博碩士論文 944203005 詳細資訊




以作者查詢圖書館館藏 以作者查詢臺灣博碩士 以作者查詢全國書目 勘誤回報 、線上人數:40 、訪客IP:18.220.188.4
姓名 曾偉純(Wei-Chun Tseng)  查詢紙本館藏   畢業系所 資訊管理學系
論文名稱 導入評價系統來改善點對點檔案分享系統中free-riders的問題
(Using a Reputation System to Improve the Problems of Free-riders in Peer-to-Peer File Sharing Systems)
相關論文
★ 網路合作式協同教學設計平台-以國中九年一貫課程為例★ 內容管理機制於常用問答集(FAQ)之應用
★ 行動多重代理人技術於排課系統之應用★ 存取控制機制與國內資安規範之研究
★ 信用卡系統導入NFC手機交易機制探討★ App應用在電子商務的推薦服務-以P公司為例
★ 建置服務導向系統改善生產之流程-以W公司PMS系統為例★ NFC行動支付之TSM平台規劃與導入
★ 關鍵字行銷在半導體通路商運用-以G公司為例★ 探討國內田徑競賽資訊系統-以103年全國大專田徑公開賽資訊系統為例
★ 航空地勤機坪作業盤櫃追蹤管理系統導入成效評估—以F公司為例★ 導入資訊安全管理制度之資安管理成熟度研究-以B個案公司為例
★ 資料探勘技術在電影推薦上的應用研究-以F線上影音平台為例★ BI視覺化工具運用於資安日誌分析—以S公司為例
★ 特權帳號登入行為即時分析系統之實證研究★ 郵件系統異常使用行為偵測與處理-以T公司為例
檔案 [Endnote RIS 格式]    [Bibtex 格式]    [相關文章]   [文章引用]   [完整記錄]   [館藏目錄]   [檢視]  [下載]
  1. 本電子論文使用權限為同意立即開放。
  2. 已達開放權限電子全文僅授權使用者為學術研究之目的,進行個人非營利性質之檢索、閱讀、列印。
  3. 請遵守中華民國著作權法之相關規定,切勿任意重製、散佈、改作、轉貼、播送,以免觸法。

摘要(中) 隨著網際網路的快速發展及點對點系統的便利,因此有愈來愈多人使用點對點網路以分享及獲取所需的資源,要如何維護點對點檔案分享系統中使用者的權益,促進每個使用者分享檔案,減少free-riders的問題,需提供足夠的動機誘因。且檔案的品質可能良莠不齊或名不副實,使用者耗費很多資源以下載這些檔案,造成整個網路頻寬的浪費,所以需要有一套措施,選擇信賴的節點以下載檔案。因上述的理由,本研究想要設計兼具下列特性的評價機制:(1)改善檔案內容的正確及品質、(2)選擇可以信賴的節點及(3)提高free-riders對資源的貢獻率。
本研究的評價機制包含四個階段,分別為:(1)檔案的搜尋、(2)選擇適當的節點、(3)檔案的下載及(4)檔案的下載的評分。此評價的機制特點在計算兩部分評分值,即節點對檔案的擁有者評分及系統計算節點所分享資源的評分,前者可以改善節點所分享檔案內容的品質,後者提一獎勵機制以促進節點分享資源,所以可同時改善合理化攻擊中內容的限制及資源的限制問題,而其他改善free-riders問題的相關方案,效用函數、信用系統及代幣的應用可以改善資源的限制問題,使用者的反饋可以改善內容的限制問題,但卻都只有改善一項問題,本研究的評價機制則可同時改善內容的限制以及資源的限制問題,減少free-riders所造成的各項問題。
摘要(英) As the internet is quickly expanded and the peer-to-peer file sharing system is convenient, more and more people use peer-to-peer file sharing systems to get the resources. How to assure rights and interests of users in peer-to-peer file sharing systems, promote every user to share files and reduce the problems of free-riders? To provide enough motivation is the critical factor. Moreover, the quality of files may be uneven. Users have to consume resources to download these files. It will engage the broadland of internet. Therefore we need a way to choose trustworthy peers to download files. Based on above-mentioned, the purpose of this paper is to design a reputation system which has three features, include (1) improving the accuracy and quality of files, (2) choosing trustworthy peers, and (3) increasing the contribution to free-riders.
In this paper, we purpose a four phase reputation system, include (1) searching phase, (2) choosing phase, (3) downloading phase, and (4) evaluating phase. The feature of our system is to compute two portion of reputation scores, such as peer reputation and system reputation. The former can improve the quality of files which are shared by the peers. The latter can stimulate peers to share files. So our reputation system can both improve content restriction and resource restriction in rational attack. But other schemes can only improve one of the restriction. Therefore our reputation system can improve the accuracy and quality of files and increase the contribution to free-riders.
關鍵字(中) ★ 評價系統
★ free-riders
★ 點對點
★ 檔案分享系統
★ 內容的限制
關鍵字(英) ★ file sharing systems
★ content restriction
★ reputation systems
★ free-riders
★ peer-to-peer
論文目次 第一章 緒論 1
1-1 研究背景 1
1-1-1 點對點網路的特徵及應用 1
1-1-2 點對點網路的架構 1
1-1-3 Free-riders的定義及帶來的威脅 4
1-2 研究動機 5
1-3 研究目的 6
1-4 研究方法 7
1-5 各章節架構 8
第二章 相關文獻探討 10
2-1 點對點網路問題的探討 10
2-1-1 低階層的攻擊 11
2-1-2 中階層的攻擊 13
2-1-3 點對點的階層的攻擊 15
2-1-4 小結 17
2-2 FREE-RIDERS的問題及解決技術的探討 18
2-2-1 效用函數 18
2-2-2 信用系統 22
2-2-3 代幣的應用 24
2-2-4 使用者的反饋 25
2-2-5 小結 27
2-3 評價系統的探討 28
2-3-1 XRep協定 28
2-3-2 DCRC及CORC 33
2-4 小結 35
第三章 系統架構設計 36
3-1 系統假設 36
3-2 系統流程總覽 37
3-3 系統流程說明 39
3-3-1 檔案的搜尋 39
3-3-2 選擇適當的節點 41
3-3-3 檔案的下載 42
3-3-4 檔案下載的評分 44
3-3-5 小結 49
第四章 系統實作及評估 51
4-1 核心系統實作 51
4-1-1 系統實作架構 51
4-1-2 系統實作環境 52
4-1-3 系統功能實作 54
4-2 系統評估 57
4-2-1 誠實的節點率 58
4-2-2 節點數 68
第五章 結論及未來研究方向 77
5-1 結論 77
5-2 未來研究方向 78
5-2-1 評價代理人的機制 79
5-2-2 可激勵節點分享檔案的誘因 79
5-2-3 應用在各點對點檔案分享系統 79
參考文獻及網站 80
中文參考文獻 80
英文參考文獻 80
參考網站 83
參考文獻 中文參考文獻
1. 李大正,「P2P系統上基於協同式自動信賴對話的信用評等機制」,國立成功大學電腦與通信工程研究所碩士論文,2005年。
2. 高志中,「以DR Signature配合隨機式RSA部分盲簽章所建構之數位內容多受款者付款機制」,國立中央大學資訊管理學系研究所碩士論文,2006年。
英文參考文獻
3. Adar, E. and Huberman, B., “Free riding on gnutella,” http://www.firstmonday.dk/issues/issue5 10/adar, October 2000 (accessed Aug. 2005).
4. Aringhieri, R., Damiani, E. De Capitani Di Vimercati, S., Paraboschi, S. and Samarati, P. “Fuzzy Techniques for Trust and Reputation Management in Anonymous Peer-to-Peer Systems,” Journal of the American Society for Information Science and Technology, Volume 57, Issue 4, Jan 2006, pp:528-537.
5. Buragohain, C., Agrawal, D. and Suri, S., “A game-theoretic framework for incentives in P2P systems,” Proc. of International Conference on Peer-to-Peer Computing, Sep 2003.
6. Chien, E., “Malicious Threats of Peer-to-Peer Networking,” Symantec Security Response, 2003.
7. Cornelli, F., Damiani, E., De Capitani di Vimercati, S., Paraboschi, S. and Samarati, P., “Choosing reputable servents in a P2P network,” Proc. of the Eleventh International World Wide Web Conference, May 2002.
8. Damiani, E., De Capitani di Vimercati, S., Paraboschi, S., Samarati, P. and Violante, F., “A Reputation-Based Approach for Choosing Reliable Resources in Peer-to-Peer Networks,” Proceedings of the 9th ACM conference on Computer and communications security, 2002.
9. Engle, M. and Khan, J. I., “Vulnerabilities of P2P Systems and a Critical look at Their Solutions,” Technical Report, 2006.
10. Fischmann, M. and Gunther, O., “Free riders: Fact or fiction?” Sep 2003.
11. Glance, N. S. and Huberman, B. A., “Dynamics of social dilemmas,” Scientific American, March 1994.
12. Gupta, M., Judge, P. and Ammar, M., “A Reputation System for Peer-to-Peer Networks,” Proceedings of the 13th international workshop on Network and operating systems support for digital audio and video, 2003.
13. Ham, M. and Agha, G.., “ARA: A Robust Audit to Prevent Free-Riding in P2P Networks,” 2005.
14. Huberman, B. A. and Luckose, R., “Social dilemmas and internet congestion,” Science, Volume 277, 1997.
15. Hughes, D., Coulson, G. and Walkerdine, J., “Free riding on gnutella revisited: the Bell Tolls?” IEEE Distributed Systems Online Journal, vol. 6, no. 6, June 2005.
16. Jøsang, A., Ismail, R., and Boyd, C., “A survey of trust and reputation systems for online service provision,” Decision Support Systems, Volume 43, Issue 2, March 2007 pp:618-644.
17. Joseph, S., “NeuroGrid: Semantically Routing Queries in Peer-to-Peer Networks,” International Workshop on Peer-to-Peer Computing, 2002.
18. Joseph, S., “P2P MetaData Search Layers,” Second International Workshop on Agents and Peer-to-Peer Computing, 2003.
19. Jun, S. and Ahamad, M., “Incentives in BitTorrent induce free riding,” Proceeding of the ACM SIGCOMM workshop on Economics of peer-to-peer systems, 2005
20. Liao, W.-C., Papadopoulos, F. and Psounis, K., “A Peer-to-Peer Cooperation Enhancement Scheme and its Performance Analysis,” Journal of Communications, Vol. 1, Issue 7, November 2006.
21. Liao, W.-C., Papadopoulos, F. and Psounis, K., “An efficient algorithm for resource sharing in peer-to-peer networks,” IFIP NETWORKING, Lecture Notes in Computer Science, Vol. 3976, Springer, May 2006, pp:592-605.
22. Lin, Z. and Li, J., “The Online Auction Market in China - A Comparative Study between Taobao and eBay,” Proceedings of the 7th international conference on Electronic commerce, 2005.
23. McFadden, D., “The tragedy of the commons,” Available at http://www.forbes.com/asap/2001/0910/061.html.
24. Parisi, D., “What to do with a surplus,” Simulating Social Phenomenon, 1997, pp:133 – 151.
25. Pretre, B. and Wattenhofer, R., “Attacks on Peer-to-Peer Networks,” 2005.
26. Ramaswanmy, L. and Liu, L., “Free-riding: A new challenge to peer-to-peer file sharing systems,” Proc. of the 36th Hawaii international conference on system sciences, 2003.
27. Saroiu, S., Gummadi, K. and Gribble, S., “A measurement study of peer-to-peer file sharing systems,” Proceedings of Multimedia Computing and Networking, January 2002.
28. Srivatsa, M. and Liu, L., “Vulnerabilities and Security Threats in Structured Peer-to-Peer Systems: A Quantitative Analysis,” Proceedings of the 20th Annual Computer Security Applications Conference, 2004
29. The Gnutella Protocol Specification v0.4 (Document Revision 1.2), http://www9.limewire.com/developer/gnutella_protocol_0.4.pdf, June 2001.
30. Zhou, L., Zhang, L., McSherry, F., Immorlica, N., Costa, M. and Chien, S., “A First Look at Peer-to-Peer Worms: Threats and Defenses,” Peer-to-Peer Systems IV, 4th International Workshop, 2005.
參考網站
31. http://en.wikipedia.org/wiki/P2P
32. http://en.wikipedia.org/wiki/Zipf_distribution
33. http://www.gnutella.com/
34. http://www.kazaa.com
35. http://www.napster.com/
36. http://www.neurogrid.net/twiki/bin/view/Main/PeerToPeerSimulation
指導教授 林熙禎(Shi-Jen Lin) 審核日期 2007-7-12
推文 facebook   plurk   twitter   funp   google   live   udn   HD   myshare   reddit   netvibes   friend   youpush   delicious   baidu   
網路書籤 Google bookmarks   del.icio.us   hemidemi   myshare   

若有論文相關問題,請聯絡國立中央大學圖書館推廣服務組 TEL:(03)422-7151轉57407,或E-mail聯絡  - 隱私權政策聲明