
GeTrust: A Guarantee – Based Trust Model in Chord – Based P2P Networks
Abstract
GeTrust: A Guarantee – Based Trust Model in Chord – Based P2P Networks ,More and more users are attracted by P2P networks characterized by decentralization, autonomy and anonymity. However, users’ unconstrained behavior makes it necessary to use a trust model when establishing trust relationships between peers. Most existing trust models are based on recommendations, which, however, suffer from the shortcomings of slow convergence and high complexity of trust computations, as well as huge overhead of network traffic. Inspired by the establishment of trust relationships in human society, a guarantee-based trust model, GeTrust, is proposed for Chord-based P2P networks. A service peer needs to choose its guarantee peer(s) for the service it is going to provide, and they are both required to pledge reputation mortgages for the service. The request peer makes evaluations on all the candidates of service peer by referring their service reputations and their guarantee peers’ reputations, and selects the one with highest evaluation to be its service provider. In order to enhance GeTrust’s availability and prevent malicious behavior, we also present incentive mechanism and anonymous reputation management strategy. Simulation results show that GeTrust is effective and efficient in terms of improving successful transaction rate, resisting complex attacks, reducing network overhead and lowering computational complexity.
AES is based on a design principle known as a substitution-permutation network, a combination of both substitution and permutation, and is fast in both software and hardware[16]. Unlike its predecessor DES, AES does not use a Feistel network. AES is a variant of Rijndael which has a fixed block size of 128 bits, and a key size of 128, 192, or 256 bits. Advanced Encryption Standard (AES) is the current standard for secret key encryption. AES was created by two Belgian cryptographers, Vincent Rijmen and Joan Daemen, replacing the old Data Encryption Standard (DES). The Federal Information Processing Standard 197 used a standardized version of the algorithm called Rijndael for the Advanced Encryption Standard. The algorithm uses a combination of Exclusive-OR operations (XOR), octet substitution with an S-box, row and column rotations, and a Mix Column. It was successful because it was easy to implement and could run in a reasonable amount of time on a regular computer.
