【正文】
isfied with feedback, so trust in the information storage node PeerTrust proposed mechanism allows nodes to provide feedback according to the node with its own individual choices similar feedback to calculate a given node of the subjective reliability of this method to 7 prevent fraud attacks the joint node, but in largescale P2P works because of the sparsity of the transaction, there is not necessarily sufficient similarity with the individual nodes. Share information based on local trust model, shared access to information in two ways: first, to the other nodes by flooding a request for trust, poor scalability of the method。s trustworthiness and product description, munication with the buyer, delivery time, delivery and related practical applications, the nodes will affect the credibility of all the factors that quantify the confidence and credibility of integrated reached node is not , under normal circumstances, the trust model in P2P works, according to the node between satisfaction with the transaction to determine credibility. credibility, trust and mutually beneficial relationship Shown in Figure 1, if node A has a reciprocal behavior of other nodes, then A will have a good reputation, so node A will be other nodes in the trust, and transaction reciprocal behavior by other plan involves a trusted work of reciprocity, or you can call it incentive the social field, only when the behavior of the past affect the future (for sociology as the future of the shadow (Shadow of Future) phenomenon), people have incentive to build mutual , the trust model and the incentive mechanism of interaction between the good, P2P works can effectively promote the cooperation between nodes. Figure 1 credit, trust and mutually beneficial relationship between a simple model Trust Model classification In P2P work, there are all kinds of attack models, including: fraud, counterfeiting, defamation, fraud bined with a frontend node (headend node generally provide reliable service, the cooperative nodes give a fair evaluation. However, these frontend nodetrying to give a high internal malicious nodes to disguise malicious node positive behavior) of the joint fraud, change the ID to reenter the work node and the nodes intermittently to provide credible information and services, or the accumulation of credit to a certain height, the use ofits high trust value, fraud, slander or joint fraud of the current trust model focused on solving the problem of certain types of attacks, according to the method to establish trust relationships can be broadly divided into the trust model based on trusted third parties, and based on the feedback / evaluation of two types of trust model. Trust Model based on trusted third party Such trust model in the traditional PKI security system technology, a small number of leaders through the work node to monitor the operation of the whole work, and regularly circular 5 nodes or to punish legitimacy of these leaders node certificates issued by CA to be guaranteed. Such systems often rely on a small central node, so there is a single point of failure, and scalability issues. Based on feedback / evaluation of the trust model Trust model for P2P works generally fall into this category, according to the different objects to be trusted, there is as resources to build the credibility and the credibility of the transaction nodes in two former focuses on P2P works can access the information39。s social work, is based on observed past behavior or past behavior of individual information and expectations on individual difference between reputation and trust can I trust you because you have good credit or I trust you despite your credit is not good to shows that the credibility of the stress that a group of individuals or groups to a mon level of reliability and trust more to emphasize that trust in the individual39。s daily P2P work and the similarity of human social works embodied in the P2P work between individuals interact with each other for each other left sporadic credit information。 畢業(yè)論文(設(shè)計(jì))外文翻譯 題 目: 基于 C++局域網(wǎng)聊天系統(tǒng) 學(xué) 院: 數(shù)理與信息學(xué)院 學(xué)生姓名: 專 業(yè): 計(jì)算機(jī)科學(xué)與技術(shù) 班 級(jí): A07 計(jì)算機(jī) 指導(dǎo)教師: 起 止 日期: 至 2020 年 4 月 6 日 1 Paper1 P2P trust model Summary of the P2P work problems are analyzed, described the establishment of P2P work trust model work on the existing trust models are summarized, pointing out the direction of future research. Introduction With the Inter39。s overall effectiveness. 2 (3) not reliable services, and fraud P2P work, there are a large number of unreliable service quality, and the many filesharing application, for example, 25% of the documents were forged documents (Faked Files).This is similar to eBay in emerce, this is not a reliable service and fraud to the user impact is more serious. Therefore, effective mechanisms must be designed to regulate the behavior of nodes in P2P works to address these three issues, to improve the availability of P2P services to promote effective collaboration node and the rational use of work resources. Why is the trust model Nodes that have their own rights, selforganizing P2P work, how to regulate the behavior of the node? In fact, P2P works provide realworld work environment of human munication, humancentered works, and social works with the same trust as an integral part of social existence, is the social work in the core of relations between society, reputationbased trust relationship with the incentive mechanism to restrict people39。 individual obligation to the work to provide remended information to other , we can describe P2P works using the trust relationship between nodes, and to take tru