{"title":"Research of trust evaluation mechanism in P2P E-commerce","authors":"Xu Zhen-zhen","doi":"10.25236/icemit.2018.073","DOIUrl":null,"url":null,"abstract":"To solve the P2P E-commerce security problem effectively,on the basis of researching the trust model deeply in the P2P Ecommerce, a method based on hash function is proposed to put the node from the trust group into the sub-group in a random.It reduces the risk of collusion attack.When a node provides a malicious service occasionally,it can not be proved to be a malicious node,and it only needs to be given a warning.Transaction time factors,transaction scales,and transactions number are introduced to calculate the trust value.Penalty item is used to limit node to provide malicious service.It is more accurate to estimate the trust value.The model relies heavily on nodes from the group connected with outside group and the nodes from the same group,and it ensures the performance of the network.","PeriodicalId":365328,"journal":{"name":"Computer Engineering and Design","volume":"29 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Computer Engineering and Design","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.25236/icemit.2018.073","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
To solve the P2P E-commerce security problem effectively,on the basis of researching the trust model deeply in the P2P Ecommerce, a method based on hash function is proposed to put the node from the trust group into the sub-group in a random.It reduces the risk of collusion attack.When a node provides a malicious service occasionally,it can not be proved to be a malicious node,and it only needs to be given a warning.Transaction time factors,transaction scales,and transactions number are introduced to calculate the trust value.Penalty item is used to limit node to provide malicious service.It is more accurate to estimate the trust value.The model relies heavily on nodes from the group connected with outside group and the nodes from the same group,and it ensures the performance of the network.