欢迎来到天天文库
浏览记录
ID:7286115
大小:174.21 KB
页数:12页
时间:2018-02-10
《the eigentrust algorithm for reputation management in p2p networks》由会员上传分享,免费在线阅读,更多相关内容在工程资料-天天文库。
1、TheEigenTrustAlgorithmforReputationManagementinP2PNetworksSepandarD.KamvarMarioT.SchlosserHectorGarcia-MolinaStanfordUniversityStanfordUniversityStanfordUniversitysdkamvar@stanford.eduschloss@db.stanford.eduhector@db.stanford.eduABSTRACTVBS.Gnutellaworm,whichspreadsbymakingacopyofitself
2、inapeer'sGnutellaprogramdirectory,thenmodifyingtheGnutella.iniPeer-to-peerfile-sharingnetworksarecurrentlyreceivingmuchat-filetoallowsharingof.vbsfiles[19].Farmorecommonhavebeententionasameansofsharinganddistributinginformation.How-inauthenticfileattacks,whereinmaliciouspeersrespondtovirtu-
3、ever,asrecentexperienceshows,theanonymous,opennatureofallyanyqueryproviding“decoyfiles”thataretamperedwithordothesenetworksoffersanalmostidealenvironmentforthespreadofnotwork.self-replicatinginauthenticfiles.IthasbeensuggestedthatthefuturedevelopmentofP2PsystemsWedescribeanalgorithmtodecr
4、easethenumberofdownloadswilldependlargelyontheavailabilityofnovelmethodsforensur-ofinauthenticfilesinapeer-to-peerfile-sharingnetworkthatas-ingthatpeersobtainreliableinformationonthequalityofresourcessignseachpeerauniqueglobaltrustvalue,basedonthepeer'stheyarereceiving[6].Inthiscontext,at
5、temptingtoidentifymali-historyofuploads.Wepresentadistributedandsecuremethodtociouspeersthatprovideinauthenticfilesissuperiortoattemptingtocomputeglobaltrustvalues,basedonPoweriteration.Byhavingidentifyinauthenticfilesthemselves,sincemaliciouspeerscaneas-peersusetheseglobaltrustvaluestoch
6、oosethepeersfromwhomilygenerateavirtuallyunlimitednumberofinauthenticfilesiftheytheydownload,thenetworkeffectivelyidentifiesmaliciouspeersarenotbannedfromparticipatinginthenetwork.Wepresentsuchaandisolatesthemfromthenetwork.methodwhereineachpeeriisassignedauniqueglobaltrustvalueInsimulati
7、ons,thisreputationsystem,calledEigenTrust,hasthatreflectstheexperiencesofallpeersinthenetworkwithpeeri.beenshowntosignificantlydecreasethenumberofinauthenticfilesInourapproach,allpeersinthenetworkparticipateincomputingonthenetwork,evenunderavarietyofconditionswheremalicioustheseva
此文档下载收益归作者所有