DocumentCode :
3271226
Title :
A security policy based on bi-evaluations of trust and risk in P2P Systems
Author :
Zuo, Cuihua ; Zhou, Jianfang ; Feng, Hongcai
Author_Institution :
Dept. of Comput. & Inf., Wuhan Polytech. Univ., Wuhan, China
Volume :
5
fYear :
2010
fDate :
22-24 June 2010
Abstract :
The recent and unprecedented surge of public interest in peer-to-peer (P2P) systems has led to a variety of interesting research questions. How to minimize threats in such an open community is an important research topic. Trust models have been widely used in estimating the trustworthiness of peers in P2P file-sharing systems where peers can transact with each other without prior experience. However, current P2P trust models almost take no consideration for the dynamic characteristic of trust, which results in low efficiency in resisting the attacks of malicious peers. In this paper, a new security policy that integrates aspects of trust and risk evaluations is proposed. We first introduce trust and risk evaluations for each transaction, and then apply them to control the access permission of transactions among peers in the network. Finally, simulation results prove that the security policy analyzed here thus stands against malicious act effectively.
Keywords :
authorisation; computer network security; peer-to-peer computing; transaction processing; P2P system; access permission; file-sharing system; malicious peers; peer-to-peer; security policy; Analytical models; Computer science education; Computer security; Educational technology; Information security; Peer to peer computing; Permission; Surges; Systems engineering education; Uncertainty; malicious act; peer-to-peer (P2P) system; risk; security policy; trust;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Education Technology and Computer (ICETC), 2010 2nd International Conference on
Conference_Location :
Shanghai
Print_ISBN :
978-1-4244-6367-1
Type :
conf
DOI :
10.1109/ICETC.2010.5530065
Filename :
5530065
Link To Document :
بازگشت