计算机科学 ›› 2019, Vol. 46 ›› Issue (12): 138-147.doi: 10.11896/jsjkx.181202307

所属专题: 区块链技术

• 信息安全 • 上一篇    下一篇

基于区块链的对等网络信任模型

巫岱玥, 李强, 余祥, 黄郡   

  1. (国防科技大学 合肥230037)
  • 收稿日期:2018-12-14 出版日期:2019-12-15 发布日期:2019-12-17
  • 通讯作者: 李强(1962-),男,教授,硕士生导师,主要研究方向为区块链、软件工程、信息安全,E-mail:lychfeei@163.com。
  • 作者简介:巫岱玥(1994-),男,主要研究方向为区块链、信息安全;余祥(1986-),男,博士生,讲师,主要研究方向为信息安全;黄郡(1983-),男,博士,讲师,主要研究方向为信息安全。
  • 基金资助:
    本文受国防科技大学科研基金项目(KYJ2017J351)资助。

Trust Model for P2P Based on Blockchain

WU Dai-yue, LI Qiang, YU Xiang, HUANG Jun   

  1. (National University of Defense Technology,Hefei 230037,China)
  • Received:2018-12-14 Online:2019-12-15 Published:2019-12-17

摘要: 目前,在信任模型的信任评估过程中,评价数据的来源不统一,使得不同节点获取评价数据的能力不同,不同节点对数据的认可度也不同,从而导致计算结果精度不高且较为主观,难以作为参考。针对此问题,提出基于区块链的对等网络信任模型ChainTrust。首先,定义评价序列图,根据评估节点在网络中间接信任度的可靠程度来确定间接信任度的权重。同时,改进已有区块链结构,使用Merkle Patricia树和二叉Merkle树对评价数据进行存储,进一步提高评价数据的安全性,并给出对应的存储、读取算法。仿真与分析结果表明,ChainTrust能较好地抵御恶意攻击,有效降低共谋攻击对信任评估带来的影响,并能通过调整模型参数改变模型的敏感程度。因此,ChainTrust模型是有效的,且具有较高的灵活性和普适性。

关键词: Merkle Patricia树, 共谋攻击, 评价数据, 评价序列图, 区块链, 信任评估

Abstract: At present,in the process of trust evaluation of trust model,because the sources of evaluation data are not uniform,the ability of different nodes to obtain evaluation data is different,and the recognition degree of different nodes to data is also different,the computational results are low accuracy,subjective and difficult to be used as a reference.Aiming at these problems,this paper proposed a blockchain-based peer-to-peer network trust model,named ChainTrust.The evaluation sequence graph is defined.The indirect trust weight is determined according to the reliability of the indirect trust degree of the evaluation node.Meanwhile,this paper improved the current blockchain structure,by using the Merkle Patricia tree and the binary Merkle tree to store the evaluation data,and gave the corresponding storing and reading algorithms.Simulation and analysis results show that ChainTrust can better resist a variety of malicious attacks,thus reducing the impact from the collusion attack,changing the sensitivity of the model by adjusting the model parameters.Therefore,ChainTrust is effective and has high flexibility and universality.

Key words: Blockchain, Collusion attack, Evaluation data, Evaluation sequence graph, Merkle patricia tree, Trust model

中图分类号: 

  • TP393
[1]KAMVAR,SEPANDAR D,SCHLOSSER,et al.The Eigen- Trust Algorithm for reputation management in P2P networks[J].Proceedings of the 12th international conference on World Wide Web,2003,12(1):640-651.
[2]FAN X,LIU L,LI M,et al.EigenTrust++:Attack resilient trust management[C]//International Conference on Collaborative Computing:Networking,Applications and Worksharing.IEEE Computer Society,2012:416-425.
[3]XIONG L,LIU L.PeerTrust:Supporting reputation-based trust for peer-to-peer electronic communities[J].IEEE Transactions on Knowledge & Data Engineering,2004,16(7):843-857.
[4]NISHIKAWA T,FUJITA S.A reputation management scheme for peer-to-peer networks based on the EigenTrust trustmana-gement algorithm[J].Journal of Information Processing,2012,20(3):578-584.
[5]LU K,WANG J,LI M.An EigenTrust dynamic evolutionary model in P2P file-sharing systems[J].Peer-to-Peer Networking and Applications,2016,9(3):599-612.
[6]ZHANG L,LIU J W,WANG R C,et al.Trust evaluation model based on improved D- S evidence theory[J].Journal on Communications,2013,34(7):167-173.(in Chinese)
张琳,刘婧文,王汝传,等.基于改进D-S证据理论的信任模型[J].通信学报,2013,34(7):167-173.
[7]HAN Q W,REN M Y,WEN H.Topological potential based recommendation trust model for P2P communities system[J].Journal of Electronics and Information Technology,2015,37(6):1279-1284.(in Chinese)
韩祺祎,任梦吟,文红.基于拓扑势的P2P社区推荐信任模型[J].电子与信息学报,2015,37(6):1279-1284.
[8]CHEN S S.Trust model based on weight factor in P2P network[J].Journal of Computer Applications,2013,33(6):1612-1614.(in Chinese)
陈珊珊.P2P网络中基于权重因素的信任模型[J].计算机应用,2013,33(6):1612-1614.
[9]FANG Q,JI Y,WU G X,et al.Run length coding-based dyna- mic trust model for P2P network[J].Journal of Software,2009,20(6):1602-1616.(in Chinese)
方群,吉逸,吴国新,等.一种基于行程编码的P2P网络动态信任模型[J].软件学报,2009,20(6):1602-1616.
[10]LIU Y C,LIANG Y H.Dynamic P2P trust model based on context factors[J].Journal on Communications,2016,37(8):34-45.(in Chinese)
刘义春,梁英宏.基于上下文因素的P2P动态信任模型[J].通信学报,2016,37(8):34-45.
[11]YOU J,SHANG G J L,XU S K,et al.Distributed dynamic trust management model based on trust reliability[J].Journal of Software,2017,28(9):2354-2369.(in Chinese)
游静,上官经伦,徐守坤,等.考虑信任可靠度的分布式动态信任管理模型[J].软件学报,2017,28(9):2354-2369.
[12]RITU,JAIN S.A trust model in cloud computing based on fuzzy logic[C]//IEEE International Conference on Recent Trends in Electronics.IEEE,2017,47-52.
[13]LI H,MA X P,SHI J,et al.A recommendation model by means of trust transition in complex network environment[J].Acta Automatica Sinica,2018,44(2):363-376.(in Chinese)
李慧,马小平,施珺,等.复杂网络环境下基于信任传递的推荐模型研究[J].自动化学报,2018,44(2):363-376.
[14]MENG X,LIU D.GeTrust:A guarantee-based trust model in Chord-based P2P networks[J].IEEE Transactions on Dependable & Secure Computing,2018,PP(99):54-68.
[15]NAKAMOTO S.Bitcoin:A peer-to-peer electronic cash system [OL].https://bitcoin.org/.
[16]DING W.Block chain based instrument data management system[J].China Instrumentation,2015,1(10):15-17.
[17]Ethereum White Paper.A next-generation smart contract and decentralized application platform [OL].(2015-11-12).https://github.com/ethereum/wiki/wiki/WhitePaper.
[18]TIAN J,DAI Y F.Study on durable peer-to-peer storage techniques[J].Journal of Software,2007,18(6):1379-1399.(in Chinese)
田敬,代亚非.P2P持久存储研究[J].软件学报,2007,18(6):1379-1399.
[19]CHEN Y,HUI L,LI K,et al.An improved P2P file system scheme based on IPFS and Blockchain[C]//IEEE International Conference on Big Data.IEEE,2018.
[20]TIAN R H,LU X L,HOU M S,et al.P2P based distributed storage system[J].Computer Science,2007,34(6):47-48.(in Chinese)
田荣华,卢显良,侯孟书,等.P2P分布式存储系统[J].计算机科学,2007,34(6):47-48.
[21]LI J,PENG Z,LI Y,et al.A data-check based distributed stora- ge model for storing hot temporary data[J].Future Generation Computer Systems,2017,73:13-21.
[22]YANG L,HUANG H,LI R F,et al.Composite P2P storage system based on group management[J].Computer Science,2010,37(1):64-67.(in Chinese)
杨磊,黄浩,李仁发,等.一种基于分组管理的混合式P2P存储系统[J].计算机科学,2010,37(1):64-67.
[23]NetLogo.NetLogo[EB/OL].http://ccl.northwestern.edu/ netlogo/index.shtml.
[1] 王子凯, 朱健, 张伯钧, 胡凯.
区块链与智能合约并行方法研究与实现
Research and Implementation of Parallel Method in Blockchain and Smart Contract
计算机科学, 2022, 49(9): 312-317. https://doi.org/10.11896/jsjkx.210800102
[2] 周航, 姜河, 赵琰, 解相朋.
适用于各单元共识交易的电力区块链系统优化调度研究
Study on Optimal Scheduling of Power Blockchain System for Consensus Transaction ofEach Unit
计算机科学, 2022, 49(6A): 771-776. https://doi.org/10.11896/jsjkx.210600241
[3] 李博, 向海昀, 张宇翔, 廖浩德.
面向食品溯源场景的PBFT优化算法应用研究
Application Research of PBFT Optimization Algorithm for Food Traceability Scenarios
计算机科学, 2022, 49(6A): 723-728. https://doi.org/10.11896/jsjkx.210800018
[4] 傅丽玉, 陆歌皓, 吴义明, 罗娅玲.
区块链技术的研究及其发展综述
Overview of Research and Development of Blockchain Technology
计算机科学, 2022, 49(6A): 447-461. https://doi.org/10.11896/jsjkx.210600214
[5] 高健博, 张家硕, 李青山, 陈钟.
RegLang:一种面向监管的智能合约编程语言
RegLang:A Smart Contract Programming Language for Regulation
计算机科学, 2022, 49(6A): 462-468. https://doi.org/10.11896/jsjkx.210700016
[6] 毛典辉, 黄晖煜, 赵爽.
符合监管合规性的自动合成新闻检测方法研究
Study on Automatic Synthetic News Detection Method Complying with Regulatory Compliance
计算机科学, 2022, 49(6A): 523-530. https://doi.org/10.11896/jsjkx.210300083
[7] 王思明, 谭北海, 余荣.
面向6G可信可靠智能的区块链分片与激励机制
Blockchain Sharding and Incentive Mechanism for 6G Dependable Intelligence
计算机科学, 2022, 49(6): 32-38. https://doi.org/10.11896/jsjkx.220400004
[8] 孙浩, 毛瀚宇, 张岩峰, 于戈, 徐石成, 何光宇.
区块链跨链技术发展及应用
Development and Application of Blockchain Cross-chain Technology
计算机科学, 2022, 49(5): 287-295. https://doi.org/10.11896/jsjkx.210800132
[9] 阳真, 黄松, 郑长友.
基于区块链与改进CP-ABE的众测知识产权保护技术研究
Study on Crowdsourced Testing Intellectual Property Protection Technology Based on Blockchain and Improved CP-ABE
计算机科学, 2022, 49(5): 325-332. https://doi.org/10.11896/jsjkx.210900075
[10] 任畅, 赵洪, 蒋华.
一种量子安全拜占庭容错共识机制
Quantum Secured-Byzantine Fault Tolerance Blockchain Consensus Mechanism
计算机科学, 2022, 49(5): 333-340. https://doi.org/10.11896/jsjkx.210400154
[11] 冯了了, 丁滟, 刘坤林, 马科林, 常俊胜.
区块链BFT共识算法研究进展
Research Advance on BFT Consensus Algorithms
计算机科学, 2022, 49(4): 329-339. https://doi.org/10.11896/jsjkx.210700011
[12] 王鑫, 周泽宝, 余芸, 陈禹旭, 任昊文, 蒋一波, 孙凌云.
一种面向电能量数据的联邦学习可靠性激励机制
Reliable Incentive Mechanism for Federated Learning of Electric Metering Data
计算机科学, 2022, 49(3): 31-38. https://doi.org/10.11896/jsjkx.210700195
[13] 张潆藜, 马佳利, 刘子昂, 刘新, 周睿.
以太坊Solidity智能合约漏洞检测方法综述
Overview of Vulnerability Detection Methods for Ethereum Solidity Smart Contracts
计算机科学, 2022, 49(3): 52-61. https://doi.org/10.11896/jsjkx.210700004
[14] 杨昕宇, 彭长根, 杨辉, 丁红发.
基于演化博弈的理性拜占庭容错共识算法
Rational PBFT Consensus Algorithm with Evolutionary Game
计算机科学, 2022, 49(3): 360-370. https://doi.org/10.11896/jsjkx.210900110
[15] 范家幸, 王志伟.
基于门限环签名的分级匿名表决方案
Hierarchical Anonymous Voting Scheme Based on Threshold Ring Signature
计算机科学, 2022, 49(1): 321-327. https://doi.org/10.11896/jsjkx.201000032
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!