪,熊勇强,吴建平.对等网络研究综述.国家自然科学基金重点项目(编号:90104002和60203025),2002.
    [19] ZHOU X, BRESSAN S, TAN K-L. Efficient Distributed Reputation Scheme for Peer-to-peer systems[C]. HIS 2003, LNCS 2713. Berlin Heidelberg: Springer-Verlag, 2003,54-63.
    [20] Resnickand P, Zeckhauserand R, Friedman E, et al. Reputation systems[J].Communications of the ACM, 2000,43(12):45-48.
    [21] 叶哲丽,何秀强,王寅峰.基于P2P技术的资源发现机制的研究[J].计算机工程与应用,2005, 21(1):152-155.
    [22] 熊江,胡仲华.P2P技术及应用[J].重庆三峡学院学报,2003,15(3):12-16.
    [23] 李祖鹏、黄道颖、黄建华.基于P2P应用的JXTA shell[J].郑州轻工业学院学报(自然科学版),2003,4:61-63.
    [24] Ron Hipschman.SETI.射电搜索[N].三思科学,2002-9-1(9).
    [25] 谢东亮 程时端 阙喜戎.对等网络(P2P)的研究与进展 改变因特网的技术.http://www.ppcn.net/n2276c38.aspx,2005-05-23.
    [26] Matrix.JXTA概念介绍.http://www.javazy.com/contentex/200645115827.shtml,2006-04-05.
    [27] Bobway,gonzo,jamoore.Distributed search service for JXTA and Web content and services.http://search.jxta.org/.
    [28] 邓泓,周莉,周定康.Gnutella网络中树结构搜索机制的研究[J].江西师范大学学报(自然科学版),2006,30(3):282-284.
    [29] 张茉莉,高艳平,张晓玲.Freenet系统面临的挑战[J].电脑知识与技术(学术交流),2006,7:112-113.
    [30] John Kubiatowicz,David Bindel,Yan Chen et al.OceanStore:An architecture for global-scale persistent storage[C].Proceedings of ACM ASPLOS,2000-11.
    [31] 乐光学,李仁发,赵嫦花等.P2P计算技术的研究与应用[J].计算机工程与应用,2004,36(5):163-167.
    [32] 郑纬民,胡进锋.P2P系统发展历史及应用[N].中国教育网,2005-7.
    [33] Siu Man Lui, Sai Ho Kwok. Interoperablility of Peer-To-Peer File Sharing Protocols[J]. ACM SIGecom Exchanges, 2002, 2(2): 89-95.
    [34] Stoica I, Morris R, Karger D. Chord: a scalable peerto-peer lookup service for interact applications [C]. Proceeding of ACM SIGCOMM 2001. New York:ACM Press,2001:149-160.
    [35] Ratnasamy S, Francis P, Handley M. A scalable content-addressable network [C]. Proceedings of ACM SIGCOMM2001, New York: ACM Press, 2001: 161-172.
    [36] Rowston Antony, Druschel Peter. Pastry: scalable, decentralized object location and routing for large scale peer-to-peer systems [R]. Cambridge: Microsoft Research Ltd, 2001:10.
    [37] Zhao Ben Y, Kubiatowicz John. Tapestry: an infrastructure for fault-tolerant wide-area location and routing[R]. Computer Science Division University of California, UCB/CSD-01-1141, 2001.
    [38] 王海军,窦唯.创建P2P服务和应用的JXTA平台及其关键技术[J].连云港职业技术学院学报,2002,15(4):19-21.
    [39] 陈宇,唐旭章.基于P2P系统的JXTA技术探析[J].计算机工程,2002,28(10):18-19.
    [40] Rousseau, D M, Sitkin, S B, Burr, R S, and Camerer, C. Not so different after all: Across-discipline view of trus[J].Academy of ManagementReview, 1998,23 (3):393-404.
    [41] 邓国链.第三方保证标章对网路消费者行为意图之影响[D].台湾:国立中央大学,2004.
    [42] 魏镜伦.文化与信任影响网路购物意图之研究—以两岸网路使用者为例[D].台湾:国立中央大 学,2003.
    [43] Mayer, R C, Davis, J H, and Schoorman, F D. An integration model of organizational trust[J]. Academy of Management Review, 1995,20(3):709-734.
    [44] 周瑞辉,冯登国.PKI系统的常用信任模型[J].计算机世界报,2000,35(9):7-9.
    [45] Naftaly H Minsky and Victoria Ungureanu. Law-governed interaction: A coordination and control mechanism for heterogeneous distributed systems[J]. ACM Transactions on Software Engineering and Methodology, 2000-7,9(3): 273-305.
    [46] R. Chen and W. Yeager. Poblano: A distributed trust model for peer-to-peer networks[J]. Journal of Software, 2004,15(4):571-583.
    [47] Marsh S.Formalising trust as a computational concept[D]. UK:University of Siirling,1994.
    [48] Blaze M, Feigenbaum J, Ioannidis J et al. The role of trust management in distributed systems security[R]. In: Secure Internet Programming: Issues for Mobile and Distributed Objects. Berlin: Springer-Verlag, 1999,185-210.
    [49] Abdul-Rahman A, Hailes S. A distributed trust model. In: Proceedings of the 1997 New Security Paradigms Workshop. Cumbria, UK: ACM Press,1998, 48-60.
    [50] 肖亮,胡和平,倪小剑.对等网络应用程序的开发平台—JXTA[J].计算机与数字工程,2003,31(4):61-63.
    [51] Sepandar D Kamvar, Mario T Schlosser, Hector Garcia-Molina.The eigentrust algorithm for reputation management in p2p networks [C]. In Proceedings of the Twelfth International Word Wide Web Conference, Budapest, Hungary, 2003.
    [52] Xiong Li, Liu Ling. A reputation-based trust model for peer-to-peer e-commerce communities[C]. Proceedings of the IEEE International Conference on E-Commerce, Newport Beach: Computer Society, 2003, 275-284.
    [53] 窦文,王怀民,贾焰等。构造基于推荐的Peer-to-Peer环境下的trust模型[J].软件学报,2004,15(4):571-583.
    [54] Huu Tran, Michael Hitchens. A Trust based Access Control Framework for P2P File-Sharing Systems[R]. Hawaii International Conference on System Sciences (HICSS-38), Honolulu HI, USA, 2001.
    [55] R Guha, R Kumar, P Raghavan.A Tornkins. Propagation of Trust and Distrust[R]. In Proceedings of the Thirteenth International World Wide Web Conference, ACM, New York, New York, 2004.
    [56] Nefti S. A Fuzzy Trust Model for E-Commerce[J]. Proceedings of the Seventh IEEE International Conference on E-Commerce Technology, 2005-7,19(22):401-404.
    [57] Lei H. A distributed trust model for e-commerce applications[J], e-Commerce and e-Service, 2005-4,29(1):290-293.
    [58] TANG Wen, CHEN Zhong. Research of subjective trust management model based on the fuzzy set theory[J].Chinese Journal of Software,2003,14(8):1401-1408.
    [59] 田惠蓉.P2P网络信任模型及激励机制的研究.[博士学位论文][D].北京:北京邮电大学,2006.
    [60] Farag A. Azzedin. Trust modeling and its applications for peer-to-peer based systems[D]. University of Manitoba, 2004.
    [61] 李向前,宋昆.高可信网络信任度评估模型的研究与发展[J].山东农业大学学报,2006,37(2):243-247.
    [62] 张书钦,杨永田.对等系统中信任管理模型的设计[J].哈尔滨工程大学学报,2005,26(4):522-525.
    [63] 赵恒,权义宁,胡予濮.对等网环境下一种安全有效的信誉体制[J].计算机应用,2005,25(3):552-554.
    [64] Kamvar SD, Schlosser MT. EigenRep: Reputation management in P2P networks[R]. In: Lawrence S, ed. Proc. of the 12th Int'l World Wide Web Conf. Budapest: ACM Press, 2003:123-134.
    [65] Zoran Despotovic,Karl Aberer. Probabilistic prediction of peers' performance in P2P network[J]. Engineering Applications of Artificial Intelligence, 2005,18(7)10:771-780.
    [66] 徐锋,吕建.Web安全中的信任管理研究与进展[J].软件学报,2002,15(13):2057-2064.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700