The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Cloud computing is being progressively adopted in different business scenarios in order to obtain flexible and reliable computing environments, with several supporting solutions available in the market. Computing systems trust representation have been widely discussed and applied in a lot of information technology scenarios, becoming subject of scientific researches. This paper proposes the development...
The open applications makes P2P network has many security problems. In order to improve the performance of network, and to ensure the quality of services, this paper proposes a trust model for fault-tolerant and intrusion-tolerant Mechanism of P2P networks. In this model, a new trust evaluation and management mechanism have been studied, and an updating method of the trust degree has been described...
In order to effectively improve the success rate of transactions among nodes of p2p patch distribution system, this trust model was introduced to the p2p patch distribution system, the design of trust model was given and the specific implementation of each module was described in detail, finally the performance of trust model achieved were tested.
Modeling and computing trust in distributed computing systems like ad-hoc networks is very much challenging. Particularly in Wireless Sensor Networks (WSNs), where the network is formed and self-organized by relying on the almost strangers for reliable and normal operation, it is important to compute the trustworthiness of individual nodes in distributed manner. In order to find the trustworthiness...
Cloud computing is a new design pattern for large, distributed data centers. Service providers offering applications including search, email, and social networks have pioneered this specific to their application. Recently they have expanded offerings to include compute-related capabilities such as virtual machines, storage, and complete operating system services. The cloud computing design yields...
A novel decentralized trust management model with reputation and risk evaluation is proposed (RFTrust). Trust is an essential ingredient of the transaction process. Trust and risk are two closely related factors to make transaction in an uncertain environment. RFTrust model establish the credibility by calculating current reputation and acquiring the risk evaluation which represents the accumulative...
In the security community, one main focus has been devoted to the enhancement of access control approaches with new authentication and authorization capabilities with the server to restrict others' ability. However, in the peer-to-peer (P2P) networks, no such centralized server exists, especially for the pure P2P, and the peers have to interact with unfamiliar peers. To prevent or discourage peers...
The problem that the traditional trust model for P2P network can not reflect accurately peers' behaviors introduces an improved trust model based on reputation. Trust will be divided into service reputation and credibility of recommendation, and storage, computing and update algorithm of trust and the randomly extraction algorithm based on credibility of recommendation are raised in the model. The...
Learning from the genetic principle in the nature, the genetic affinity among files in P2P Networks will be established by files DNA at the point of view of information transmitting. The transmitting behavior of peers should be analyzed by the file lineage. According to the behavior of transmitting, trust model based on information heredity is built and trust among peers could be evaluated.
In order to resolve the trust problem due to the opening, the dynamics, the anonymity, and the uncertainty of system, this paper proposes a new trust model by analyzing and improving the subjective logic. A new trust quantification formula with the negative-event and time effects is introduced, and a definition of risk is also presented. We can evaluate the trust relationships between peers more precisely...
Two optimization strategies based on Bloom Filter are proposed for P2P security. In order to protect the privacy of trust information in P2P systems, BFManager using BloomFilter is employed to manager trust information, and builds a structure called trust bucket to store trust value and divides peers with different trust value into different trust buckets. The other is called as BFChecker to optimize...
Peer-to-peer systems have gained immense popularity in the recent years, but trustworthiness of the services in P2P systems still remain a major concern. Trust is an important aspect of decision making and particularly influences the specification of security policy. A dependable trust model should be capable of handling the following important issues: dealing with sudden fluctuations in peer behavior,...
This paper proposes a time-decay based trust model in peer-to-peer networks. Through the transaction time is faded, the proposed model makes trust value changed dynamically with time decay, which achieves the goal that the more transaction close to, the more reliable it is. Finally this paper presents the experimental protocol and simulation. The experimental result shows that the proposed model is...
This article, from the prospect of P2P e-commerce advantages and challenges, discusses the risks of P2P e-commerce issues, and points out that trust is the basis of all business activities. Business organizations should take certain measures against risks from P2P e-commerce. The effective confidence-building mechanism can enable e-commerce more secure, reduce the risk of people's expectations, and...
Peer-to-peer (P2P) electronic commerce greatly enhances the convenience and flexibility of e-business, but it also aggravates the risk and security threatening of business activity. In order to prevent the vulnerable peers from involving in transaction and solve the trust problem of no-history record peers, this paper proposes a new trust model of P2P e-commerce, which is based on voting agreement...
In this paper, we propose a group-based trust model named F-PKI (Freely organized one level Public Key Infrastructure) in P2P system based on Trusted Computing (TC) technology which is used to enhance PC security by incorporating hardware platform. In this model, peers are organized freely by group, each of which is a one level PKI. Preliminary evaluation results show that the proposed model is realistic...
Due to lack of effective trust management mechanism, there are a lot of deceptive behaviors in P2P networks, which seriously decrease the quality of network services. In order to improve the quality of services (or transactions), this paper proposes a novel trust and reputation model based on similarity evaluation in P2P environments. According to the different context of services, the model gives...
To solve security problems of E-commerce system, this paper proposed a new trust model APR which is based on anticipative perceived risk. The concept of perceived risk was introduced into APR, many kinds of trust factor were taken to calculate the trust value among nodes, and an origination method was provided to integrate direct trust and recommendation trust. Comparing with other trust models, APR...
In order to resolve the security problems due to the dynamics and uncertainty of Peer-to-Peer network environment, this paper proposes a new trust model which is based on group- recommend (GRBTrust). Experimental results demonstrate that this model can deal with the malicious attacks and help the users to choose trading partner which can be trusted.
Peer-to-Peer (P2P) electronic commerce greatly enhances the convenience and flexibility of e-business, but it also aggravates the risk and security threatening business activity. In order to prevent the vulnerable peers from involving in transaction and solve the trust problem of no-history record peers, this paper proposes a new trust model of P2P e-commerce, which is based on voting agreement. It...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.