Title :
A security policy based on bi-evaluations of trust and risk in P2P Systems
Author :
Zuo, Cuihua ; Zhou, Jianfang ; Feng, Hongcai
Author_Institution :
Dept. of Comput. & Inf., Wuhan Polytech. Univ., Wuhan, China
Abstract :
The recent and unprecedented surge of public interest in peer-to-peer (P2P) systems has led to a variety of interesting research questions. How to minimize threats in such an open community is an important research topic. Trust models have been widely used in estimating the trustworthiness of peers in P2P file-sharing systems where peers can transact with each other without prior experience. However, current P2P trust models almost take no consideration for the dynamic characteristic of trust, which results in low efficiency in resisting the attacks of malicious peers. In this paper, a new security policy that integrates aspects of trust and risk evaluations is proposed. We first introduce trust and risk evaluations for each transaction, and then apply them to control the access permission of transactions among peers in the network. Finally, simulation results prove that the security policy analyzed here thus stands against malicious act effectively.
Keywords :
authorisation; computer network security; peer-to-peer computing; transaction processing; P2P system; access permission; file-sharing system; malicious peers; peer-to-peer; security policy; Analytical models; Computer science education; Computer security; Educational technology; Information security; Peer to peer computing; Permission; Surges; Systems engineering education; Uncertainty; malicious act; peer-to-peer (P2P) system; risk; security policy; trust;
Conference_Titel :
Education Technology and Computer (ICETC), 2010 2nd International Conference on
Conference_Location :
Shanghai
Print_ISBN :
978-1-4244-6367-1
DOI :
10.1109/ICETC.2010.5530065