资源描述:
《some paradoxes in p2p trust management system》由会员上传分享,免费在线阅读,更多相关内容在工程资料-天天文库。
1、1SomeParadoxesinP2PTrustManagementSystemsTuanA.TrinhHighSpeedNetworksLaboratoryDepartmentofTelecommunicationsandMediaInformaticsBudapestUniversityofTechnologyandEconomics,HungaryE-mail:trinh@tmit.bme.huAbstract—ThispaperreportssomeBraess-likeparadoxesinThefirstquestionishowtogatherappropriatein
2、formationpeer-to-peer(P2P)trustmanagementsystems.Weusethetoolsfromdifferentsources.Thisprocessinvolvesthereportingfromgametheorytomodelandanalyzethereportingandexclu-processofpeersinthenetwork,voluntarilyornot.Peerssionprocessesandshowhowuncertaintyandbeliefamongpeersarerightlytoaskthemselvesw
3、hytoreport.Inanincentive-mightleadtosurprisingandunexpectedpeerbehaviors,which,inturn,couldmakecurrentP2Ptrustmanagementsystemscompatiblesystem,itisunderstandable,butitisnotsotrivialineffective.Thecontributionsofthepaperarethefollowings.questionifthesystemisnotincentive-compatible.InsuchaFirst
4、,wefindthatifareputationsystemisnotincentive-system,manyissuescanhaveanimpactonpeers’decision,compatible,themorethenumberofpeersinthesystem,thelessincludingtheseeminglyirrelevantissue,thenumberofpar-likelythatanyonewillreportaboutamaliciouspeer.Second,weticipatingpeers(i.e.peerpopulation),aswew
5、illaddresslateraddresstheissueofvotingforexclusionofa(maliciouslybelieved)peerandprovideananalysisoftheproblem.Bymodelingtheinthepaper.AnotherquestionregardingtrustmanagementdecisionprocessasaBayesiangame,wefindthatthepossibleinP2Psystemsishowtoresponse.OnewaytodoitistoapplicationofexclusioninP
6、2Psystemmightbedangerous.Moreexcludemisbehaved/maliciuospeersfromthenetwork.In[10],precisely,ouranalysisshowsthat,undercertainassumptions,asimpleexclusionmechanismisproposed,butlittleisknownthemorethenumberofvotingpeers,themorelikelythatanaboutitsperformance.innocentpeerisexcludedfromthenetwor
7、k.Finally,inthelightsoftheinvestigatedparadoxes,wediscusspossiblesolutionstoGametheory(see[13]foracomprehensiveintroduction)improvetheefficiencyofcurrenttrustmanagementsystemsinhasbeensuccessfullyappliedtomodelandanalyzedifferentP2Pnetwo