| 研究生: |
李大正 Li, Ta-Cheng |
|---|---|
| 論文名稱: |
P2P系統上基於協同式自動信賴對話的信用評等機制 A Reputation Mechanism Based on Collaborative Automated Trust Negotiation in P2P System |
| 指導教授: |
賴溪松
Laih, Chi-Sung |
| 學位類別: |
碩士 Master |
| 系所名稱: |
電機資訊學院 - 電腦與通信工程研究所 Institute of Computer & Communication Engineering |
| 論文出版年: | 2005 |
| 畢業學年度: | 93 |
| 語文別: | 英文 |
| 論文頁數: | 52 |
| 中文關鍵詞: | 點對點 、信用評等 |
| 外文關鍵詞: | Reputation, P2P |
| 相關次數: | 點閱:51 下載:1 |
| 分享至: |
| 查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報 |
越來越多的使用者為P2P系統帶來的便利所吸引,而開始使用P2P軟體。然而,這也帶來了一些問題。一個典型的P2P系統允許缺乏互信的成員自由的加入或離開。而許多自私的使用者,他們僅利用其他人所提供的資源卻不作出任何貢獻,這樣的行為破壞了整個網路的公平性。而這樣的問題觸發了許多對信用評等機制的研究,這些機制可以防範使用者的不當行為,對自私的使用者作出懲罰,並鼓勵正當的使用者。
目前已有數種設計在P2P 環境下的信用評等機制,這些機制大多透過使用者本身的行為以及其他使用者的推薦來建立信用評等。這一類的信用評等機制可提供使用者關於其他使用者過往行為的參考。
而Automated Trust Negotiation(ATN)則是與這些架構完全不同的概念。它本身是設計來處理在分散系統下的存取控制及認證。在本論文中,我們嘗試結合兩種機制。我們認為兩種機制可以同時合作來建立P2P系統中的信賴機制。在本論文中,我們提出了一個基於Trust Negotiation的信用評等機制。我們設計了一個評鑑機制使P2P系統下的使用者可以得到一個信用層級。這個信用層級的高低取決於使用者的過往作為。若兩個使用者間完成了一次成功的Trust Negotiation,雙方將可得到一份證明。使用者可透過收集這些證明的方式來提高自身的信用層級。如果使用者僅從他人處下載資源,他將無法獲得較高的信用層級。而信用層級較低的使用者無法存取信用層級較高的使用者。這個機制可有效的抑制自私的使用者獲利。同時,我們也將信用層級的觀念應用到Trust Negotiation上。使Trust Negotiation更為可靠。
More and more users are drawn to these networks because of the convenience that P2P systems bring on. However, they also bring up some problems. A typical P2P system allows mutually distrustful parties to join or leave freely. Furthermore, the selfish nodes which only want to utilize other peers’ resources without any contribution have greatly jeopardized the fairness of most P2P networks. These problems have led to the development of reputation mechanisms which detect misbehavior and punish selfish peers, and also to encourage good ones.
There are some reputation mechanisms in P2P systems. Most of them maintain their trust based on peers’ own experience and other peer’s recommendations. Such reputation mechanism could give users some knowledge about other users’ past behaviors. Trust negotiation is orthogonal to current reputation-based approaches. It is proposed to handle access control and authentication in open and distributed systems. In this paper, we try to combine both mechanisms. We think trust negotiation can be used together with reputation mechanisms to build trust in a P2P system. In this paper, we proposed a reputation scheme based on trust negotiation for P2P system. We propose an evaluation mechanism for a reputation system that objectively maps each peer’s activity in the P2P network to a reputation level. We maintain a mechanism based on trust negotiation. If a successful negotiation was completed between two peers¸ both peers can get licenses. Peers can raise their trust by collecting licenses. If peers only download resources from other peers, they can’t obtain higher reputation level. Peers with lower reputation level can’t access those with higher reputation level. This mechanism can efficiently arrest selfish behaviors of some peers. We also apply reputation level to trust negotiation. We use reputation level to make trust negotiation more reliable.
[1] K. Aberer and Z. Despotovic. “Managing trust in a peer-2-peer
information system,”In Proceedings of the Tenth International Conference on Information and Knowledge Management, pages 310-317. ACM Press, 2001.
[2] D. Barkai, “Intel developer update magazine,” Intel Corporation, page 4, February 2000.
[3] E. Damiani, D.C. di Vimercati, S.Paraboschi, P. Samarati, and F. Violante, “A reputation-based approach for choosing reliable resources in peer-to-peer networks,”In Proceedings of the 9th ACM Conference on Computer and Communications Security, pages 207-216. ACM Press, 2002.
[4] A.Ganesh, A.Rowstron, M. Castro, P. Druschel and D. S.Wallach, “Security for structured peer-to-peer overlay networks,” In Proceedings of the Fifth Symposium on Operating Systems Design and Implementation (OSDI’02), pages 172-179, 2002.
[5] M. Gupta, P. Judge, and M. Ammar. “A Reputation System for Peer-to-Peer Networks,” NOSSDAV '03; June 1-3, 2003
[6] S.D. Kamvar, M. Schlosser, and H. Garcia-Molina, “Eigenrep: Reputation management in p2p networks,” Unpublished work, 2003.
[7] Joseph O. Patterson, “A Matter of Trust: Reputation Management In Peer-to-Peer Networks”
[8] S. Lee, R. Sherwood, and B. Bhattacharjee, “Cooperative peer groups in nice.” In IEEE INFOCOM, Apr. 2003.
[9] S. Ratnasamy, P. Francis, M. Handley, R. Karp, and S. Shenker, “A scalable content addressable network,” In ACM SIGCOMM, Aug. 2001.
[10] P. Resnick, K. Kuwabara, R. Zeckhauser, and E. Friedman, “Reputation systems,”Communications of ACM, 43(12):45-48, 2000.
[11] M. Ripeanu, I. Foster, and A. Iamnitchi, “Mappingthe gnutella network: Properties of large-scale peer-to-peer systems and implications for system design,” In IEEE Internet Computing Journal, vol. 6, no.1, 2002
[12] R.L. Rivest, A. Shamir, and L. M. Adleman, “A method for obtaining digital signatures and public-key cryptosystems,” Communications of the ACM, 21(2):120-126, 1978
[13] S. Saroiu, G. P. Krishna, and S.D. Gribble, “A measurement study of peer-to-peer file sharing systems,” In Proceedings of the SPIE Conference on Multimedia Computing and Networking, pages 156–170, 2002.
[14] K.E. Seamons, M. Winslett, and T. Yu, “Limiting the disclosure of access control policies during automated trust negotiation,” In Proceedings of the Symposium on Network and Distributed System Security (NDSS’01), February 2001.
[15] K.E. Seamons, M. Winslett, T. Yu, L. Yu, and R. Jarvis. “Protecting privacy during on-line trust negotiation,” In Proceeding of the 2ndWorkshop on Privacy Enhancing Technologies, April 2002.
[16] I. Stoica, R. Morris, D. Karger, F. Kaashoek, and H. Balakrishnan, “Chord: A scalable Peer-To-Peer lookup service for internet applications,” In ACM SIGCOMM, pages. 149-160, Aug. 2001.
[17] W.H. Winsborough, K.E. Seamons, and V.E. Jones. “Automated trust negotiation,” In DARPA Information Survivability Conference and Exposition, Volume 1, pages 88-102. IEEE Press, January 2000.
[18] W.H. Winsborough and N. Li, “Protecting sensitive attributes in automated trust negotiation,” In Proceeding of the ACM Workshop on Privacy in the Electronic Society, pages 41-51. ACM Press, 2002.
[19] W.H. Winsborough and N. Li, “Towards practical automated trust negotiation,” In Proceedings of the 3rd International Workshop on Policies for Distributed Systems and Networks (POLICY’02), pages 92-103, June 2002
[20] L. Xiong and L. Liu, “Building trust in decentralized peer-to-peer communities,” In International Conference on Electronic Commerce Research (ICECR-5), Oct. 2002.
[21] S. Ye, F. Makedion, and J. Ford, “Collaborative automated trust negotiation in peer-to-peer systems,” Fourth International Conference on Peer-to-Peer Computing (P2P'04) , pages 108-115
[22] B. Yu and M. P. Singh, “A social mechanism of reputation management in electronic communities,” In Proceedings of Fourth International Workshop on Cooperative Information Agents, 2000.
[23] T. Yu, X. Ma, and M. Winslett. “PRUNES: an efficient and complete strategy for automated trust negotiation over the internet.” In Proceedings of the 7th ACM conference on Computer and communications security, pages 210-219. ACM Press, 2000.
[24] T. Yu and M. Winslett, “Policy migration for sensitive credentials in trust negotiation,” In Proceeding of the 2nd Workshop on Privacy in the Electronic Society, November 2003.
[25] T. Yu and M. Winslett, “A unified scheme for resource protection in automated trust negotiation,” In Proceedings of IEEE Symposium on Security and Privacy, pages 110-122. IEEE Computer Society, 2003.
[26] T. Yu, M. Winslett, and K.E. Seamons, “Supporting structured credentials and sensitive policies through interoperable strategies for automated trust negotiation,” ACM Transactions on Information System Security, 6(1):1-42, 2003.
[27] http://www.gnutella.com/
[28] http://www.junit.org/index.htm
[29] “Kazaa participation level”, http://www.kazaa.com.
[30] http://www.napster.com/
[31] http://www.neurogrid.net/php/
[32] http://www.pctechguide.com/29network_P2P_computing.htm
[33] http://sourceforge.net/mailarchive/forum.php?forum=neurogrid-simulation
[34] http://www.neurogrid.net/twiki/bin/view/Main/PeerToPeerSimulation