【正文】
works because of the sparsity of the transaction, there is not necessarily sufficient similarity with the individual nodes. Share information based on local trust model, shared access to information in two ways: first, to the other nodes by flooding a request for trust, poor scalability of the method。s social work, is based on observed past behavior or past behavior of individual information and expectations on individual difference between reputation and trust can I trust you because you have good credit or I trust you despite your credit is not good to shows that the credibility of the stress that a group of individuals or groups to a mon level of reliability and trust more to emphasize that trust in the individual39。 畢業(yè)論文(設(shè)計(jì))外文翻譯 題 目: 基于 C++局域網(wǎng)聊天系統(tǒng) 學(xué) 院: 數(shù)理與信息學(xué)院 學(xué)生姓名: 專 業(yè): 計(jì)算機(jī)科學(xué)與技術(shù) 班 級(jí): A07 計(jì)算機(jī) 指導(dǎo)教師: 起 止 日期: 至 2020 年 4 月 6 日 1 Paper1 P2P trust model Summary of the P2P work problems are analyzed, described the establishment of P2P work trust model work on the existing trust models are summarized, pointing out the direction of future research. Introduction With the Inter39。 individual obligation to the work to provide remended information to other , we can describe P2P works using the trust relationship between nodes, and to take trustbased incentive mechanisms to address these issues. (1) to provide differentiated services based on trust values In file sharing P2P work, nodes on the work resources according to the contribution level, to provide differentiated example, Kazaa nodes provide the resources and the ratio of consumption of resources into the system as a node in the level of participation and access to services as a priority of the nodes upload rate under each other to determine their own upload work node in accordance with the request of local trust values to set the node in the download queue priority. 3 Malicious use of work resources on the node to example, proposed incentives RTBMa focus on the Gnutella work file transfer type when the bandwidth allocation problem, according to the contribution of the node on the work for distribution of bandwidth a node share data, contribute to stimulate nodes to increase share the node from the node overload to download a file, contribution to reducing the value of the node to suppress the consumption of public resources. Differentiated services based incentives to encourage cooperation between nodes, and the rational use of work resources, in order to address freeriding and the tragedy of public goods problem. (2) According to the trust value of node selection service provider Node can be based on trust values to choose to trade with each example, in the eBay work, high trust value to buy the products business, which encourage businesses to maintain good sales practices and improve reliability of inhibit the P2P work is not reliable services, and fraud. The concept of trust Trust is a multidisciplinary concept, describes specific situations, an individual may have adverse consequences in the circumstances, want to believe that another individual has some ability to plete a task or a subjective contact with the concept of trust the credibility of credit from the individual39。s method is simple and easy to understand, but can not deal with the unfair trader is given . Kamvar global trust model EigenTrust proposed transaction history according to the node to calculate the local trust, and trust information to consider the remendation of the node, through the iterative trust between nodes to achieve the spread of the trust, thus calculated for each node in the . Dou and EigenTrust similar to the proposed global trust model, to solve the EigenTrust credibility in solving global problems when the existence of . Yamamoto proposed a distributed trust model for P2P works of trust between the nodes are modeled as Web page links, Pagerank 6 algorithm using a distributed approach to calculating the trust value of this model neglects the nodes and relations of trust between the different nodes differ, their rationality is . Xiong proposed PeerTrust to more effectively assess the trustworthiness of peers and describes a variety of malicious acts P2P munity will not only deal satisfaction feedback for evaluating the parameters of the trust, taking the total number of transactions, feedbackcredibility, the transaction context factor, the munity context results show that the trust model can effectively inhibit the malicious node . Mekouar made part of the distributed P2P work (such as KaZaa) the credibility of the management mechanism nodes in RMS_PDN passed between nodes in the trust evaluation, so that each supernode to its leaf node record of effective contribution to the system and the credibility as a leaf , all the nodes directly RMS_PDN feedback vulnerable to malicious nodes of joint fraud attacks. Global trust model ignores the private trust of features for a particular node, other nodes on the trust of his values are the global trust model vulnerable to malicious nodes joint fraud plex needs of global trust model of cooperation between the processing nodes trust the information, puting and munication costs are addition, largescale P2P work, each node in the global trust value puting the necessity and feasibility of further study. (2) the local trust model On P2P works have mostly focused on the trust model provides a mechanism which nodes can share information for a given node, the local trust value . Wang proposed a P2P environment based on Bayesian work trust trust model describes the main focus on different aspects of trust, which nodes can be based on different sce