Computer Science ›› 2019, Vol. 46 ›› Issue (12): 138-147.doi: 10.11896/jsjkx.181202307

• Information Security • Previous Articles     Next Articles

Trust Model for P2P Based on Blockchain

WU Dai-yue, LI Qiang, YU Xiang, HUANG Jun   

  1. (National University of Defense Technology,Hefei 230037,China)
  • Received:2018-12-14 Online:2019-12-15 Published:2019-12-17

Abstract: At present,in the process of trust evaluation of trust model,because the sources of evaluation data are not uniform,the ability of different nodes to obtain evaluation data is different,and the recognition degree of different nodes to data is also different,the computational results are low accuracy,subjective and difficult to be used as a reference.Aiming at these problems,this paper proposed a blockchain-based peer-to-peer network trust model,named ChainTrust.The evaluation sequence graph is defined.The indirect trust weight is determined according to the reliability of the indirect trust degree of the evaluation node.Meanwhile,this paper improved the current blockchain structure,by using the Merkle Patricia tree and the binary Merkle tree to store the evaluation data,and gave the corresponding storing and reading algorithms.Simulation and analysis results show that ChainTrust can better resist a variety of malicious attacks,thus reducing the impact from the collusion attack,changing the sensitivity of the model by adjusting the model parameters.Therefore,ChainTrust is effective and has high flexibility and universality.

Key words: Trust model, Evaluation data, Blockchain, Merkle patricia tree, Evaluation sequence graph, Collusion attack

CLC Number: 

  • TP393
[1] KAMVAR,SEPANDAR D,SCHLOSSER,et al.The Eigen- Trust Algorithm for reputation management in P2P networks[J].Proceedings of the 12th international conference on World Wide Web,2003,12(1):640-651.
[2] FAN X,LIU L,LI M,et al.EigenTrust++:Attack resilient trust management[C]//International Conference on Collaborative Computing:Networking,Applications and Worksharing.IEEE Computer Society,2012:416-425.
[3] XIONG L,LIU L.PeerTrust:Supporting reputation-based trust for peer-to-peer electronic communities[J].IEEE Transactions on Knowledge & Data Engineering,2004,16(7):843-857.
[4] NISHIKAWA T,FUJITA S.A reputation management scheme for peer-to-peer networks based on the EigenTrust trustmana-gement algorithm[J].Journal of Information Processing,2012,20(3):578-584.
[5] LU K,WANG J,LI M.An EigenTrust dynamic evolutionary model in P2P file-sharing systems[J].Peer-to-Peer Networking and Applications,2016,9(3):599-612.
[6] ZHANG L,LIU J W,WANG R C,et al.Trust evaluation model based on improved D- S evidence theory[J].Journal on Communications,2013,34(7):167-173.(in Chinese)张琳,刘婧文,王汝传,等.基于改进D-S证据理论的信任模型[J].通信学报,2013,34(7):167-173.
[7] HAN Q W,REN M Y,WEN H.Topological potential based recommendation trust model for P2P communities system[J].Journal of Electronics and Information Technology,2015,37(6):1279-1284.(in Chinese)韩祺祎,任梦吟,文红.基于拓扑势的P2P社区推荐信任模型[J].电子与信息学报,2015,37(6):1279-1284.
[8] CHEN S S.Trust model based on weight factor in P2P network[J].Journal of Computer Applications,2013,33(6):1612-1614.(in Chinese)陈珊珊.P2P网络中基于权重因素的信任模型[J].计算机应用,2013,33(6):1612-1614.
[9] FANG Q,JI Y,WU G X,et al.Run length coding-based dyna- mic trust model for P2P network[J].Journal of Software,2009,20(6):1602-1616.(in Chinese)方群,吉逸,吴国新,等.一种基于行程编码的P2P网络动态信任模型[J].软件学报,2009,20(6):1602-1616.
[10] LIU Y C,LIANG Y H.Dynamic P2P trust model based on context factors[J].Journal on Communications,2016,37(8):34-45.(in Chinese)刘义春,梁英宏.基于上下文因素的P2P动态信任模型[J].通信学报,2016,37(8):34-45.
[11] YOU J,SHANG G J L,XU S K,et al.Distributed dynamic trust management model based on trust reliability[J].Journal of Software,2017,28(9):2354-2369.(in Chinese)游静,上官经伦,徐守坤,等.考虑信任可靠度的分布式动态信任管理模型[J].软件学报,2017,28(9):2354-2369.
[12] RITU,JAIN S.A trust model in cloud computing based on fuzzy logic[C]//IEEE International Conference on Recent Trends in Electronics.IEEE,2017,47-52.
[13] LI H,MA X P,SHI J,et al.A recommendation model by means of trust transition in complex network environment[J].Acta Automatica Sinica,2018,44(2):363-376.(in Chinese)李慧,马小平,施珺,等.复杂网络环境下基于信任传递的推荐模型研究[J].自动化学报,2018,44(2):363-376.
[14] MENG X,LIU D.GeTrust:A guarantee-based trust model in Chord-based P2P networks[J].IEEE Transactions on Dependable & Secure Computing,2018,PP(99):54-68.
[15] NAKAMOTO S.Bitcoin:A peer-to-peer electronic cash system [OL].https://bitcoin.org/.
[16] DING W.Block chain based instrument data management system[J].China Instrumentation,2015,1(10):15-17.
[17] Ethereum White Paper.A next-generation smart contract and decentralized application platform [OL].(2015-11-12).https://github.com/ethereum/wiki/wiki/WhitePaper.
[18] TIAN J,DAI Y F.Study on durable peer-to-peer storage techniques[J].Journal of Software,2007,18(6):1379-1399.(in Chinese)田敬,代亚非.P2P持久存储研究[J].软件学报,2007,18(6):1379-1399.
[19] CHEN Y,HUI L,LI K,et al.An improved P2P file system scheme based on IPFS and Blockchain[C]//IEEE International Conference on Big Data.IEEE,2018.
[20] TIAN R H,LU X L,HOU M S,et al.P2P based distributed storage system[J].Computer Science,2007,34(6):47-48.(in Chinese)田荣华,卢显良,侯孟书,等.P2P分布式存储系统[J].计算机科学,2007,34(6):47-48.
[21] LI J,PENG Z,LI Y,et al.A data-check based distributed stora- ge model for storing hot temporary data[J].Future Generation Computer Systems,2017,73:13-21.
[22] YANG L,HUANG H,LI R F,et al.Composite P2P storage system based on group management[J].Computer Science,2010,37(1):64-67.(in Chinese)杨磊,黄浩,李仁发,等.一种基于分组管理的混合式P2P存储系统[J].计算机科学,2010,37(1):64-67.
[23] NetLogo.NetLogo[EB/OL].http://ccl.northwestern.edu/ netlogo/index.shtml.
[1] ZHANG Yan-mei, LOU Yin-cheng. Deep Neural Network Based Ponzi Scheme Contract Detection Method [J]. Computer Science, 2021, 48(1): 273-279.
[2] SHAO Wei-hui, WANG Ning, HAN Chuan-feng, XU Wei-sheng. Integrated Emergency-Defense System Based on Blockchain [J]. Computer Science, 2021, 48(1): 287-294.
[3] LI Ying, YU Ya-xin, ZHANG Hong-yu, LI Zhen-guo. High Trusted Cloud Storage Model Based on TBchain Blockchain [J]. Computer Science, 2020, 47(9): 330-338.
[4] LIU Shuai, GAN Guo-hua, LIU Ming-xi, FANG Yong, WANG Shou-yang. Multi-subblock Incentive Consensus Mechanism Based on Topology and Distribution Mechanism [J]. Computer Science, 2020, 47(7): 268-277.
[5] LU Ge-hao, XIE Li-hong and LI Xi-yu. Comparative Research of Blockchain Consensus Algorithm [J]. Computer Science, 2020, 47(6A): 332-339.
[6] LIN Xu-dan, BAO Shi-Jian, ZHAO Li-xin and ZHAO Chen-lin. Design and Performance Analysis of Automotive Supply Chain System Based on Hyperledger Fabric [J]. Computer Science, 2020, 47(6A): 546-551.
[7] ZHANG Qi-ming, LU Jian-hua, LI Shou-zhi and XU Jian-dong. Building Innovative Enterprise Customer Service Technology Platform Based on Blockchain [J]. Computer Science, 2020, 47(6A): 639-642.
[8] YE Shao-jie, WANG Xiao-yi, XU Cai-chao, SUN Jian-ling. BitXHub:Side-relay Chain Based Heterogeneous Blockchain Interoperable Platform [J]. Computer Science, 2020, 47(6): 294-302.
[9] XIE Ying-ying, SHI Jian, HUANG Shuo-kang, LEI Kai. Survey on Internet of Things Based on Named Data Networking Facing 5G [J]. Computer Science, 2020, 47(4): 217-225.
[10] WANG Hui, LIU Yu-xiang, CAO Shun-xiang, ZHOU Ming-ming. Medical Data Storage Mechanism Integrating Blockchain Technology [J]. Computer Science, 2020, 47(4): 285-291.
[11] FENG Tao, JIAO Ying, FANG Jun-li, TIAN Ye. Medical Health Data Security Model Based on Alliance Blockchain [J]. Computer Science, 2020, 47(4): 305-311.
[12] PAN Ji-fei,HUANG De-cai. Blockchain Dynamic Sharding Model Based on Jump Hash and Asynchronous Consensus Group [J]. Computer Science, 2020, 47(3): 273-280.
[13] LV Jian-fu,LAI Ying-xu,LIU Jing. Log Security Storage and Retrieval Based on Combination ofOn-chain and Off-chain [J]. Computer Science, 2020, 47(3): 298-303.
[14] ZHOU Chang,LU Hui-mei,XIANG Yong,WU Jing-bang. Survey on Application of Blockchain in VANET [J]. Computer Science, 2020, 47(2): 213-220.
[15] CHEN Meng-rong,LIN Ying,LAN Wei,SHAN Jin-zhao. Improvement of DPoS Consensus Mechanism Based on Positive Incentive [J]. Computer Science, 2020, 47(2): 269-275.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
[1] LEI Li-hui and WANG Jing. Parallelization of LTL Model Checking Based on Possibility Measure[J]. Computer Science, 2018, 45(4): 71 -75 .
[2] SUN Qi, JIN Yan, HE Kun and XU Ling-xuan. Hybrid Evolutionary Algorithm for Solving Mixed Capacitated General Routing Problem[J]. Computer Science, 2018, 45(4): 76 -82 .
[3] ZHANG Jia-nan and XIAO Ming-yu. Approximation Algorithm for Weighted Mixed Domination Problem[J]. Computer Science, 2018, 45(4): 83 -88 .
[4] WU Jian-hui, HUANG Zhong-xiang, LI Wu, WU Jian-hui, PENG Xin and ZHANG Sheng. Robustness Optimization of Sequence Decision in Urban Road Construction[J]. Computer Science, 2018, 45(4): 89 -93 .
[5] SHI Wen-jun, WU Ji-gang and LUO Yu-chun. Fast and Efficient Scheduling Algorithms for Mobile Cloud Offloading[J]. Computer Science, 2018, 45(4): 94 -99 .
[6] ZHOU Yan-ping and YE Qiao-lin. L1-norm Distance Based Least Squares Twin Support Vector Machine[J]. Computer Science, 2018, 45(4): 100 -105 .
[7] CUI Qiong, LI Jian-hua, WANG Hong and NAN Ming-li. Resilience Analysis Model of Networked Command Information System Based on Node Repairability[J]. Computer Science, 2018, 45(4): 117 -121 .
[8] WANG Zhen-chao, HOU Huan-huan and LIAN Rui. Path Optimization Scheme for Restraining Degree of Disorder in CMT[J]. Computer Science, 2018, 45(4): 122 -125 .
[9] YANG Yu-qi, ZHANG Guo-an and JIN Xi-long. Dual-cluster-head Routing Protocol Based on Vehicle Density in VANETs[J]. Computer Science, 2018, 45(4): 126 -130 .
[10] SHI Chao, XIE Zai-peng, LIU Han and LV Xin. Optimization of Container Deployment Strategy Based on Stable Matching[J]. Computer Science, 2018, 45(4): 131 -136 .