首页 | 本学科首页   官方微博 | 高级检索  
     

对等网络信任度分布式存储的研究
引用本文:石明洪,罗勇军,白英彩.对等网络信任度分布式存储的研究[J].计算机应用与软件,2007,24(7):129-132.
作者姓名:石明洪  罗勇军  白英彩
作者单位:上海交通大学计算机科学与工程系,上海,200030
摘    要:利用结构化对等网络的优点,由网络中的部分节点组成结构化的叠加网络来储存节点信任度的多个拷贝,并提出了节点信任度的加密报告机制和简单的报告消息验证方法,抵抗恶意节点篡改自己或同伙的推荐的企图.这种方法能够在进行全局信任度计算时,将离开系统的节点的评价纳入考虑的范围,并保证在需要使用信任度值时,确定的有限步内找到信任度文件.

关 键 词:信任度  分布式存储  对等网络  安全机制  网络信任  度分布  式存储  研究  NETWORK  STORAGE  TRUST  文件  有限  使用  范围  评价  系统  计算  节点信任度  验证方法  抵抗  机制  加密  拷贝
修稿时间:2005-05-10

THE DISTRIBUTED TRUST STORAGE IN PEER-TO-PEER NETWORK
Shi Minghong,Luo Yongjun,Bai Yingcai.THE DISTRIBUTED TRUST STORAGE IN PEER-TO-PEER NETWORK[J].Computer Applications and Software,2007,24(7):129-132.
Authors:Shi Minghong  Luo Yongjun  Bai Yingcai
Abstract:Based on the advantages of structured peer-to-peer network,a part of nodes are organized into a structured peer-to-peer network to store multiple copies of trust files of nodes in the system.To prevent malicious nodes from tempering with its own trust value or its peers,a scheme in which the transaction feedbacks can be reported in encryption and the reporting messages can be verified simply is proposed.In this way,the further global trust computation can include the experiences of the nodes who left the system and the trust files can be searched out within definite steps.
Keywords:Trust Distributed storage Peer-to-peer network Security scheme
本文献已被 CNKI 维普 万方数据 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号