Volume 10 Number 3 August 2019

    
Construction of Credit based Distributed Trust Management Model for P2P Network

Han Yingjun, Lian Hongjun

https://doi.org/10.6025/jnt/2019/10/3/71-78

Abstract With the emerging of peer-to-peer (P2P) network in recent years, unsafety problems underlying becomes more obvious, such as dishonest recommendation, collusive cheat and complex strategic attack behavior. But the current trust model is able to process the above problems in a better way. Thus this study proposes a credit-based distributed trust management model for P2P, named RA Trust and applies... Read More


Risk Evaluation of Information Exchange among Nodes under P2P Network Environment

Han Yingjun, Wang Xiaoyang

https://doi.org/10.6025/jnt/2019/10/3/79-86

Abstract In recent years, because of anonymity and dynamics, P2P network have suffered from more and more security problems, which means that traditional trust management cannot be well adapted to P2P network environment, making dynamic trust a new research focus. Based on trust mechanism in P2P environment, this paper analyzes the trust of consumption node to service node, coming upon an... Read More


The Application of Database Technology in the Network Management System

Yong-qiang HE, Xue-rui WANG

https://doi.org/10.6025/jnt/2019/10/3/87-91

Abstract In today’s society, the internet was increasingly expanding the scale of the computer network, the structure of the network has become more and more complex, the network management system must have a higher intelligence. A large amount of data had been processed in the network management system, and the application rules on data processing are the two most basic elements, and the database... Read More


A Hybrid Method for Reduction of Energy Consumption in Cloud Networks

Mehran Tarahomi, Mohammad Izadi

https://doi.org/10.6025/jnt/2019/10/3/92-103

Abstract Cloud computing is consisted of physical data centers each of which including hundreds or thousands of computers. A key technology which has enabled cloud computing feasible, is virtualization. Virtualization allows us to separate virtual machines in a way that each of these so-called virtualized machines can be configured on a number of hosts according to the type of application of the user. It... Read More