Journal of Guangxi Normal University(Natural Science Edition) ›› 2010, Vol. 28 ›› Issue (3): 160-164.

Previous Articles     Next Articles

P2P Trust Valuation Model Based on Belief Recommendation and External Trust Negotiation

QIN Yong-bin, XU Dao-yun, WEI Jia-yin   

  1. College of Computer Science and Information,Guizhou University,Guiyang Guizhou 550025,China
  • Received:2010-04-20 Online:2010-09-20 Published:2023-02-06

Abstract: Based on the characteristis of P2P network,the beliefand human society,a new P2P trust valuation model on the basis of belief recommendation and external trust negotiation is put forward after disscussing and analizing relvant trust models.This model not onlyconsiders the external trust evaluation in every network exchange,but also inducts a subjective trust evaluation mechanism.The experiment result indicates thevalidity of the method.

Key words: trust, trust degree, P2P, security, trust valuation

CLC Number: 

  • TP393
[1] 林怀清,李之棠.P2P信任模型关键技术的研究进展[J].小型微型计算机系统,2007,28(9):1599-1603.
[2] 贾凡,谢蒂,杨义先.一种时域上的P2P信任模型[J].计算机工程与应用,2007,43(19):115-117.
[3] 张骞,张霞,文学志,等.Peer-to-Peer环境下多粒度Trust模型构造[J].软件学报,2006,17(1):96-107.
[4] HOU Meng-shu,LU Xian-liang,ZHOU Xu,et al.A trust model of p2p system besed on confirmation theory[J].ACM SIGOPS Operating System Review,2005,39(1):56-62.
[5] XIONG Li,LIU Ling.PeerTrust-supporting reputation-based trust for peer-to-peer electronic communities[J].IEEE Transactions on Knowledge andData Engineering,2004,16(7):843-857.
[6] SONG Wei-hua,PHOHA Vir V.Neural network-based reputation model in a distributed system[C]//Proceedings of 2004 IEEE International Conference on E-Commerce Technology.San Diego,California,USA:IEEE,2004:321-324.
[7] 孟宪福,史磊,王迎春.P2P环境下信任模型研究[J].郑州大学学报:理学版,2007,39(4):122-125.
[8] 徐锋,吕建,郑玮,等.一个软件服务协同中信任评估模型的设计[J].软件学报,2003,14(6):1043-1051.
[9] WANG Yong-hong,SINGH M P.Trust via evidence combination:a mathmatical approach based on certainty[OL]//A revised and extended version of [Wang and Singh 2007].2007[2009-06-30].ftp://ftp.eos.ncsu.edu/pub/unity/lockers/ftp/cscanontech/2006/TR-2006-11.pdf.
[1] TIAN Shikun, TANG Shengda. Scheduling Policy of P2P Real-time Communication with Strict Delay in Fading Channel [J]. Journal of Guangxi Normal University(Natural Science Edition), 2022, 40(6): 122-130.
[2] LIANG Yuting, LUO Yuling, ZHANG Shunsheng. Review on Chaotic Image Encryption Based on Compressed Sensing [J]. Journal of Guangxi Normal University(Natural Science Edition), 2022, 40(5): 49-58.
[3] XIU Guilin, ZHANG Bowei, LIU Fan, LUO Ao. Server Trusted Framework Based on Trusted CPU Chip [J]. Journal of Guangxi Normal University(Natural Science Edition), 2020, 38(2): 43-50.
[4] ZHOU Ronglong,LUO Yuling,BI Jinjie,CEN Mingcan,QIU Senhui,LIAO Zhixian. Applications of Image Parallel Encryption Algorithm in Handheld Devices [J]. Journal of Guangxi Normal University(Natural Science Edition), 2019, 37(3): 60-70.
[5] LIU Dianting, WU Lina. Domain Experts Recommendation in Social Network Basedon the LDA Theme Model of Trust [J]. Journal of Guangxi Normal University(Natural Science Edition), 2018, 36(4): 51-58.
[6] YU Chunqiang , FU Rui , CHEN Yan , LEI Yun , ZHANG Xianquan , WANG Xiaoyun. Protecting Method of Regions of Interest of ImageBased on Information Hiding [J]. Journal of Guangxi Normal University(Natural Science Edition), 2016, 34(2): 67-73.
[7] SHEN Li-na, JIANG Zhong-cheng, YIN Hui, QIN Xing-ming, LUO Wei-qun. Karst Ecological Environmental System Security Assessment of Guohua Rocky Desertification Area [J]. Journal of Guangxi Normal University(Natural Science Edition), 2014, 32(3): 141-149.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!