基于信任模糊评价的P2P访问控制模型  被引量:1

Access Control Model of P2P Based on Trust Fuzzy Evaluation

在线阅读下载全文

作  者:龚翱[1] 刘浩[1] 

机构地区:[1]湖南人文科技学院信息科学与工程系,湖南娄底417000

出  处:《计算机工程》2015年第3期125-129,共5页Computer Engineering

基  金:湖南省自然科学基金资助项目(11JJ3074);湖南省科技计划基金资助项目(2012GK3117);湖南省教育厅科学研究基金资助项目(12C0744)

摘  要:应用社会信任网络构建的基本原理,给出一种新的P2P访问控制模型。将P2P节点间的信任关系分为直接信任、信任知识和推荐信任3个方面,利用模糊理论对P2P节点进行信任评价,通过扩展多级安全机制实现访问控制,在P2P中的节点间进行交互时,主体节点根据目标节点的信任等级授予其不同的访问权限,以达到保护P2P网络安全的目标,引入加密与数字签名等安全机制,有效地抑制冒名、窃听和女巫攻击等一系列安全性攻击。在P2P网络中恶意节点比重变化的情况下,对引入该访问控制模型前后的情况进行对比实验,结果表明,引入模型后P2P网络中的节点交互成功率有较大提高。Drawing lessons from the basic principles of social trust network,this paper proposes an access control mode of P2P based on trust of fuzzy evaluation. The trust relationship between nodes is divided into three aspects,direct trust,knowledge of trust,and recommendation trust. It adopts fuzzy theory to evaluate the trust of nodes in P2P network,and realizes access control by extending the Multi-level Security(MLS)mechanism. Before the transaction can be generated between the nodes,according to the trust level of the object node,the subject node grants it different access privileges,so that,the goal of P2P network security is achieved. Some security mechanisms,such as encryption and digital signature,are introduced into this model,as a result,this model is capable of effectively restraining several typical security attacks such as impostor,eavesdrop,and sybil attack. When the proportion of malicious nodes in P2P network is changing,the contrast experiment is doing with the network containing the access control model and without this model. Results show that the success interaction rate of nodes is greatly improved.

关 键 词:P2P网络 模糊评价 访问控制 多级安全 授权 安全策略 

分 类 号:TP393[自动化与计算机技术—计算机应用技术]

 

参考文献:

正在载入数据...

 

二级参考文献:

正在载入数据...

 

耦合文献:

正在载入数据...

 

引证文献:

正在载入数据...

 

二级引证文献:

正在载入数据...

 

同被引文献:

正在载入数据...

 

相关期刊文献:

正在载入数据...

相关的主题
相关的作者对象
相关的机构对象