{"title":"P2P电子商务中信任评价机制研究","authors":"Xu Zhen-zhen","doi":"10.25236/icemit.2018.073","DOIUrl":null,"url":null,"abstract":"To solve the P2P E-commerce security problem effectively,on the basis of researching the trust model deeply in the P2P Ecommerce, a method based on hash function is proposed to put the node from the trust group into the sub-group in a random.It reduces the risk of collusion attack.When a node provides a malicious service occasionally,it can not be proved to be a malicious node,and it only needs to be given a warning.Transaction time factors,transaction scales,and transactions number are introduced to calculate the trust value.Penalty item is used to limit node to provide malicious service.It is more accurate to estimate the trust value.The model relies heavily on nodes from the group connected with outside group and the nodes from the same group,and it ensures the performance of the network.","PeriodicalId":365328,"journal":{"name":"Computer Engineering and Design","volume":"29 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Research of trust evaluation mechanism in P2P E-commerce\",\"authors\":\"Xu Zhen-zhen\",\"doi\":\"10.25236/icemit.2018.073\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"To solve the P2P E-commerce security problem effectively,on the basis of researching the trust model deeply in the P2P Ecommerce, a method based on hash function is proposed to put the node from the trust group into the sub-group in a random.It reduces the risk of collusion attack.When a node provides a malicious service occasionally,it can not be proved to be a malicious node,and it only needs to be given a warning.Transaction time factors,transaction scales,and transactions number are introduced to calculate the trust value.Penalty item is used to limit node to provide malicious service.It is more accurate to estimate the trust value.The model relies heavily on nodes from the group connected with outside group and the nodes from the same group,and it ensures the performance of the network.\",\"PeriodicalId\":365328,\"journal\":{\"name\":\"Computer Engineering and Design\",\"volume\":\"29 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"1900-01-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Computer Engineering and Design\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.25236/icemit.2018.073\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Computer Engineering and Design","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.25236/icemit.2018.073","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Research of trust evaluation mechanism in P2P E-commerce
To solve the P2P E-commerce security problem effectively,on the basis of researching the trust model deeply in the P2P Ecommerce, a method based on hash function is proposed to put the node from the trust group into the sub-group in a random.It reduces the risk of collusion attack.When a node provides a malicious service occasionally,it can not be proved to be a malicious node,and it only needs to be given a warning.Transaction time factors,transaction scales,and transactions number are introduced to calculate the trust value.Penalty item is used to limit node to provide malicious service.It is more accurate to estimate the trust value.The model relies heavily on nodes from the group connected with outside group and the nodes from the same group,and it ensures the performance of the network.