Method for establishing peer-to-peer network storage data trust model

A peer-to-peer network, trust model technology, used in data exchange networks, digital transmission systems, electrical components, etc.

Inactive Publication Date: 2012-07-11
ZHEJIANG GONGSHANG UNIVERSITY
View PDF3 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Although there are many researches on the trust model at present, most of the known peer-to-peer network trust models set the trust value of newly joined nodes as a constant. Although this will allow new users to obtain trading opportunities, it will lead to malicious nodes. Clear previous malicious records by re-registering users, and carry out "washing"

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for establishing peer-to-peer network storage data trust model
  • Method for establishing peer-to-peer network storage data trust model
  • Method for establishing peer-to-peer network storage data trust model

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0037] The present invention "a trust model establishment method for peer-to-peer network storage" proposes a brand-new trust model establishment method applied to peer-to-peer network storage, figure 1 and figure 2 The technical routes of the present invention in the data storage and data reading processes are respectively summarized. The technical solution will be further described below in conjunction with the accompanying drawings and examples.

[0038] In a peer-to-peer network, each peer node is assigned a globally unique identification number, and a storage space (such as a linked list) is allocated for storing information of other nodes except this node. The following example illustrates the process of establishing a trust model.

[0039] Assume that there are 5 nodes in the current peer-to-peer network, namely node 1, node 2, node 3, node 4, and node 5, and the time window is set to 10 minutes. Create a linked list with a length of 4 elements on each node, each el...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses 'a method for establishing a peer-to-peer network storage data trust model', relates to the technical field of distributed storage security, and has a wide application prospect in the field of peer-to-peer network storage. The method is characterized in that: aiming at the characteristic of the current trust model which is vulnerable to a 'wash bottom' attack because a fixed trust value is endowed to the node of a newly added network, a method for dynamically configuring node initial values is provided; and simultaneously, a storage trust value concept and a data read trust value concept are provided for improving the flexibility of a trust model in the field of network storage, and the proportion of the two trust values in a final result is regulated by storing a preference factor. Compared with other peer-to-peer network storage data trust models, the peer-to-peer network storage data trust model is more flexibly configured and has a wider application range. A simulation experiment shows that the model has a higher transaction success rate than the classical EigenTrust trust model under large-scale 'wash bottom' attacks.

Description

Technical field [0001] The present invention is an information security solution based on a trust mechanism in network storage, which resists malicious attacks in network storage by establishing a trust relationship between storage nodes and a selection method of storage nodes, and belongs to distributed data storage security technology field. Background technique [0002] With the popularization of the Internet and the continuous advancement of Web2.0 technology, all kinds of information on the Internet have shown explosive growth. The traditional information storage technology can no longer meet the needs of massive data storage. Resource construction of a peer-to-peer network storage system has become a research hotspot in current network storage. However, due to the openness and dynamics of the peer-to-peer network and its autonomous management mode, it is inevitable that there will be a large number of malicious nodes and fraudulent behaviors in the peer-to-peer networ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/08H04L29/06H04L12/56
Inventor 蒋晓宁甘志刚刘君强余斌霄
Owner ZHEJIANG GONGSHANG UNIVERSITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products