浏览全部资源
扫码关注微信
1. 湖南人文科技学院信息学院,湖南 娄底 417000
2. 湖南师范大学物理与信息科学学院,湖南 长沙 410081
3. 中南大学信息科学与工程学院,湖南 长沙 410083
[ "刘浩(1977-),男,湖南邵阳人,湖南人文科技学院副教授,主要研究方向为并行计算、P2P网络、信息安全等。" ]
[ "张连明(1972-),男,湖南邵阳人,湖南师范大学教授,主要研究方向为复杂网络与网络演算等。" ]
[ "陈志刚(1964-),男,湖南长沙人,中南大学教授、博士生导师,主要研究方向为计算机网络与分布式系统等。" ]
网络出版日期:2017-02,
纸质出版日期:2017-02-25
移动端阅览
刘浩, 张连明, 陈志刚. P2P网络中基于模糊理论的任务访问控制模型[J]. 通信学报, 2017,38(2):44-52.
Hao LIU, Lian-ming ZHANG, Zhi-gang CHEN. Task-based access control mode of peer-to-peer network based on fuzzy theory[J]. Journal on communications, 2017, 38(2): 44-52.
刘浩, 张连明, 陈志刚. P2P网络中基于模糊理论的任务访问控制模型[J]. 通信学报, 2017,38(2):44-52. DOI: 10.11959/j.issn.1000-436x.2017027.
Hao LIU, Lian-ming ZHANG, Zhi-gang CHEN. Task-based access control mode of peer-to-peer network based on fuzzy theory[J]. Journal on communications, 2017, 38(2): 44-52. DOI: 10.11959/j.issn.1000-436x.2017027.
P2P网络的开放性自组织等特性给系统带来一系列的安全风险,然而传统的访问控制模型并不能适用于P2P网络这样的分布式管理系统。针对该问题,给出一种基于模糊理论的任务访问控制模型,并对该模型进行形式化描述与分析。通过层次分析法和模糊评价模型,计算每次交互任务的风险值。该模型通过对任务访问控制模型进行扩展,依据交互任务的风险值对访问权限进行动态管理。分析与实验结果表明该模型能够抑制非合作节点的交互成功率,增大整个对等网络系统的交互成功率,提高了对等网络系统的安全性。
The opening and self-organization features of P2P network brings a series of security risks
andthe traditional access control model is not suitable for P2P network as it is a kind of distributed management system.Task-based access control mode of P2P network was proposed based on fuzzy theory.And the formalization description and analysis of the model was also proposed.The risk value of each transaction was calculated through hierarchy process analysis and fuzzy comprehensive evaluation.In this model
according to the risk value of each transaction
the dynamic management of ac-cess authority was realized by extending task-basedaccess control model.The results show that this model can restrain the success of noncooperative nodes transaction and raise the success of the whole P2P network system transaction
thus improving the security of P2P network system.
孙新 , 李庆洲 , 赵璞 , 等 . 对等网络中一种优化的副本分布方法 [J ] . 计算机学报 , 2014 , 37 ( 6 ): 1424 - 1434 .
SUN X , LI Q Z , ZHAO P , et al . An optimized replica distribution method for peer-to-peer network [J ] . Chinese Journal of Computers , 2014 , 37 ( 6 ): 1424 - 1434 .
闫佳 , 应凌云 , 刘海峰 , 等 . 结构化对等网测量方法研究 [J ] . 软件学报 , 2014 , 25 ( 6 ): 1301 - 1315 .
YAN J , YING L Y , LIU H F , et al . Research on network measurement of structured P2P network [J ] . Journal of Software , 2014 , 25 ( 6 ): 1301 - 1315 .
曾明霏 , 余顺争 . 使用虚拟参与人和博弈论的P2P网络信用系统模型 [J ] . 小型微型计算机系统 , 2014 , 35 ( 6 ): 1309 - 1314 .
ZENG M F , YU S Z . A reputation system for peer-to-peer networks using game theory and virtual player [J ] . Journal of Chinese Computer system , 2014 , 35 ( 6 ): 1309 - 1314 .
曹晓梅 , 胡文捷 . 基于动态角色属性的MP2P信任模型 [J ] . 计算机科学 , 2015 , 42 ( 8 ): 106 - 111 .
CAO X M , HU W J . Dynamic role property based trust model for MP2P networks [J ] . Computer Science , 2015 , 42 ( 8 ): 106 - 111 .
李勇军 , 代亚非 . P2P 文件共享系统中的一种基于商品市场模型的访问控制机制 [J ] . 计算机学报 , 2012 , 35 ( 8 ): 1675 - 1682 .
LI Y J , DAI Y F . A kind of access control mechanism based on commodity market in P2P file sharing system [J ] . Chinese Journal of Computers , 2012 , 35 ( 8 ): 1675 - 1682 .
李凤华 , 王彦超 , 殷丽华 , 等 . 面向网络空间的访问控制模型 [J ] . 通信学报 , 2016 , 37 ( 5 ): 9 - 20 .
LI F H , WANG Y C , YIN L H , et al . Novel cyberspace-oriented ac-cess control mode [J ] . Journal on Communications , 2016 , 37 ( 5 ): 9 - 20 .
LIU W , REN P , SUN D H , et al . TrustP2PNet:P2P social network with admission control model based on trust [J ] . Aasri Procedia , 2013 , 5 ( 3 ): 281 - 286 .
WANG X , . A study of P2P access control strategy based on trust and security grade [C ] // CSSS Proceedings . 2011 .
LANG B . A computational trust model for access control in P2P [J ] . Science China Information Sciences , 2010 , 53 ( 5 ): 896 - 910 .
范艳芳 , 蔡英 . 支持协作的强制访问控制模型 [J ] . 计算机研究与发展 , 2015 , 52 ( 10 ): 2411 - 2421 .
FAN Y F , CAI Y . Cohabitation supported mandatory access control mode [J ] . Journal of Computer Research and Development , 2015 , 52 ( 10 ): 2411 - 2421 .
郭树行 , 张禹 . 基于动态情景网关的系统协同访问控制模型 [J ] . 通信学报 , 2013 , 34 ( z1 ): 142 - 145 .
GUO S X , ZHANG Y . Dynamic situation gateway based system cooperation access gate model [J ] . Journal on Communications , 2013 , 34 ( z1 ): 142 - 145 .
田俊峰 , 杜瑞忠 , 蔡红云 , 等 . 可信计算与信任管理 [M ] . 北京 : 科学出版社 , 2014 .
TIAN J F , DU R Z , CAI H Y , et al . Trusted computing and trust management [M ] . Beijing : Science PressPress , 2014 .
李开 , 章华娟 , 卢正鼎 . P2P 网络中基于信任的风险计算方法 [J ] . 计算机科学 , 2010 , 37 ( 10 ): 102 - 105 .
LI K , ZHANG H J , LU Z D . Risk assessment approach based on trust in P2P network [J ] . Computer Science , 2010 , 37 ( 10 ): 102 - 105 .
惠榛 , 李昊 , 张敏 , 等 . 面向医疗大数据的风险自适应的访问控制模型 [J ] . 通信学报 , 2015 , 36 ( 12 ): 190 - 199 .
HUI Z , LI H , ZHANG M , et al . Risk-ablative access control model for big data in healthcare [J ] . Journal on Communications , 2015 , 36 ( 12 ): 190 - 199 .
TIAN J F , LI C , HE X M . Trust model based on the multinomial subjective logic and risk mechanism for P2P network of file sharing [J ] . Journal of Electronics , 2011 , 28 ( 1 ): 108 - 117 .
张润莲 , 武小年 , 周胜源 , 等 . 一种基于实体行为风险评估的信任模型 [J ] . 计算机学报 , 2015 , 36 ( 12 ): 190 - 199 .
ZHANG R L , WU X N , ZHOU S Y , et al . A trust model based on behaviors risk education [J ] . Chinese Journal of Computers , 2015 , 36 ( 12 ): 190 - 199 .
KWAKERNAAK H . An algorithm for rating multipleaspect alterna-tives using fuzzy sets [J ] . Automatica , 1979 , 15 ( 5 ): 615 - 616 .
姜江 , 李漩 , 邢立宁 , 等 . 基于模糊证据推理的系统风险分析与评价 [J ] . 系统工程理论与实践 , 2013 , 33 ( 2 ): 529 - 538 .
JIANG J , LI X , XING L N , et al . System risk analysis and evaluation approach based on fuzzy evidential reasoning [J ] . System Engineering-Theory & Practice , 2013 , 33 ( 2 ): 529 - 538 .
严斌宇 , 刘方圆 , 董敏坚 . 一种基于风险评价的无线传感器网络信任模型 [J ] . 中南大学学报(自然科学版) , 2011 , 42 ( 6 ): 1657 - 1661 .
YAN B Y , LIU F Y , DONG M J . Trust model based on risk evaluation in wireless sensor networks [J ] . Journal of Central South University(Science and Technology) , 2011 , 42 ( 6 ): 1657 - 1661 .
陈华喜 , 郭有强 , 姚保峰 . 一种耦合赋权的网络安全评价模型 [J ] . 计算机工程 , 2011 , 37 ( 22 ): 99 - 103 .
CHEN H X , GUO Y Q , YAO B F , et al . Network security assessment model of coupling empowerment [J ] . Computer Engineering , 2011 , 37 ( 22 ): 99 - 103 .
赵勇 , 刘吉强 , 韩臻 . 基于任务的访问控制模型研究 [J ] . 计算机工程 , 2008 , 34 ( 5 ): 28 - 30 .
ZHAO Y , LIU J Q , HAN Z . Research on access control model based on task [J ] . Computer Engineering , 2008 , 34 ( 5 ): 28 - 30 .
邓集波 , 洪帆 . 基于任务的访问控制模型 [J ] . 软件学报 , 2003 , 14 ( 1 ): 76 - 81 .
DENG J B , HONG F . Task-based access control model [J ] . Journal of Software , 2003 , 14 ( 1 ): 76 - 81 .
谢季坚 , 刘承平 . 模糊数学方法及其应用 [M ] . 武汉 : 华中科技大学出版社 , 2000 .
XIE J J , LIU C P . Fuzzy mathematics method and its application [M ] . Wuhan : Huazhong University of Science & Technology PressPress , 2000 .
0
浏览量
762
下载量
3
CSCD
关联资源
相关文章
相关作者
相关机构