×

Behavior-based reputation management in P2P file-sharing networks. (English) Zbl 1250.68063

Summary: Trust research has become a key issue in the last few years as a novel and valid solution to ensure the security and application in peer-to-peer (P2P) file-sharing networks. The accurate measure of trust and reputation is a hard problem, most of the existing trust mechanisms adopt the historical behavior feedback to compute trust and reputation. Thus exploring the appropriate transaction behavior becomes a fundamental challenge. In P2P system, each peer plays two roles: server and client with responsibility for providing resource service and trust recommending respectively. Considering the resource service behavior and trust recommending behavior of each peer, in this paper, we propose a new trust model adopting the technology to calculate eigenvectors of trust rating and recommending matrices. In our model, we define recommended reputation value to evaluate the resource service behavior, and recommending reputation value to evaluate the trust recommendation behavior. Our algorithm would make these two reputation values established an interrelated relation of reinforcing mutually. The normal peers provide authentic file uploading services, as well as give correct trust recommendation, so they can form a trusted and cooperative transaction community via the mutual reinforcement of recommended and recommending reputation values. In this way, the transaction behaviors of those malicious peers are isolated and confined effectively. Extensive experimental results also confirm the efficiency of our trust model against the threats of exaggeration, collusion, disguise, sybil and single-behavior.

MSC:

68M10 Network design and communication in computer systems
68M15 Reliability, testing and fault tolerance of networks and computer systems
PDFBibTeX XMLCite
Full Text: DOI

References:

[1] Jøsang, A.; Ismail, R.; Boyd, C., A survey of trust and reputation systems for online service provision, Decis. Support Syst., 43, 2, 618-644 (2007)
[2] Wang, Y.; Nakao, A., Poisonedwater: An improved approach for accurate reputation ranking in p2p networks, Future Gener. Comput. Syst., 26, 8, 1317-1326 (2010)
[3] Resnick, P.; Kuwabara, K.; Zeckhauser, R.; Friedman, E., Reputation systems, Commun. ACM, 43, 12, 45-48 (2000)
[4] Song, S.; Hwang, K.; Zhou, R.; Kwok, Y., Trusted p2p transactions with fuzzy reputation aggregation, IEEE Internet Comput., 9, 6, 24-34 (2005)
[5] Tajeddine, A.; Kayssi, A.; Chehab, A.; Artail, H., Patrol-f-a comprehensive reputation-based trust model with fuzzy subsystems, (Autonomic and Trusted Computing: Third International Conference, ATC 2006. Autonomic and Trusted Computing: Third International Conference, ATC 2006, Wuhan, China, September 3-6, 2006. Autonomic and Trusted Computing: Third International Conference, ATC 2006. Autonomic and Trusted Computing: Third International Conference, ATC 2006, Wuhan, China, September 3-6, 2006, Lecture Notes in Comput. Sci., vol. 4158 (2006), Springer-Verlag New York, Inc.), 205
[6] Schmidt, S.; Steele, R.; Dillon, T.; Chang, E., Fuzzy trust evaluation and credibility development in multi-agent systems, Applied Soft Comput., 7, 2, 492-505 (2007)
[7] Wang, Y.; Cahill, V.; Gray, E.; Harris, C.; Liao, L., Bayesian network based trust management, (Autonomic and Trusted Computing: Third International Conference, ATC 2006. Autonomic and Trusted Computing: Third International Conference, ATC 2006, Wuhan, China, September 3-6, 2006. Autonomic and Trusted Computing: Third International Conference, ATC 2006. Autonomic and Trusted Computing: Third International Conference, ATC 2006, Wuhan, China, September 3-6, 2006, Lecture Notes in Comput. Sci., vol. 4158 (2006), Springer-Verlag New York, Inc.), 246
[8] S. Buchegger, J. Le Boudec, A robust reputation system for mobile ad-hoc networks, in: Proceedings of the Second Workshop Economics of P2P Systems, 2004.; S. Buchegger, J. Le Boudec, A robust reputation system for mobile ad-hoc networks, in: Proceedings of the Second Workshop Economics of P2P Systems, 2004.
[9] Jøsang, A., A logic for uncertain probabilities, Internat. J. Uncertain. Fuzziness Knowledge-Based Systems, 9, 3, 279-311 (2001) · Zbl 1113.68488
[10] A. Jøsang, R. Ismail, The beta reputation system, in: Proceedings of the 15th Bled Electronic Commerce Conference, vol. 160, 2002.; A. Jøsang, R. Ismail, The beta reputation system, in: Proceedings of the 15th Bled Electronic Commerce Conference, vol. 160, 2002.
[11] Castelfranchi, C.; Falcone, R., Social trust: A cognitive approach, Trust Deception Virtual Soc., 55-90 (2001)
[12] Castelfranchi, C.; Falcone, R.; Pezzulo, G., Integrating trustfulness and decision using fuzzy cognitive maps, Lecture Notes in Comput. Sci., 2692, 195-210 (2003) · Zbl 1051.68603
[13] Edmonds, B.; Norling, E.; Hales, D., Towards the evolution of social structure, Comput. Math. Organ. Theory, 15, 2, 78-94 (2009) · Zbl 1175.91139
[14] Marcozzi, A.; Hales, D., Emergent social rationality in a peer-to-peer system, Adv. Complex Syst., 11, 04, 581-595 (2008) · Zbl 1153.91831
[15] Ren, Y.; Li, M.; Sakurai, K., Finetrust: a fine-grained trust model for peer-to-peer networks, Sec. Commun. Networks, 4, 1, 61-69 (2011)
[16] Zhang, Y.; Fang, Y., A fine-grained reputation system for reliable service selection in peer-to-peer networks, IEEE Trans. Parallel Distributed Syst., 1134-1145 (2007)
[17] C. Dellarocas, Efficiency and robustness of binary feedback mechanisms in trading environments with moral hazard, Working papers.; C. Dellarocas, Efficiency and robustness of binary feedback mechanisms in trading environments with moral hazard, Working papers.
[18] Corbo, J.; Parkes, D., The price of selfish behavior in bilateral network formation, (Proceedings of the Twenty-Fourth Annual ACM Symposium on Principles of Distributed Computing (2005), ACM), 99-107 · Zbl 1314.91051
[19] Moscibroda, T.; Schmid, S.; Wattenhofer, R., On the topologies formed by selfish peers, (Proceedings of the Twenty-Fifth Annual ACM Symposium on Principles of Distributed Computing (2006), ACM), 133-142 · Zbl 1314.68162
[20] Nakao, A.; Wang, Y., On cooperative and efficient overlay network evolution based on a group selection pattern, IEEE Trans. Syst. Man Cyb., Part B, Cyb., 40, 2, 493 (2010)
[21] Kleinberg, J., Authoritative sources in a hyperlinked environment, J. ACM (JACM), 46, 5, 604-632 (1999) · Zbl 1065.68660
[22] Kerschbaum, F.; Haller, J.; Karabulut, Y.; Robinson, P., Pathtrust: A trust-based reputation service for virtual organization formation, Trust Manag., 193-205 (2006)
[23] Kamvar, S.; Schlosser, M.; Garcia-Molina, H., The eigentrust algorithm for reputation management in p2p networks, (Proceedings of the 12th International Conference on World Wide Web (2003), ACM), 640-651
[24] Xiong, L.; Liu, L., Peertrust: Supporting reputation-based trust for peer-to-peer electronic communities, IEEE Trans. Knowledge Data Engin., 16, 7, 843-857 (2004)
[25] Wu, D.; Sun, Y., Cooperation in multi-agent bidding, Decis. Support Syst., 33, 3, 335-347 (2002)
[26] Allen, S. M.; Colombo, G.; Whitaker, R. M., Cooperation through self-similar social networks, ACM Trans. Auton. Adaptive Syst., 5, 1, 1-29 (2010)
[27] Marmol, F.; Pérez, G., Security threats scenarios in trust and reputation models for distributed systems, Comput. Security, 28, 7, 545-556 (2009)
[28] Wang, Y.; Nakao, A.; Ma, J., Hoprec: Hop-based recommendation ability enhanced reputation ranking in p2p networks, IEICE Trans. Inform. Syst., 93, 3, 438-447 (2010)
[29] Zhou, R.; Hwang, K., Powertrust: A robust and scalable reputation system for trusted peer-to-peer computing, IEEE Trans. Parallel Distrib. Syst., 18, 4, 460-473 (2007)
[30] Maristella, A.; Luca, P., A theoretical study of a generalized version of kleinbergʼs hits algorithm, Inf. Retr., 8, 2, 219-243 (2005)
[31] Wang, Y.; Nakao, A.; Vasilakos, A., Doubleface: Robust reputation ranking based on link analysis in p2p networks, Cybernet. Systems, 41, 2, 167-189 (2010)
This reference list is based on information provided by the publisher or from digital mathematics libraries. Its items are heuristically matched to zbMATH identifiers and may contain data conversion errors. In some cases that data have been complemented/enhanced by data from zbMATH Open. This attempts to reflect the references listed in the original paper as accurately as possible without claiming completeness or a perfect matching.