欢迎来到天天文库
浏览记录
ID:7294142
大小:100.28 KB
页数:8页
时间:2018-02-10
《identity crisis anonymity vs. reputation in p2p systems》由会员上传分享,免费在线阅读,更多相关内容在工程资料-天天文库。
1、IdentityCrisis:Anonymityvs.ReputationinP2PSystems¤SergioMartiandHectorGarcia-MolinaStanfordUniversityStanford,CA94305fsmarti,hectorg@cs.stanford.eduAbstractformofpersistentnodeidentification.Inordertobuildreputation,auserornodemusthavesomeformofidentityTheeffectivenesso
2、freputationsystemsforpeer-to-peerwhichisvalidoveraperiodoftime.Thelongerthisperiodresource-sharingnetworksislargelydependentonthereli-oftime,andthemoreresistanttheidentityistospoofing,theabilityoftheidentitiesusedbypeersinthenetwork.Muchmoreaccuratelythereputationsystem
3、canratenodes[13].debatehascenteredaroundhowcloselyone’spseudo-ThesimplestwaytoidentifyanodeistouseitsIPad-identityinthenetworkshouldbetiedtotheirreal-worlddress.Thismethodisseverelylimitedbecauseaddressesidentity,andhowthatidentityisprotectedfrommaliciousarevulnerablet
4、oIP-spoofingandpeersareoftendynam-spoofing.InthispaperweinvestigatethecostinefficiencyicallyassignedtemporaryIPaddressesbytheirISPs.In-oftwosolutionstotheidentityproblemforpeer-to-peerrep-stead,amorereliablemethodmaybetouseself-signedcer-utationsystems.Ourresultsshowthat,
5、usingsomesimpletificates.Thistechniqueallowswell-behavednodestobuildmechanisms,reputationsystemscanprovideafactorof4totrustbetweeneachotheroveraseriesofdisconnectionsand20improvementinperformanceovernoreputationsystem,reconnectionsfromdifferentIPaddresses.Althoughmali-d
6、ependingontheidentitymodelused.ciousnodescanalwaysgeneratenewcertificatesmakingitdifficulttodistinguishthemfromnewusers,thistechniquepreventsthemfromimpersonatingexistingwell-behavednodes.1.IntroductionSomearguethattheonlyeffectivesolutiontotheiden-tityprobleminthepresen
7、ceofmaliciousnodesistouseaTheincreaseinwide-areanetworkbandwidthandcom-centraltrustedloginserver,whichassignsanodeidentitymoditycomputingpowerhaspromotedtheuseofpeer-to-basedonaverifiablereal-worldidentity[1].Thiswouldpeer(P2P)systems.P2Psystemsallowanyusertosharelimita
8、maliciousnode’sabilitytomasqueradeasseveralresourceswhilemaintainingautonomyandindependencenodesandtochangeidentities
此文档下载收益归作者所有