P2P网络中的信任评估算法研究
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
近年来,P2P技术成为人们研究的热点问题,基于其分布式和能充分利用资源的特点快速发展并得到广泛应用。但是,随之产生的安全、效率等方面的问题逐渐凸现,特别是网络中节点的行为缺乏指导和约束,成为限制P2P应用发展的一个重要因素。因此,信任机制在P2P网络中节点信任值的确定及信任关系的传递等问题中的作用尤为突出。而各节点信任值的确定成为信任机制研究的重点。所以信任评估算法的研究为P2P网络的安全性及有效性提供保障。
     P2P网络技术主要应用在文件共享、协同工作、对等计算、搜索引擎,但文件共享是目前最重要的一个应用。它允许任意终端用户即对等节点通过网络完成文件交换,是一种通过直接交换共享计算机资源和服务的网络体系结构。随着使用P2P网络共享文件的用户越来越多,P2P系统的规模也越来越大。此系统的一个主要挑战就是如何在没有可信第三方或授权中心的情况下确认不同节点之间的信任关系。此时,必须依靠节点过去的行为来决定它是否值得信任,即需要建立信任管理机制。
     P2P网络中信任机制主要完成获取、分析网络中节点的信任值信息以指导节点间的协作决策;给出正确的信任评估以防止各种欺诈行为;实现与可信节点的协作,并隔离不可信节点等工作。在P2P信任机制方面的研究主要集中在提出合理的信任评估方案和信任度计算方法两个方面,只有尽可能计算出节点的信任度才能为节点之间的安全互操作做出保障进一步保证P2P网络的良好发展。
     本文总结已有的信任机制研究成果,首先分析了影响信任值的主要因素,提出基于推荐理论获取信任评估的信任管理技术。基于模糊理论的语言变量和模糊推理建立模型。用直接信任值和推荐信任值对P2P网络中节点进行信任评估。根据节点资源类型不同分成不同的兴趣节点群,每个兴趣节点群由一个中心节点来负责管理本群节点的添加和退出。
     此信任机制通过对信任评估算法的改进增强了P2P系统的安全性。并增加了兴趣节点群的分类并通过TTL(Time To Live)的减值来控制搜索查询的深度,减小搜索范围提高搜索效率,提高了P2P系统的有效性。
In recent years, P2P technology becomes a hot issue which gets more and more people’s attention. Based on its distributed feature and the ability to make full use of resources, it has been widely used and rapidly developed. However, the issues of safety and efficiency have gradually appeared, especially lacking guidance and constraint to the behavior of the nodes in the network, which become an important factor in limiting the development of p2p.Therefore, the application of the trust mechanism in P2P network is particularly important in the problems such as the trust value defined and the transfer of trust relation. And the determination of the trust value for each peer becomes the research emphases in trust mechanism. So the research for trust evaluation algorithm provides safeguard for the safety and efficacy of P2P network.
     P2P network technology is mainly applied in file sharing, collaborative work, equivalence calculation, and search engine. But file sharing is currently one of the most important applications. It allows any end-user namely peer node to complete file exchanging through the network, it is a network system structure that directly exchange resources and services in Shared computers. With the users who use the P2P network sharing files more and more, P2P systems are becoming ever larger. A major challenge of this system is how to confirm a trust relationship between different peers under the condition that without a trusted third party or an authorized center. Meanwhile, the peer must rely on its past behaviors to determine whether it is worthy trusting or not, namely must need to build trust management mechanism.
     The trust mechanism in P2P network mainly completes the acquisition and analysis of the trust value of nodes in the network to guide decision-making collaboration between nodes, to give the correct trust evaluation in order to prevent all kinds of fraud, to achieve collaboration between nodes, to isolate the untrustworthy nodes. The research of trust mechanism in P2P has focused on proposing a reasonable solution and a algorithm for trust value. Only when the trust value can be calculated as accurately as possible for the node, can it guarantee the security for the interoperability between nodes and ensure the further development of P2P.
     This thesis summarizes the research results of the existing trust mechanisms. Firstly, analyzes the main factors that influence the trust value and then propose a trust management technology based on the theory of recommended obtaining trust evaluation. Build model based on the theory of fuzzy language variables and fuzzy reasoning. Make trust evaluation for the nodes in P2P network by the direct trust value and recommendation trust value. It divided the network into many groups,according to standard of users’interests.There is a central node to be responsible for the management of the group.
     This trust mechanism based on the improved trust evaluating algorithms has strengthened the security of P2P system. And by increasing the classification of interest node group and add TTL to control the depth of the search query. Reduce the search scope to improve search efficiency and improve the effectiveness of P2P systems.
引文
[1]王玲芳,陈焱.P2P系统及其应用[M].北京:机械工业出版社,2008.
    [2] Dejan S.Milojicic,Vana Kalogeraki,Rajan Lukose,Kiran Nagaraja,Jim Pruyne,Bruno Richard,Sami Rollins,Zhichen Xu.Peer-to-Peer Computing. HP Laboratories Palo Alto.2002.
    [3]单国栋,戴英侠,王航.P2P网络系统中的安全问题[J].通信保密,2002,5:81-84.
    [4] Beth T,Borcherding M,Klein B.Valuation of trust in open network. In: Gollmann D,ed.Proceedings of the European Symposium on Research in Security (ESORICS).Brighton: Springer-Verlag, 1994. 3-18.
    [5] Beth T, Borcherding, M Klein B. Valuation of trust in open network[C]. In: Proceedings of the European Symposium on Research in Security (ESORICS),Brighton:Springer-Verglag,1999:59-63.
    [6] D.W.Manchala, E-Commerce Trust Metrics and Models[J].IEEE Internet Computing, April,2000.
    [7] J.Sabater and C. Sierra. REGRET. A Reputation Model for Gregarious Societies[C]. Proceedings of the 4th Int. Workshop on Deception, Fraud and Trust in Agent Societies, in the 5th Int.Conference on Autonomous Agents(AGENTS'0l),pages 61-69,Montreal, Canada,2001.
    [8]王宏林.信任管理在对等网络中的应用研究[D].苏州大学硕士学位论文,2008.
    [9] F.Cornelli.E.Damiani,S.D.Capitani.Choosing reputable servents in a P2P network. In Proc.of the Eleventh International World Wide Web Conference, 2002.
    [10] Guillaume Pierre,Maarten van Steen.A Trust Model for Peer-to-Peer Content Distribution Networks.Draft paper,submitted for publication,2001.
    [11] E.Damiani, S.D.C. di Vimercati, S. Paraboschi. Managing and sharing servents’reputations in p2p systems. IEEE Transactions on Knowledge and Data Engineering, 2003,15(4):840-854.
    [12]窦文.信任敏感的P2P拓扑构造及其相关技术研究[D].国防科学技术大学博士学位论文,2003.
    [13]史艳芬,葛燧和.一种P2P网络安全信任模型的设计与实现[J].计算机应用,2005,25(3),554-556.
    [14] Li Gong. Peer-to-Peer Networks in Action.IEEE Internet Computing, 2002.
    [15] Napster.http://www.napster.Com[EB/OL].
    [16]王学龙,张璟.P2P关键技术研究综述[J].计算机应用研究,2010,3,801-805.
    [17]张春红,裘晓峰,弭伟.P2P技术全面解析[M].北京:人民邮电出版社,2010.
    [18]陈贵海,李振华.对等网络:结构、应用与设计[M].北京:清华大学出版社, 2007: 275-284.
    [19]于婧,汪斌强.基于重复链路检测的P2P网络拓扑一致性方案[J].软件学报, 2009,20(7): 1943-1952.
    [20] Gnutella.http://www.gnutella.Com[EB/OL].
    [21] FastTrack. http://www.fasttrack.nu[EB/OL].
    [22] KaZaa. http://www.kazaa.Com[EB/OL].
    [23] Ratnasamy S. Routing algorithms for DHTs: Some open questions. In: Kaashoek F, ed. Proc. of the 1st Int’l Workshop on Peer-to-Peer Systems. Cambridge: Springer-Verlag, 2002: 45-52.
    [24] Suman Banerjee,Bobby Bhattachrjee,and Christopher Kommareddy. Scalable Application Layer Multicast.In Proceedings of ACM Sigcomm, pages 205-220,August 2002.
    [25] LIU Yun-hao,LIU Xiao-mei.Location-aware topology matching in P2P systems[J].IEEE Trans on Parallel and Distributed System s,2005,16(2): 163-174.
    [26]邱彤庆,陈贵海.一种令P2P覆盖网络拓扑相关的通用方法[J].软件学报,2007,18(2):381-390.
    [27] WU Yi-chun,LIU Chuan-ming,WANG JH. Enhancing the performance of locating data in chord-based P2P systems[C] //Proc of the 14th IEEE International Conference on Parallel and Distributed Systems.2008: 841-846.
    [28] MAHAJAN R, CASTROM, ROWSTRON A. Controlling the cost of reliability in peer-to-peer overlays[C] //Proc of the 2nd International Workshop on Peer-to-Peer Systems. 2003: 21-32.
    [29] JIANG Song,GUO Le,ZHANG Xiao-dong,etal.LightFlood: minimizing redundant messages and maximizing the scope of peer-to-peer search[J]. IEEE Trans on Parallel and Distributed Systems,2008,19(5): 601-614.
    [30] CHEN Han-hua,JIN Hai,LIU Yun-hao,etal.Difficulty-aware hybrid search in peer-to-peer networks[J].IEEE Trans on Parallel and Distributed System s,2009,20(1): 1121-1128.
    [31]邱志欢,肖明忠,代亚非.一种P2P环境下基于用户行为的语义检索方案[J].软件学报, 2007,18(9): 2216-2225.
    [32] RAMABHADRAN S,RATNASAMY S,HELLERSTEIN JM,etal.Brief announcement: prefix hash tree[C] //Proc of the 23rd ACM Symposium on Principles of Distributed Computing.2004: 368.
    [33]周亚建,杨义先.与P2P技术相关的信息安全问题[J].电信工程技术与标准化,2006,5.
    [34] D.H. McKnight and N.L. Chervany.The Meanings of Trust.Technical Report MISRC Working Paper Series 96-04, University of Minnesota, Management Information Systems Reseach Center, 1996.
    [35] D.Gambetta.Can We Trust Trusts?[M].In:Trust Making and Breaking Cooperative Relations.Basil Blackwell,Oxford,1990,213-237.
    [36] eBay website.www.ebay.com.
    [37] M.Blaze,J.Feigenbaum,and J.Lacy.Decentralized Trust Management[C]. Proc.17th Symposium on Security and Privacy.Oakland:IEEE,1996, 164-173.
    [38] M.Blaze,J.Feigenbaum,and M.Strauss.Compliance Checking in the PolicyMaker Trust Management System[C].Proc.of the Financial Cryptography 98,Lecture Notes in Computer Science,1998,1465,254-274.
    [39] M.Blaze,J.Feigenbaum,and A.D. Keromytis.Keynote Trust management for Public-Key Infrastructures[C]. Cambridge 1998 Security Protocols International Workshop.Cambridge,England: Springer, 1998, 59-63.
    [40]关振胜.公钥基础设施PKI与认证机构CA.北京:电子工业出版社,2002.
    [41] Resnick P,Teckhauser R,Friedman E.Reputation systems.The 6th International Workshop on Discrete Algorithms and methods for Mobile Computing and Communications,Australia,2000:567-57.
    [42]史磊.基于用户兴趣和模糊理论性的P2P信任机制研究[D].大连理工大学硕士学位论文,2007.
    [43] Kamvar S,Sehlosser M.The eigentrust algorithm for reputation management in P2P networks.12th International World Wide Web Conference, Hungary,2003:365-368.
    [44]窦文,王怀民,贾焰等.构造基于推荐的Peer-to-Peer环境下的Trust机制.软件学报,2004,15(6):63-65.
    [45] Mekouar L,Iraqi Y,Boutaba R.A reputation management and selection adcisor schemes for peer-to-peer systems. 15th IFIP/IEEE International Workshop onDistributed Systems, USA,2001:96-100.
    [46] Yamamoto A,Asahara D,Itao Tetal.Adistributed reputation model for open peer-to-peer networks.The 2004 international SymPosium on Applications and internet Workshops,Sydney,2004:189-191.
    [47] Mekouar L,Iraqi Y,Boutaba R.Trust and reputation.18th IFIP/IEEE International Workshop on Distributed Systems,USA,2004:532-535.
    [48] Marti S,Gareia H. Limited reputation sharing in P2P systems.5th ACM conference Electronic commerce, New York,USA,2004:503-510.
    [49] Lee S,Sherwood R,Bhattacharjee B.Incentives for sharing in peer-to- peer networks.10th ACM Conference on Computer and Communications Security,San Francisco,USA,2003:234-236.
    [50]谭琳,杨艳萍,尹刚.一种基于推荐的分布式信任模型[J].计算机工程,2005,31(3):57-59.
    [51] Tyson Condie.Sepandar D.Kamvar,Hector Garcia-Molina.Adaptive Peer-to-Peer Topologies[C].4th International Conference on Peer-to-Peer Computing,August 25-27,2004.
    [52]扎德L.模糊集合、语言变量及模糊逻辑[M].北京:科学出版社,1982. 63-84.
    [53]朱剑英.智能系统非经典数学方法[M].武汉:华中科技大学出版社,2001.
    [54]张书钦,杨永田.对等网络中基于模糊集的信任和声望机制[J].哈尔滨工程大学学报,2005,26(6):34-37.
    [55]吴建荣,王晓明.P2P网络中基于模糊理论的信任管理模型[J].计算机工程,2010,36(3):180-183
    [56]王贞,胡义召.基于模糊处理的P2P信任和声望模型研究[J].计算机工程与科学,2009,31(7):20-22.
    [57]牛尔力,王劲林,单明辉,陈君.基于兴趣的P2P网络关键技术研究[J].微计算机应用,2008,29(10):42-47.
    [58]Tang W,Ma Y,Chen Z.Managing trust in peer-to-peer Networks.Journal of Digital Information Management,2005,3(2):109-111.