资源描述:
《gossiptrust for fast reputation aggregation in peer-to-peer networks》由会员上传分享,免费在线阅读,更多相关内容在工程资料-天天文库。
1、IEEETRANSACTIONSONKNOWLEDGEMENTANDDATAENGINEERING(TKDE-0003-0107R1,FINALIZEDFEB.11,2008)1GossipTrustforFastReputationAggregationinPeer-to-PeerNetworksRunfangZhou,MemberIEEE,KaiHwang,FellowIEEEComputerSociety,andMinCai,MemberIEEEAbstract—Inpeer-to-peer(P2P)networ
2、ks,reputationaggregationandpeerrankingarethemosttime-consumingandspace-demandingoperations.Thispaperproposesagossip-basedreputationsystem(GossipTrust)forfastaggregationofglobalreputationscores.ItleveragesaBloomfilterbasedschemeforefficientscoreranking.GossipTrus
3、tdoesnotrequireanysecurehashingorfastlookupmechanism,thusisapplicabletobothunstructuredandstructuredP2Pnetworks.RandomizedgossipingwitheffectiveuseofpowernodesenablesfastaggregationandfastdisseminationofglobalscoresinO(log2n)timesteps,wherenisthenetworksize.Theg
4、ossip-basedprotocolisdesignedtotoleratedynamicpeerjoininganddeparture,aswellastoavoidpossiblepeercollusions.Theschemehasaconsiderablylowgossipingmessageoverhead,i.e.O(nlog2n)messagesfornnodes.Bloomfiltersreducethememoryoverheadpernodeto512KBfora10,000-nodenetwor
5、k.WeevaluatetheperformanceofGossipTrustwithbothP2Pfile-sharingandparameter-sweepingapplications.ThesimulationresultsdemonstratethatGossipTrusthassmallaggregationtime,lowmemorydemand,andhighrankingaccuracy.TheseresultssuggestpromisingadvantagesofusingtheGossipTru
6、stsystemfortrustedP2Pcomputing.IndexTerms—Bloomfilter,gossipcommunication,peer-to-peercomputing,andreputationsystem.——————————©——————————1INTRODUCTIONhegrowthofpeer-to-peer(P2P)trafficislargelyBymakingtheglobalreputationscorespublic,peersTattributedtotheapplicat
7、ionsinP2Pfile-sharing[11,areabletomakeinformeddecisionaboutwhichpeersto21],digitalcontentdelivery[21,24],andP2Pmediaperformthetransactionswith.SoreputationsystemshelpandGridservices[12,15,28,43].Peeranonymityandpeersavoidunreliableormaliciouspeers.Anyreputationd
8、ynamicjoiningordeparturemakeP2PnetworksquitesystemforunstructuredP2Pnetworkshastomeetthreevulnerabletoattacksbyselfishandmaliciouspeers[7,9basicrequirementsinlowaggre