基于RBAC的P2P网络环境信任模型研究

被引:4
作者
文珠穆
卢正鼎
唐卓
辜希武
机构
[1] 华中科技大学计算机科学与技术学院
关键词
角色; P2P; 信任; 访问控制;
D O I
暂无
中图分类号
TP393.08 [];
学科分类号
0839 ; 1402 ;
摘要
P2P网络的匿名性和动态性带来了许多安全问题,传统的分布式访问控制模型以及信任管理模型并不能很好地适应对等网络环境。本文提出了一种信任管理加权限控制的双重验证方法来实现P2P网络环境中的节点协作和资源访问等安全互操作。节点用户通过本文中的轻量级身份证书,不仅可以验证其合法身份,同时也可以通过该证书中用户的相关角色信息来获取对资源的访问控制权限。而且通过证书中的信任度字段,系统可以吊销低信任度的节点的证书,能有效地遏制恶意节点的非法行为。本文重点介绍了用户信任度的计算,以及用户节点身份证书的获取以及权限验证。最后,通过相关的实验,验证了本方法在效率上要优于传统的信任管理模型。
引用
收藏
页码:32 / 36
页数:5
相关论文
共 14 条
[1]  
PeerTrust:Supporting Reputation-Based Trust for Peer-to-Peer Electronic Communities. Xiong Li,Liu Ling. IEEE Transac-tions on Knowledge and Data Engineering . 2004
[2]  
TrustGuard:Countering Vul-nerabilitiesin Reputation Management for Decentralized Overlay Networks. Srivatsa M,Xiong Li,Liu Ling. WWW2005 . 2005
[3]  
PageRank and Web communi-ties. Bianchini M,Gori M,Scarselli F. Web Intelligence,2003.WI2003 Proceedings.IEEE/WICInternational Conference on . 2003
[4]  
Trust and Risk Evaluation of Transac-tions with Different Amountsin Peer-to-Peer E-commerce Envi-ronments. Wang Yan,Lin Fu-ren. IEEE International Conference on e-Business Engi-neering(ICEBE’06) . 2006
[5]  
Routing algorithms for DHTs:Some open ques-tions. Ratnasamy S. Proc.of the1st Int’l Workshop on Peer-to-Peer Systems . 2002
[6]  
Managing Trust in a Peer-To-Peer In-formation System. Aberer K,Despotovic Z. Proc.of ACMInternational Conference on Information and Knowledge Management(CIKM) . 2001
[7]  
A Reputation-Based Trust M-anagement Systemfor P2P Networks. Selcuk A,Uzun E,Pariente M. 4th IEEE/ACMInter-national Symposium on Cluster Computing and the Grid(CC-GRID) . 2004
[8]  
The Meanings of Trust. McKnight D H,Chervany NL. Techni-cal Report WP9604 . 1996
[9]  
EigenRep:Reputation Management in P2P Net-works. Kamvar S. Technical Report,SCCM-02-16 . 2002
[10]  
A security enhanced AODV routing protocol based on the credence mechanism. Liu Jun,Li Zhe,Lin Dan,et al. Wireless Communications,Networking and Mobile Computing,2005∥Proceedings.2005International Conference on . 2005