Risk Evaluation of Information Exchange among Nodes under P2P Network Environment
Han Yingjun, Wang Xiaoyang North China University of Science and Technology Hebei, 063009 China
Abstract: In recent years, because of anonymity and dynamics, P2P network have suffered from more and more security problems, which means that traditional trust management cannot be well adapted to P2P network environment, making dynamic trust a new research focus. Based on trust mechanism in P2P environment, this paper analyzes the trust of consumption node to service node, coming upon an advanced trust evaluation model pointing at information exchange among nodes to evaluate credit changes when service provider exchanging information. With risk mechanism, this paper also analyzes risks of information exchange among nodes in P2P network. It is proved that the model mentioned can effectively resist credit speculation and periodic deception.
Keywords: P2P, Information Exchange Among Nodes, Trust Mechanism, Credit Risk Risk Evaluation of Information Exchange among Nodes under P2P Network Environment
References: [1] Li, X., Ling, L. (2004). Peer trust: Supporting reputation-based trust for peer-to-peer electronic communities. IEEE Trans on Knowledge and Data Engineering, 16(7) 843-859. [2] Chang, E.,Thomson, P., Dillon, T., et al. (2005). The fuzzy and dynamic nature of trust. Lecture Notes in Computer Science, 3592 161-174. [3] Dou, W., Wang, H.M., Jia, Y., et al. (2004). A recommendation-based peer-to-peer trust model. Journal of Software, 15 (4) 571- 583. [4] Su, J.X., Guo, H.Q., Gao, Y. (2008). Recommendation mechanism based on web of trust. Journal of South China University of Technology (Natural Science Edition), 36(4) 98-103. [5] Walter, F.E., Battiston, S., Schweitzer, F. (2008). A model of a trust-based recommendation system on a social network. Journal of Autonomous Agents and Multi-Agent Systems, 16(1) 57-74. [6] Shreedhar, M., Varghese, G. (1996). Efficient fair queuing using deficit round-robin. IEEE/ACM Transactions on Networking, 4(3) 375-385. [7] Das, A., Islam, M.M. (2012). Secured Trust: a dynamic trust computation model for secured communication in multiagent systems. IEEE Transactions on Dependable and Secure Computing, 9(2) 261-274. [8] Liao, X., Tang, H.W. (2003). An evidential reasoning approach for partner selection in dynamic alliance. Computer Integrated Manufacturing Systems, 9(1) 57-62. [9] Sun, Q., Ye, X.Q., Gu, W.K. (2000). A new combination rules of evidence theory. Acta Electronica Sinica, 28(8) 117-119. [10] Fang, H.Q., Zeng, Y. (2004). Empirical study and comparative analysis of bank credit risk evaluation method. Journal of Financial Research, (01) 62-69. [11] Liu, W.Y., Yan, G. (2011). Exploration of P2P network credit problem in China. Northern Economy, (11) 63-67. [12] Miao, X.Y. (2012). Network P2P credit risk and prevention. Gansu Fiance, (02) 20-23.