期刊文献+

P2P网络激励兼容的声誉评价及服务分配 被引量:2

Incentive compatible reputation evaluation and service assignment in P2P networks
在线阅读 下载PDF
导出
摘要 由自私节点组成的P2P网络常常采用基于声誉的机制激励节点间的合作。当前已经提出了一类基于声誉的方案,但其中大部分方案都忽视了方案的分布式实现中惩罚的激励兼容性问题。在社会学或生态学领域,该问题常被称为二阶搭便车问题:拒绝低声誉节点的服务请求会降低惩罚者自身的声誉,因此对于自私节点而言,这种惩罚并不总是有利的选择。以P2P文件共享为例对该问题进行了分析,提出了一种连续型二阶声誉评价模型及两种服务分配规则,即概率分配规则和比例分配规则,实验表明只有概率分配规则是激励兼容的。 P2P networks are usually made of selfish nodes where the incentive mechanisms based on reputation are often used to induce cooperation.A class of schemes based on reputation has been proposed,but almost all of them ignore the incentive compatibility of punishment when the schemes are implemented in distributed model.It is usually called second-ordered free riding in the researches of sociology or ecology: refusing service request from nodes with low reputation will increase the punisher's own reputation,so refusing isn't always a favorable choice for selfish node.The paper discussed this problem in P2P file sharing networks and proposed a continuous second-ordered reputation evaluation model and two service assignment rules: probabilistic assignment rule and proportional assignment rule.The experiments show that only the first one is incentive compatible.
作者 于坤
出处 《计算机应用研究》 CSCD 北大核心 2012年第6期2317-2320,共4页 Application Research of Computers
关键词 P2P网络 声誉评价 激励机制 二阶声誉 P2P network reputation evaluation incentive mechanism second reputation
  • 相关文献

参考文献8

  • 1Maze系统[Z].[2007-02-14].http://maze.pku.edu.cn.
  • 2WANG Chun-zhi, CHEN Hong-wei. A peer-to-peer game model using punishment strategies [ J ]. Journal of Networks,2010,5 ( 11 ) : 1357-1364.
  • 3BUCHEGGER S, LEBOUDEC J. Performance analysis of the CONFIDANT protocol : cooperation of nodes : fairness in dynamic Ad hoc net- works[ C ]//Proc of IEEE/ACM Symposium on Mobile Ad hoc NetWorking and Computing (MobiHOC). 2002:226-236.
  • 4RANGANATHAN K, RIPEANU M. To share or not to share : an analysis of incentives to contribute in collaborative file sharing environments [ C ]//Proc of Workshop on Economics of Peer-to-Peer Systems. 2003.
  • 5NOWAK M A, SIGMUND K. Evolution of indirect reciprocity by image scoring[ J]. Nature, 1998,393(6685 ) :573-577.
  • 6PANCHANATHAN K, BOYD R. A tale of two defectors: the importance of standing for evolution of indirect reciprocity [ J ]. ,Journal of Theoretical Biology ,2003,224( 1 ) : 115-126.
  • 7BLANC A, LIU Y K, VAHDAT A. Designing incentives for peer-to- peer routing [ C ]//Proe of IEEE INFOCOM. 2005:374-385.
  • 8HOFBAUER J, SIGMUND K. Evolutionary gamesand population dynamics [ M ]. Cambridge : Cambridge University Press, 1998.

共引文献1

同被引文献31

  • 1Wang Y, Vassileva J. Toward Trust and Reputation Based Web Service Selection: A Survey[J]. International Transactions on Systems Science and Applications,2007,3(2):1l18-132.
  • 2Yolum P,Singh M P. An agent-based approach for trustworthy service loeation[C]//Proc, of the 1st Int'l Workshop on Agents and Peer-to-Peer Computing. 2002:45-56.
  • 3Sensoy M, Pembe F C, Zirtiloglu H, et al. A Experience-Based service provider selection in agent-mediated e-commerce[J]. En- gineering Applications of Artificial Intelligence, 2007, 20 ( 3 ) : 325-335.
  • 4Yu B,Singh M P. Social Networks and Trust:Detecting Decep- tion in Reputation management [C]//Proc. Int ' 1 Joint Conf. Autonomous Agents and Multi-agent Systems. 2003:73-80.
  • 5Galizia S, Gugliotta A, Domingue J. A Trust Based Methodology for Web Service Seleetion[C]ffInternational Conference on Se- mantic Computing. 2007:193-201.
  • 6Manikrao U S,Prabhakar T V. Dynamic Selection of Web Serv- ices with Recommendation System[C] // International Confe- rence on Next Generation Web services Practices. August 2005 : 342-352.
  • 7Maximilien E M, Singh M P. Toward autonomic Web services trust and selection[C]//Proceedings of the 2nd International Conference on Service Oriented Computing. ACM Press, 2004: 212-221.
  • 8Maximilien E M, Singh M P. Conceptual Model of Service Repu- tation[C] // Special Section on Semantic Web and Data Manage- ment. SIGMOD Record, 2002 : 264-283.
  • 9Aberer K, Despotovic Z. Managing trust in a peer-2-peer infor- mation system[C] //Proceedings of CIKM. 2001 : 142-156.
  • 10Damiani E, Vimercati D, 13 C, et al. Resources in peer-to-peer networks [C] // Proceedings of ACM conference on computer and communications security (CCCS). 2002:185-198.

引证文献2

二级引证文献10

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部