首页 | 本学科首页   官方微博 | 高级检索  
     


Satisfiability and trustworthiness of acquaintances in peer-to-peer overlay networks
Authors:Kenichi Watanabe  Tomoya Enokido  Makoto Takizawa
Affiliation:(1) Takizawa Laboratory, Applied Systems Engineering, Tokyo Denki University, Ishizaka, Hatoyama, Saitama 350-0394, Japan;(2) Faculty of Business Administration, Rissho University, Osaki, Shinagawa-ku, Tokyo, 141-8602, Japan;(3) Department of Computers and Systems Engineering, Tokyo Denki University, Ishizaka, Hatoyama, Hiki-gun, Saitama 350-0394, Japan
Abstract:Various types of applications access to objects distributed in peer-to-peer (P2P) overlay networks. Even if the locations of target objects are detected by some algorithms like flooding and distributed hash table (DHT) ones, applications cannot manipulate the target objects without access requests. It is critical to discover which peer can manipulate an object in which method, i.e. only a peer with an access right is allowed to manipulate an object. Hence, the application rather has to find target peers which can manipulate a target object than detecting the location of a target object. Due to the scalability and variety of peers, it is difficult, possibly impossible to maintain a centralized directory showing in which peer each object is distributed. An acquaintance peer of a peer p is a peer whose service the peer p knows and with which the peer p can directly communicate. We discuss types of acquaintance relations of peers with respect to what objects each peer holds, is allowed to manipulate, and can grant access rights on. Acquaintance peers of a peer may notify the peer of different information on target peers due to communication and propagation delay. Here, it is critical to discuss how much a peer trusts each acquaintance peer. We first define the satisfiability, i.e. how much a peer is satisfied by issuing an access request to another peer. For example, if a peer $p_{!j}$ locally manipulates a target object o and sends a response, a peer p i is mostly satisfied. On the other hand, if $p_{!j}$ has to ask another peer to manipulate the object o, p i is less satisfied. We define the trustworthiness of an acquaintance peer of a peer from the satisfiability and the ranking factor.
Contact Information Makoto TakizawaEmail:
Keywords:Peer-to-peer overlay network  Acquaintance  Trustworthiness  Satisfiability  Quality of service  Access control
本文献已被 SpringerLink 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号