首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 328 毫秒
1.
In P2P Grid computing systems, the authorization decision is often tackled by two different trust management methods: policy-based approach, where authorization are built on logical rules and verifiable properties encoded in signed credentials, and reputation-based approach, based on collecting, aggregating and disseminating reputation among the peers. However, the overhead caused by proof of compliance on authorization and the absence of certifying authorities may negate the strong and objective security advantages of policy-based approach, whilst vagueness, complexity and inaccurate characterization caused by reputation evolution may eliminate the quantitative and flexible advantages of reputation-based approach. We propose an adaptive trust management framework, which combines the merit of policy proof and reputation evolution such that authorization is aware of not only the strong and objective security traits, but also the calculability and the availability security traits. Finally, the framework of system is proposed.  相似文献   

2.
Current peer-to-peer (P2P) applications suffer performance degradation from the problems such as load imbalance, topology mismatch between overlay and underlay, and instability caused by node joining and leaving. In this paper, we propose the idea of implementing 2 functions of routing message and maintaining service index on different layers of overlay to deal with the aforementioned problems. Taking Chord as example, we design algorithms for building cluster and overlay and implement function-separated (FUSE) overlay with 2-dimensional address ID space. We further propose an analytic model for describing node’s load for evaluation. Simulation results indicate that, compared with 2-layer Chord-centered overlay in previous researches, this overlay excels in the metrics such as query path length, load, and query delivery ratio. Biography: LI Wenxiang(1979–), male, Lecturer, research direction: P2P computing, mobile computing.  相似文献   

3.
PeerMD, a P2P molecular dynamics simulation frame-work based on Web services is proposed. It utilizes rich free CPU time and network bandwidth of P2P networks to provide enough resources for dynamics simulation of bio-macromolecule, and has resolved the problem that it is difficult to interoperate between heterogeneous peers in P2P environment through Web services. Structure of PeerMD is given. Function, input and output of molecular dynamics simulation Web service are defined. Processes of publishing, discovering and invoking of molecular dynamics simulation Web service based on multi-level SuperPeer are given. A protocol system of PeerMD is implemented on a basic P2P platform JXTA, and experimental simulations of tumor necrosis fact alpha (TNF-α) and two mutations of it are executed on the protocol system. Simulation results show that PeerMD can speed up molecular dynamics simulation perfectly.  相似文献   

4.
赵新慧 《科学技术与工程》2011,18(18):4232-4236
研究了基于节点兴趣的非结构化P2P自动搜索的机制和算法。节点兴趣由节点所共享的文档的k-高频词向量描述。网络中的节点采用"拉"(pull)通信方式。节点不能把信息"推"(push)给其它节点,这样就保证了节点只会收到它想要的信息。系统中的节点根据用户提供的共享文档自动获知用户感兴趣的文档类型,并且自动和其它具有相似兴趣的节点组成一个覆盖网络。节点定期自动获取覆盖网络中其它节点共享的新文档信息,以方便用户查找和浏览新文档。并且通过仿真实验验证了系统具有可扩展性。  相似文献   

5.
RR-Chord:一个基于Chord的低开销快速查询P2P系统   总被引:2,自引:1,他引:1  
针对结构化P2P系统高异质性和节点频繁加入或离开带来的系统性能问题,基于Chord设计了一个RR-Chord系统.该系统所有节点被分为路由节点和非路由节点.路由节点具有更多的资源和路由信息,并可根据自身能力的强弱调整其路由表的大小,所有的路由节点形成路由环,所有的路由信息在路由环上路由以提高系统的查询效率.设计的新的加入算法,进一步减少了节点频繁加入与离开造成的维护开销.理论分析和实验结果表明.RR-Chord具有较好的路由性能和非常低的维护开销.  相似文献   

6.
一种用于在Peer-to-Peer系统中自动形成社区的元数据   总被引:1,自引:1,他引:0  
Peer-to-Peer(P2P)系统为文件共享提供了一个较为理想的平台.然而,由于缺乏中央的控制机制,使得全局信息难以获得,这给在该环境下进行信息检索带来了很大的困难.基于社区的信息检索方式可以帮助用户在社区中找到更有价值的信息,同时降低因为查询而带来的各种资源消耗.文中提出了用带权值的关键词列表(WeightedTermList,WTL)来作为自动形成P2P社区的元数据.实验结果证实了用WTL来判断节点(Peer)的相似性是非常有效的.通过对实验数据的分析,得到两个重要的结论.  相似文献   

7.
This paper presents a “cluster“ based search scheme in peer-to-peer network. The idea is based on the fact that data distribution in an information society has structured feature. We designed an algorithm to cluster peers that have similar interests. When receiving a query request, a peer will preferentially forward it to another peer which belongs to the same cluster and shares more similar interests. By this way search efficiency will be remarkably improved and at the same time good resilience against peer failure (the ability to withstand peer failure) is reserved.  相似文献   

8.
P2P网络具有开放、匿名、节点间松耦合等特性,这些特性导致许多恶意节点提供虚假资源、恶意评价、团伙作案等问题.为解决这一问题,提出了一种新的P2P网络信任模型RCTrust,该模型在将节点根据兴趣等历史信息以簇的形式聚集的基础上,根据节点通信的目标所在簇分为簇内信任和簇外信任两种类型,并根据节点的通信成功率、通信历史相关度、评价诚实度以及评价时效性等行为对节点的信誉进行评价和反馈.仿真分析表明,该信任模型具有抵抗恶意攻击的能力,并提供了较高的通信成功率.  相似文献   

9.
In P2P (Peer-to-Peer) networks,some malicious peers can impact on overall networks performance.One of the malicious behaviors of these peers is malicious packet dropping.In this paper,our focus is to detect and to exclude peers that misbehave by dropping some or all packets.Here,we propose a reputation-based mechanism for solving the problem efficiently.The proposed mechanism uses both direct reputation information and indirect reputation information to compute comprehensive reputation of a peer.At the same time,history reputation information is also taken into account to provide faults tolerance capability and we regulate the imprecision based on the fact that the cause of packet dropping can be complex.Finally,the peers with bad comprehensive reputation can be detected easily and then will be excluded from the network.In this way,our proposed mechanism improves the performance of P2P networks without increasing computational overhead.  相似文献   

10.
A fully distributed exchange-based anonymity P2P reputation system—EARep was proposed. EARep can provide all the peer’s anonymity in a fully distributed structured manner. In EARep, each peer’s anonymity is achieved by changing pseudonyms. Analysis and simulation results showed that compared with DARep, which is an existing representative scheme, our system has two main features. First, EARep increased anonymity degree (measured by linkage probability) and was much more scalable than DARep. Specifically, with the same message overhead, EARep reduced the linkage probability by more than 50% compared with DARep. Alternatively, to achieve the same anonymity degree, the message overhead in EARep was less than 25% of that in DARep. Second, the service selection success ratio of EARep was greater than 90% even when the percentage of malicious peers was up to 70%, which makes our system robust to malicious behaviors of peers. Biography: WEI Yunzhao (1978–), male, Ph.D. candidate, research direction: P2P network, wireless network.  相似文献   

11.
P2P网络中节点的邻居列表为蠕虫提供了快速传播的途径.网络中节点系统的漏洞情况各异,致使它们抵抗蠕虫的能力不同.无结构P2P网络中节点的位置影响着蠕虫围堵策略的效果,甚至影响整个网络的安全.为了对抗P2P蠕虫,在区分漏洞级别的基础上定义节点之间距离的计算方法,根据节点抵抗蠕虫的能力为其选择邻居,使得P2P网络中的节点分布更利于抵抗蠕虫的攻击;并将这种邻居选择机制应用到无结构P2P网络KaZaA中.实验结果表明,该选择机制明显提高了P2P网络对抗蠕虫的能力.  相似文献   

12.
基于信任向量的P2P网络信任管理模型   总被引:9,自引:0,他引:9  
为了解决由于P2P开放、匿名和高度动态的特性而容易受到攻击并被攻击者用来散布恶意信息的问题,需要建立P2P节点间的信任关系,提出一种TPP(trust in peer topeer)方案。该方案中每个节点通过计算被查询节点信任值的方式,使用信任向量建立本地信任表,并提交对另外节点的评价以建立全局可信表,最终建立一个信任网络。模拟结果表明,TPP比其他模型的交易成功率高,而通信和计算资源开销小,且能够很好地解决冒名、协同作弊以及"搭车行为"等安全问题。通过建立TPP模型,P2P网络有更强的健壮性和可扩展性,安全性提高,易于建立更加可信的网络。  相似文献   

13.
为了解决由于P2P开放、匿名和高度动态的特性而容易受到攻击并被攻击者用来散布恶意信息的问题,需要建立P2P节点间的信任关系,提出一种TPP(trust in peer to peer)方案。该方案中每个节点通过计算被查询节点信任值的方式,使用信任向量建立本地信任表,并提交对另外节点的评价以建立全局可信表,最终建立一个信任网络。模拟结果表明TPP比其他模型的交易成功率高,而通信和计算资源开销小,且能够很好地解决冒名、协同作弊以及"搭车行为"等安全问题。通过建立TPP模型,P2P网络有更强的健壮性和可扩展性,安全性提高,易于建立更加可信的网络。  相似文献   

14.
目的综合分析、比较、评价皖产半夏和全国主产区半夏质量。方法比色法、电位滴定法测定安徽及全国主产区半夏氨基酸、有机酸、多糖、蛋白质及生物碱含量,并通过聚类分析和主成分分析对半夏质量进行评价。结果不同产地半夏药材5类成分含量差异较大。结论主成分分析和聚类分析适用于半夏药材内在质量特征评价。  相似文献   

15.
In modern Peer-to-Peer (P2P) content distribution applications, multiple swarms typically exist, each corresponding to the dissemination of one content among interested peers. A common design in the existing P2P applications is to allow peers in one swarm to help each other, while different swarms are only coupled when sharing the upload bandwidth at the dedicated content servers/publishers. In recent years, a number of proposals have emerged which advocate inter-swarm collaboration and resource sharing, where peers in one swarm may contribute their storage and bandwidth resources to help peers in the swarm of another content. Such inter-swarm collaboration can improve content availability and optimize resource uti-lization in the entire system, at the cost of additional overhead for content preloading and inter-swarm coor-dination. This paper presents a survey of studies on effective inter-swarm collaboration mechanisms in the existing literature. This paper first discusses strategies of collaboration in P2P file sharing applications, and then presents multi-channel collaborative design for P2P live and Video-on-Demand (VoD) streaming. In particular, this paper elaborates our recent design of collaboration strategies among multiple streaming channels in a P2P VoD system, and shows that the server cost can be reduced by up to 25% while high streaming qualities are guaranteed in the entire system, even during extreme scenarios such as unexpected flash crowds. This paper also discusses representative approaches to implement inter-swarm collaborations in various P2P content distribution systems.  相似文献   

16.
针对P2P网络的反应式蠕虫,提出基于良性蠕虫的优先传播恶性感染节点的邻居节点(PRIN)遏制策略.蠕虫传播模型给出后,分析了PRIN策略的特点和可行性,并进行仿真实验.实验结果表明,与传统策略相比,PRIN策略进一步提高了蠕虫遏制效果,1‰数量的良性蠕虫即可有效遏制反应式蠕虫的传播,并在策略具体实施上忽略了良性蠕虫驻留节点类型的影响,降低了策略实施的复杂性.  相似文献   

17.
P2P网络的开放性和匿名性为攻击者蔓延恶意内容提供了一种理想的方式.因此,对于P2P网络而言,信任模型是非常必要的.提出的信任模型中,用户评价交易方并将其存储在本地数据库中,然后和其他节点共享数据库中的信息.该模型还能够建立善意节点之间的信任,并且能够识别恶意节点.模拟实验表明,提出的信任模型在阻止P2P网络中恶意内容蔓延方面是非常有效的,且具有较好的工程可行性.  相似文献   

18.
PR-tree:P2P环境下一种多维数据的分布式索引结构   总被引:2,自引:0,他引:2  
提出了一种基于R-tree的更适用于P2P环境的新型多维空间索引结构———PR-tree,并且在这种新型的索引结构下进行了高维数据的查询操作.这种新型的空间索引结构有两个主要的特点:对需要查询的数据空间进行层次划分;并且对结点的插入、删除等操作具有高度的灵活性.实验表明这种新型的空间索引结构在查询效率等方面都优于其他的索引形式.  相似文献   

19.
将自动机方法对XML数据的过滤延伸到P2P网络中,依据在本地XML系统YFilter中构造非确定有限自动机(NFA)的思想,采用Chord环建立起分布式的NFA对于peer节点中的XML数据的查询过滤系统,并基于递归法执行查询过滤,在不同的peer节点上得到满足查询条件的数据集合。通过实验验证了当查询的数量和网络大小发生变化时分布式NFA的方法的执行性能。结果表明:本文方法可在不同的过滤场景中处理百万数量级的XPath查询,具有良好的网络流量和过滤延迟。  相似文献   

20.
In P2P (Peer-to-Peer) networks,some malicious peers can impact on overall networks performance.One of the malicious behaviors of these peers is malicious packet dropping.In this paper,our focus is to detect and to exclude peers that misbehave by dropping some or all packets.Here,we propose a reputation-based mechanism for solving the problem efficiently.The proposed mechanism uses both direct reputation information and indirect reputation information to compute comprehensive reputation of a peer.At the same...  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号