現在位置首頁 > 博碩士論文 > 詳目
  • 同意授權
論文中文名稱:標準化推薦值之信賴模型 [以論文名稱查詢館藏系統]
論文英文名稱:A trust-model based on standardized feedback [以論文名稱查詢館藏系統]
院校名稱:臺北科技大學
學院名稱:管理學院
系所名稱:資訊與運籌管理研究所
畢業學年度:101
出版年度:102
中文姓名:李湘茹
英文姓名:Shiang-Ru Li
研究生學號:100938008
學位類別:碩士
語文別:中文
口試日期:2013-06-27
論文頁數:38
指導教授中文名:陳育威
口試委員中文名:陳世賢;吳建文
中文關鍵詞:信賴模型標準化推薦值P2P
英文關鍵詞:standardizedtrust modeltrust valuePeer-to-Peermalicious behaviors
論文中文摘要:近年來網際網路迅速發展,線上社群與論壇的使用者日益增加,對檔案分享與資料傳送之需求也有增多趨勢。然而,P2P網路存在著一個主要的問題:大部分的節點對於在網路中的其他節點並不熟悉,在決定是否要從某節點下載檔案時,存在潛藏的風險。許多學者紛紛提出以信賴模型(trust-model)為基礎的解決方案,然而,先前的信賴模型皆為直接採取節點所推薦的分數來計算,因為每個人的評分習慣不同,如此將造成信賴值的誤差。
本論文提出一應用於P2P網路中:標準化推薦值之信賴模型,利用標準化(standardizing)推薦因子,此考量每個評分者過去的評分習慣,計算出他的評分區間範圍,再對應到一新的介於0到1之間的數值作為該次的推薦分數,另外,也考量其他因子,如:歷史因子、風險因子、獎勵因子,以上各因子分別配給相對應的權重,結算出一信賴值,以供節點在決定是否和某節點進行交易時做為一參考依據。
再者,本研究將與先前所提之MFTM模型進行分析比較,實驗模擬證明本研究所提之stdF Model 效能較佳。期望透過本論文所提之信賴模型,使每個節點的信賴值愈發準確,並能紓減目前在P2P環境中仍存在的問題,如節點上傳惡意檔案提供下載、過度放大本身評價等問題,進而提升P2P網路的服務品質。
論文英文摘要:With the blossom of peer-to-peer (P2P) applications, more and more people share resources through online community or forum. However, there is a major problem in the P2P environment - all nodes share resources using the same anonymous identity. There are potential risks when a user of a node decides to download files from the other nodes. Many solutions were based on a previous proposed trust-model which takes feedback and calculates trust values of nodes directly. However, it may have some calculation errors since behavior of evaluation differs from person to person.

In this paper, we elaborate on a newly designed “a trust-model based on standardized feedback” (stdF model). It can calculate trust values of a node with standardized feedback factor, historical factor, risk factor, and incentive factor. After that, it will make a decision if a node is going to download files from another node or not. Moreover, performance of the proposed method is evaluated by simulation. Compared to MFTM model, results of simulations indicate that stdF model is much better.
論文目次:目錄
摘 要 I
ABSTRACT II
誌謝 III
目錄 IV
表目錄 V
圖目錄 VI
第一章 緒論 1
第二章 文獻探討 3
第三章 標準化推薦值之信賴模型 8
3.1 系統架構 9
3.2 各因子與變數 10
3.2.1 歷史因子 11
3.2.2 推薦因子 12
3.2.3 風險因子 13
3.2.4 獎勵因子 13
3.3 信賴值運算公式 14
第四章 模擬與效能評估 15
4.1 模擬環境建置 15
4.2 模擬環境中之參數設定 16
4.3 交易成功率之評估與分析 17
4.4 不正確檔案下載次數比較 27
第五章 結論 36
參考文獻 37
論文參考文獻:[1]C. Jia, L. Xie, X. Gan, W. Liu and Z. Han “A trust and reputation model considering overall peer consulting distribution,” IEEE Transactions on Systems, Man and Cybernetics, Part A: Systems and Humans, Vol. 42, No. 1, pp. 164–177, 2012.
[2]B. Yu, M.P. Singh and K. Sycara, “Developing trust in large-scale peer-to-peer systems,” in 2004 IEEE First Symposium on Multi-Agent Security and Survivability, pp. 1–10, 2004.
[3]X. Qin, C. Zhang, Q. Lei and Y. Guo, “A trust model for data-sharing in virtual communities,” in 2012 IEEE International Conference on Computer Science and Automation Engineering (CSAE), pp. 558–562, 2012.
[4]I. Agudo, C. Fernandez-Gago and J. Lopez, “A scale based trust model for multi-context environments,” Computers & Mathematics with Applications, Vol. 60, No. 2, pp. 209–216, 2010.
[5]T. Nishikawa and S. Fujita, “An effective risk avoidance scheme for the EigenTrust reputation management system,” in 2010 1st International Conference on Networking and Computing (ICNC), pp. 36–43, 2010.
[6]X. Meng, Y. Ding and Y. Gong, “@Trust: a trust model based on feedback-arbitration in structured P2P network,” Computer Communications, Vol. 35, No. 16, pp. 2044–2053, 2012
[7]S. D. Kamvar, M. T. Schlosser and H. Garcia-Molina, “The EigenTrust algorithm for reputation management in P2P networks,” in Proceedings of the 12th International World Wide Web Conference, pp. 640-651, 2003.
[8]W.B. Tesfay, T. Booth and K. Andersson, “Reputation based security model for android applications,” in 2012 IEEE 1st International Conference on Trust, Security and Privacy in Computing and Communications, pp. 896–901, 2012.
[9]F. Zhu, G. Yang and Z. Tan, “A commodity’s reputation-based trust model of P2P e-commerce systems,” in 2010 4th International Conference on Genetic and Evolutionary Computing, pp. 430–433, 2010.
[10]Z. Li, J. Yao and L. Shi, “The mechanism to control file-pollution based on hybrid trust-model in P2P network,” in 2011 IEEE International Conference on Anti-Counterfeiting, Security and Identification (ASID), pp. 20–24, 2011.
[11]Amazon, 2008. [Online]. Available: http://www.amazon.com.
[12]eBay, 2002. [Online]. Available: http://www.eBay.com.
[13]Y. Chen and H. Chang, “The trust model of multiple factor for peer-to-peer networks,” International Journal of Computer and Communication Engineering, Vol 1, No. 2, pp. 73-76, 2012
[14]B. Cohen, “Incentives build robustness in BitTorrent,” Proceedings of First Workshop on Economics of Peer-to-Peer System, Berkeley, CA, 2003.
[15]H. Lee, S.Lee, H.Kim and H. Bahn, “Personalized Recommendation Schemes for DTV Channel Selectors,” IEEE Transactions on Consumer Electronics, Vol. 52, pp. 1064-1068, 2006
[16]wiki, [Online]. Available:
https://zh.wikipedia.org/wiki/%E9%BD%8A%E5%A4%AB%E5%AE%9A%E5%BE%8B#
論文全文使用權限:同意授權於2015-08-13起公開