{"title":"基于p2p的Web服务发现的隐私保护方法","authors":"Kuien Liu, Qing Wang, Jun-su Han, Hu Wu","doi":"10.1109/ICEBE.2007.113","DOIUrl":null,"url":null,"abstract":"Peer-to-Peer based Web service discovery systems have shown the high scalability and availability provided by high connectivity and dynamic accommodation. However, a serious difficulty in concurrent designing of such unauthoritative and decentralized controlled systems is how to deal with the privacy concerns and policy enforcement in such systems which may contain a considerable ratio of dishonest and unavailable peers. We present a privacy protection method implementing authorization model in the broker peers' platform with the supporting of Web service description composition algorithms and discovery protocols especially designed for privacy policy enforcement in P2P environments. We exploit the statistical stability of a large number of peers and analyze the quantitative result of privacy policies being betrayed and obeyed, as well as how to leverage the privacy assurance and availability to desired levels by adjusting the parameters of composition algorithms.","PeriodicalId":184487,"journal":{"name":"IEEE International Conference on e-Business Engineering (ICEBE'07)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2007-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"8","resultStr":"{\"title\":\"A Privacy Protection Method for P2P-based Web Service Discovery\",\"authors\":\"Kuien Liu, Qing Wang, Jun-su Han, Hu Wu\",\"doi\":\"10.1109/ICEBE.2007.113\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Peer-to-Peer based Web service discovery systems have shown the high scalability and availability provided by high connectivity and dynamic accommodation. However, a serious difficulty in concurrent designing of such unauthoritative and decentralized controlled systems is how to deal with the privacy concerns and policy enforcement in such systems which may contain a considerable ratio of dishonest and unavailable peers. We present a privacy protection method implementing authorization model in the broker peers' platform with the supporting of Web service description composition algorithms and discovery protocols especially designed for privacy policy enforcement in P2P environments. We exploit the statistical stability of a large number of peers and analyze the quantitative result of privacy policies being betrayed and obeyed, as well as how to leverage the privacy assurance and availability to desired levels by adjusting the parameters of composition algorithms.\",\"PeriodicalId\":184487,\"journal\":{\"name\":\"IEEE International Conference on e-Business Engineering (ICEBE'07)\",\"volume\":\"49 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2007-10-24\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"8\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"IEEE International Conference on e-Business Engineering (ICEBE'07)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICEBE.2007.113\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE International Conference on e-Business Engineering (ICEBE'07)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICEBE.2007.113","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A Privacy Protection Method for P2P-based Web Service Discovery
Peer-to-Peer based Web service discovery systems have shown the high scalability and availability provided by high connectivity and dynamic accommodation. However, a serious difficulty in concurrent designing of such unauthoritative and decentralized controlled systems is how to deal with the privacy concerns and policy enforcement in such systems which may contain a considerable ratio of dishonest and unavailable peers. We present a privacy protection method implementing authorization model in the broker peers' platform with the supporting of Web service description composition algorithms and discovery protocols especially designed for privacy policy enforcement in P2P environments. We exploit the statistical stability of a large number of peers and analyze the quantitative result of privacy policies being betrayed and obeyed, as well as how to leverage the privacy assurance and availability to desired levels by adjusting the parameters of composition algorithms.