A New Trust Framework Based on Reputation for Unstructured P2P

被引:0
|
作者
Tian, Chunqi [1 ]
Zou, Shihong [2 ]
Chu, Lingwei [2 ]
Cheng, Shiduan [2 ]
机构
[1] Tongji Univ, Dept Comp Sci, Shanghai 200092, Peoples R China
[2] Beijing Univ Post & Telecommun, State Key Lab Networking & Switching, Beijing 100871, Peoples R China
基金
中国国家自然科学基金;
关键词
D O I
10.1109/PCCC.2008.4745120
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Managing trust is a key issue for a wide acceptance of P2P computing, particularly in critical areas such as e-commerce. Reputation based trust management has been identified in the literature as a viable solution to the problem. However, the mechanism faces the challenges of subjectively, experiential weighting referrals when aggregating recommendation information. Furthermore, not considering some malicious attacks when building trust relationship between peers in the existing schemes make trust model very vulnerable. This paper presents P2PTrust-a new trust framework based on reputation for unstructured P2P networks. In P2PTrust, except reputation value, reputation revision value is also taken into account in order to deal with the dynamic or spoiling behavior of peers, which makes P2PTrust differ from other trust models based on the reputation only. Considering the credibility of peers' referrals, a credibility quantification and update scheme is proposed in the paper as reliable means of seeking honest feedbacks. Subsequent experimental results show that, compared to the existing trust models, our scheme is robust in systems where the vast majority of users are malicious and more advanced in successful transaction rate.
引用
收藏
页码:209 / 216
页数:8
相关论文
共 50 条
  • [1] Trust and Reputation Algorithms for Unstructured P2P Networks
    Chen, Shanshan
    Zhang, Yunchang
    Yang, Geng
    2009 INTERNATIONAL SYMPOSIUM ON COMPUTER NETWORK AND MULTIMEDIA TECHNOLOGY (CNMT 2009), VOLUMES 1 AND 2, 2009, : 346 - +
  • [2] A reputation management framework based on global trust model for P2P systems
    Li, Jingtao
    Wang, Xueping
    Chen, Yongqiang
    Zhang, Gendu
    COMPUTATIONAL SCIENCE - ICCS 2006, PT 1, PROCEEDINGS, 2006, 3991 : 896 - 899
  • [3] TRUST BASED COMMUNICATION IN UNSTRUCTURED P2P NETWORKS USING REPUTATION MANAGEMENT AND SELF CERTIFICATION MECHANISM
    Sasitharagai, M.
    Renuga, A.
    Padmashree, A.
    Rajendran, T.
    2012 IEEE INTERNATIONAL CONFERENCE ON ENGINEERING EDUCATION: INNOVATIVE PRACTICES AND FUTURE TRENDS (AICERA), 2012,
  • [4] New trust model based on reputation and risk evaluation for P2P networks
    State Key Lab. of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing 100876, China
    Dianzi Yu Xinxi Xuebao/Journal of Electronics and Information Technology, 2007, 29 (07): : 1628 - 1632
  • [5] A Reputation-Based Trust Model In P2P Computing
    Rao Yang
    Pei Yi-jian
    INTERNATIONAL CONFERENCE OF CHINA COMMUNICATION (ICCC2010), 2010, : 787 - 791
  • [6] A Trust Model of P2P Network Based on Reputation and Risk
    Du Ruizhong
    Tian Junfeng
    Wang Zixian
    Ma Xiaoxue
    2009 WRI WORLD CONGRESS ON SOFTWARE ENGINEERING, VOL 3, PROCEEDINGS, 2009, : 382 - +
  • [7] A trust management mechanism in unstructured P2P
    Jia, Zhaoqing
    Xue, Guangtao
    Tang, Xinhuai
    Zhang, Pengzhu
    You, Jinyuan
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2010, 47 (04): : 645 - 652
  • [8] Reputation-based trust systems for P2P applications: Design issues and comparison framework
    Koutrouli, Eleni
    Tsalgatidou, Aphrodite
    TRUST, PRIVACY, AND SECURITY IN DIGITAL BUSINESS, PROCEEDINGS, 2006, 4083 : 152 - 161
  • [9] An Adaptive Topology-Based Reputation Model for Unstructured P2P Networks
    Gui, Jinsong
    Deng, Xiaoheng
    PROCEEDINGS OF THE 9TH INTERNATIONAL CONFERENCE FOR YOUNG COMPUTER SCIENTISTS, VOLS 1-5, 2008, : 1505 - 1510
  • [10] A Search Algorithm Based on Referral Trust in Unstructured P2P Systems
    Ping, Wang
    Jing, Qiu
    Hui, Qiu Yu
    PROCEEDINGS OF THE SECOND INTERNATIONAL SYMPOSIUM ON ELECTRONIC COMMERCE AND SECURITY, VOL I, 2009, : 453 - 457