By Topic

A security policy based on bi-evaluations of trust and risk in P2P Systems

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$33 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

3 Author(s)
Cuihua Zuo ; Department of Computer and Information Department of Computer, Engineering Wuhan Polytechnic, UniversityWuhan 430023, China ; Jianfang Zhou ; Hongcai Feng

The recent and unprecedented surge of public interest in peer-to-peer (P2P) systems has led to a variety of interesting research questions. How to minimize threats in such an open community is an important research topic. Trust models have been widely used in estimating the trustworthiness of peers in P2P file-sharing systems where peers can transact with each other without prior experience. However, current P2P trust models almost take no consideration for the dynamic characteristic of trust, which results in low efficiency in resisting the attacks of malicious peers. In this paper, a new security policy that integrates aspects of trust and risk evaluations is proposed. We first introduce trust and risk evaluations for each transaction, and then apply them to control the access permission of transactions among peers in the network. Finally, simulation results prove that the security policy analyzed here thus stands against malicious act effectively.

Published in:

2010 2nd International Conference on Education Technology and Computer  (Volume:5 )

Date of Conference:

22-24 June 2010