基于加权紧密度的信任模型研究
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
分布式网络在信息交换、资源共享、协同工作和并行处理等方面显示出的优势,使其迅速成为网络发展的方向。分布式网络具有开放性、动态性、自治性等特性,相对于传统的C/S网络应用模式,分布式网络更注重节点之间的协作。在分布式网络平台的支持下,像普适计算、网格计算、P2P计算、Ad Hoc网络、P2P电子商务、电子政务等大规模分布式系统被广泛应用。分布式网络的广泛应用极大提高了网络的应用范围和活力,同时也对网络管理,特别是对安全管理方面提出了新的要求。分布式网络的性能始终无法达到理论上的最佳状态,其中一个主要原因是节点之间缺乏信任。
     传统的安全技术已经不能很好的解决分布式系统中出现的安全威胁。信任机制是解决这些问题的有效手段,为保证分布式环境的安全提供了新的思路和方法,已经成为当前的一个研究热点。信任模型是信任机制的基础,由于信任本身的复杂性,构建高效、高精度的信任模型仍然是一个具有挑战性也非常有意义的课题。
     目前,很多学者采用不同的理论和方法对信任相关理论和技术进行了卓有成效的研究,提出了很多的信任模型。分析现有的信任模型,虽然在信任量化方面做了大量的工作,但是对信任关系的研究还远远不够。本文对信任模型的理论及其关键技术进行了研究,针对目前信任度量中信任的合并问题研究不足的现状,提出一种基于加权紧密度的信任模型,旨在为分布式网络安全和信任机制提供支撑。针对当前信任网络构建合理性问题,给出了一种基于信任源的网络构建方法,并提出用邻接表的方式存储信任相关信息,这种网络构建和存储方法为信任的搜索奠定基础。然后给出了信任搜索和选择规则,以降低信任搜索和选择的时间复杂度。利用加权紧密度实现信任路径的合并,充分考虑了网络中的信任路径和节点间的直接信任和推荐信任,使信任值更加真实的反映实体的客观可信性。同时给出了抑制节点恶意推荐的策略,讨论了信任的时间衰减。最后通过仿真实验证明了模型的有效性。
Due to the advantages at the information exchange, resources sharing, collaborative work and parallel processing, the distributed network has rapidly become the direction of network developing. The distributed network is characterized by its openness, dynamic property and autonomy. Compared with the traditional C/S network application mode, the distributed network pays more attention to the collaboration between nodes. In support of distributed network platform, such as pervasive computing, grid computing, P2P computing, Ad Hoc networks, P2P e-commerce, e-government and other large-scale distributed systems are widely used. The wide application of the distributed network greatly improves the application range and vitality. And at the same time, it puts forward new requirements on network management and security management in particular. Distributed network performance has never been able to achieve the theoretically best state. One of the main reasons is the lack of trust between the nodes.
     Traditional security technology has not been a good solution to the security threats arose from a distributed system. Trust mechanism is an effective way to address these issues. It provides new thinking and methods to ensure the security of distributed environments and has become a current research hotspot. Trust model is the basis of trust mechanism. Due to the complexity of the trust itself, building efficient, high-precision trust model is still a challenging and very significant issue.
     At present, by using different theories and methods, many scholars has carried out fruitful research on the theory and technology of trust and a lot of trust model has been proposed. By analyzing the existing trust model, we can see that although a lot work has been done on the trust quantification, the research on trust is far from enough. The research on the theoretical and key technology of the trust model is carried out in this thesis. Aiming at the current situation that the research on the trust combination in trust measure is not enough, a trust model based on weighted closeness is proposed, in order to support the distributed network security and trust mechanisms. For the current rationality problem of trust network construction, a trust source network construction method based on trust source is given. The adjacency list is used to store the trust information, this kind of network building and storing method lays the foundation for the trust search. The trust search and selection rules are given to reduce the time complexity. The weighted closeness is used in the combination of the trust paths. Considering the trust paths and the direct trust and recommendation trust among the nodes in the network, the trust value reflects the entity's objective credibility more truly. The Strategy for inhibiting the malicious recommendation is given and the time decay of trust is discussed. The simulation results show validity of the model.
引文
[1] D.Dumitriu, E Knightly, A Kuzmanovic, et al. Denial-of-service resilience in peer-to-peer file sharing systems. In ACM SIGMETRICS, Banff, Canada, 2005, 38-49.
    [2] R. Bentley, W. Appelt, U. Busbach, et al. Basic support for cooperative work on the World Wide Web. In: International Journal of Human Computer Studies: Special issue on Novel Applications of the World Wide Web, 1997, 827-846.
    [3] M.Blaze, J.Feigenbaum and J.Lacy. Decentralized trust management. In: Dale J, Dinolt G., eds. Proceedings of the 17th Symposium on Security and Privacy. Oakland, CA: IEEE Computer Society Press, 1996, 164-173.
    [4] M.Blaze, J.Feigenbaum and M.Strauss. Compliance Checking in the Policy Maker Trust Management System. In: Hirschfeld, R., ed. Proceedings of the Financial Cryptography’98. Lecture Notes in Computer Science 1465, Berlin: Springer-Verlag, 1998, 254-274.
    [5] M.Blaze, J.Feigenbaum, J.Ioannidis, et al. The Key Note trust management system version 2. Internet RFC 2704, 1999.
    [6] M.Blaze, J.Loannidis and A.Keromytis. Offline Micropayments without Trusted Hardware. In: Syverson, F. ed. Financial Cryptography 2001. Lecture Notes in Computer Science 2339, Berlin: Springer Verlag, 2002.
    [7] M.Blaze, J.Feigenbaum and A.Keromytis. Trust Management for public-key infrastructures. In Proceedings of Cambridge 1998 Security Protocols International Workshop, Berlin, 1999, 59-63.
    [8] Li Xiong and Ling Liu. PeerTrust: Supporting Reputation-Based Trust for Peer-to-Peer Electronic Communities. IEEE Trans. Knowl. Data Eng. 2004, 16(7): 843-857.
    [9] Abdul-Rahman A and Hailes S. A distributed trust model. Proc of the 1997 Workshop on New Security Paradigms. New York: ACM Press, 1997, 48-60.
    [10] Beth T, Borcherding M and Klein B. Valuation of trust in open networks. Gollmann D. Proc of the 3rd European Symposium on Research in Computer Security. Brighton: Springer-Verlag, 1994, 3-18.
    [11] A.J?sang. A subjective metric of authentication. Quisquater, J. Proc of the 5th European Symposium on Research in Computer Security. London: Springer-Verlag, 1998, 329-444.
    [12] A.J?sang, Ross Hayward and Simon Pope. Trust Network Analysis with Subjective Logic. Twenty-Ninth Australasian Computer Science Conference, Vol. 48, January 2006.
    [13] A.J?sang and Touhid Bhuiyan. Optimal Trust Network Analysis with Subjective Logic. International Conference on Emerging Security Information, Systems and Technologies, August 2008.
    [14] A.J?sang. Conditional Reasoning with Subjective Logic. Multiple-Valued Logic and Soft Computing, 2008.
    [15] Sepandar D.Kamvar and Mario T.Schlosser, Hector Garcia-Molina. EigenRep: Reputation Management in P2P Networks. In Proceedings of the World Wide Web Conference, Budapest,Hungary, ACM. 2003: 123-134.
    [16] Wang Yao and Vassileva J. Bayesian network-based trust model. Proc of the IEEE Computer Society WIC International Conference on Web Intelligence. Washington DC: IEEE Computer Society, 2003: 372-378.
    [17] Guha R, Kumar R, Raghavan P, et al. Propagation of trust and distrust. Proc of the 13th International Conference on World Wide Web. New York: ACM Press, 2004: 17-22.
    [18] K.Aberer and Z.Despotovic. Managing trust in a peer-to-peer information system. In Proceedings of 2001 ACM CIKM International Conference on Information and Knowledge Management, 2001.
    [19] Rodrigo Roman, M. Carmen and Javier Lopez. Featuring Trust and Reputation Management Systems for Constrained Hardware Devices. Proceedings of the 1st International Conference on Autonomic Computing and Communication Systems. Rome (Italy), October, 2007.
    [20] Zhang Lin, Wang Ru-chuan and ZhangYong-ping. A Trust Evaluation Model Based on Fuzzy Set for Grid Environment. Acta Electronica Sinica, 2008, 36(05): 862-868.
    [21] Yan Wang. Role-based Recommendation and Trust Evaluation. In Proceedings of The 9th IEEE International Conference on E-Commerce Technology and The 4th IEEE International Conference on Enterprise Computing, E-Commerce and E-Services(CEC-EEE), 2007.
    [22] Frank Fransen and Sven Lachmund. An Infrastructure for Gaining Trust in Context Information. 1-4244-0423-1/106 IEEE, 2006.
    [23] Partha Pal, Franklin Webber, Michael Atighetchi and Nate Combs. Trust Assessment from Observed Behavior: Toward and Essential Service for Trusted Network Computing. The 5th IEEE International Symposium on Network Computing and Applications (IEEE NCA06), Cambridge, MA, July 24-26, 2006.
    [24]黄辰林.动态信任关系建模和管理技术研究.博士学位论文.国防科学技术大学, 2005.
    [25]常俊胜,王怀民,尹刚. DyTrust:一种P2P系统中基于时间帧的动态信任模型.计算机学报. 2007, 29(08): 1301-1307.
    [26]田立勤,林闯,杨扬.分布式网络环境下实体行为信任的评估方法.计算机工程与应用, 2008, 44(17): 1-5.
    [27]唐文,陈钟.基于模糊集合理论的主观信任管理模型研究.软件学报, 2003, 14(08): 1401-1408.
    [28]沈昌祥,张焕国,冯登国,等.信息安全综述.中国科学, 2007, 37(02): 129-150.
    [29]窦文,王怀民,贾焰,等.构造基于推荐的Peer-to-Peer环境下的Trust模型.软件学报, 2004, 15(04): 571-583.
    [30]李建欣,怀进鹏,李先贤,等. DTM:一种面向网络计算的动态信任管理模型.计算机学报, 2009, 32(03): 493-505.
    [31]李小勇,桂小林.可信网络中基于多维决策属性的信任量化模型.计算机学报, 2009, 32(03): 405-416.
    [32]李小勇,桂小林,毛倩,等.基于行为监控的自适应动态信任度测模型.计算机学报, 2009,32(04): 664-674.
    [33]田春岐,邹仕洪,王文东,等.面向P2P网络应用的基于声誉的trust管理模型.通信学报, 2008, 29(04): 63-70.
    [34]田春岐. P2P网络信任模型的研究.博士学位论文,北京邮电大学. 2007.
    [35]翟征德,冯登国,徐震.细粒度的基于信任度的可控委托授权模型.软件学报, 2007, 18 (08): 2002-2015.
    [36]刘伟,蔡嘉勇,贺也平.一种基于信任度的自组安全互操作方法.软件学报, 2007, 18(08): 1958-1967.
    [37]胡建理,吴泉源,周斌,等.一种基于反馈可信度的分布式P2P信任模型.软件学报, 2009, 20(10): 2885-2898.
    [38]金瑜,古志民,顾进广,等.一种对等网中基于相互信任的两层信任模型.软件学报, 2009, 20(07): 1909-1920.
    [39]李景涛,荆一楠,肖晓春,等.基于相似度加权推荐的P2P环境下的信任模型.软件学报, 2007, 18(01): 157-166.
    [40]李建欣,怀进鹏,李先贤.自动信任协商研究.软件学报, 2006, 17(01): 124-133.
    [41]廖振松,金海,李赤松,等.自动信任协商及其发展趋势.软件学报, 2006, 9(17): 1933-1948.
    [42]雷建云,崔国华,章丽平,等.可计算的基于信任的授权委托模型.计算机科学, 2008, 35(10): 73-76.
    [43]孙宇龙. P2P网络信任模型的研究.硕士学位论文,哈尔滨工业大学. 2009.
    [44]王伟,曾国荪.一种基于Bayes信任模型的可信动态级调度算法.中国科学, 2007, 37(2): 285-296.
    [45] Stefan Saroiu, P. Krishna, Gummadi, et al. A Measurement Study of Peer-to-Peer File Sharing Systems. Technical Report UW-CSE-01-06-02, University of Washington, Department of Computer Science and Engineering, 2001.
    [46]徐小龙,王汝传.一种基于多移动Agent的对等计算动态协作模型.计算机学报, 2008, 31(7): 1261-1267.
    [47] Beverly Yang and Hector Garcia-Molina. Designing a Super-peer Network. Proc International Conference on Data Engineering, 2003.
    [48]田春岐,江建慧,胡志国,等.一种基于聚集超级节点的P2P网络信任模型.计算机学报, 2010, 33(2): 345-355.
    [49] Manchala DW. Trust metrics, models and protocols for electronic commerce transaction. 18th International Conference on Distributed Computing Systems, 1998, 3-12.
    [50]陈建刚,王汝传,张琳,等.基于模糊集合的网格资源访问的信任机制.计算机学报, 2009, 32(8): 1676-1682.
    [51] Choquet G. Theory of Capacities. Annales de L'Institut Fourier 5, 1953, 131-295.
    [52] G. Shafer. A Mathematical Theory of Evidence. Princeton University Press, 1976.
    [53] Theodorakopoulos G and Baras JS. On trust models and trust evaluation metrics for ad-hoc networks. IEEE Journal on Selected Areas in Communications, 2006, 24(2): 318-328.
    [54] Milgram.S. The Small World Problem. Psychology Today, 1967, 1(1): 60-67.
    [55]杨艺,代春艳,青虹宏.基于主观信任和推荐的信任模型.重庆工商大学学报(自然科学版), 2006, 23(2): 160-163.
    [56] PeerSim. http://peersim.sourceforge.net/, 2009.03.10.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700