A Group-Based Trust Model in Peer-to-Peer Environment

  • Fen Xu
  • Yajun Guo
  • Qin Wang
Conference paper
Part of the IFIP — The International Federation for Information Processing book series (IFIPAICT, volume 251)


The open and anonymous nature of peer-to-peer system makes it easy to be attacked and abused by some malicious nodes, so it is very important to establish a perfect trust mechanism in peer-to-peer environment. In this paper, we propose a novel group-based trust model in which the trust relationships between entities are divided into trust relationship in group and trust relationship between groups. This model deals with these two kinds of trust relationships in the different way and improves trust value calculation method. The model can get more real trust value at the small price, and the advantages of the model are simple structure and high reliability.


Trust Model Malicious Node Trust Relationship Local Record Member Node 


  1. 1.
    Distributed System for Information storage and Searching Model Description, http://www.gnutella.co.uk/liberary/pdf/paper final gnutella english.pdf.Google Scholar
  2. 2.
    I. Clark, O. Sandberg, B. Wiley, T. Freenet Hong, A distributed anonymous information storage and retrieval system, Proc. of the Workshop on Design Issues in Anonymity and Unobservability, Berkeley, CA, July 2000, 311–320.Google Scholar
  3. 3.
    W. Dou, H.M. Wang, Y. Jia, A recommendation-based peer-to-peer trust model, Journal of Software, 2004, 15(4), 571–583.MATHMathSciNetGoogle Scholar
  4. 4.
    F. Cornelli, E. Damiani, S. D. C. Vimercati, Choosing reputable servents in a P2P network, in: Proc. of the 11th International World Wide Web Conference Hawaii, ACM Press, May 2002, 376–386.Google Scholar
  5. 5.
    K. Albrecht, AR. Clippee Ruedi, A large-scale client/peer system, Technical Report, TR-410, Swiss Federal Institute of Technology, 2003.Google Scholar
  6. 6.
    SD. Kamvar, MT. EigenRep Schlosser, Reputation management in P2P networks, Proc. of the 12th Int’l World Wide Web Conf Budapest, ACM Press, 123–134.Google Scholar
  7. 7.
    J. Altaian, PKI Security for JXTA overlay networks, Technical Report, TR-I2-03-06, Palo Alto: Sun Microsystem, 2003.Google Scholar
  8. 8.
    A. Abdul-Rahman, S. Hailes, A distributed trust model, Proc. of the 1997 New Security Paradigms Workshop, ACM, September 1997, 48–60.Google Scholar
  9. 9.
    M. Blaze, J. Feigenbaum, J. Ioannidis, The role of trust management in distributed systems security, Secure Internet Programming: Issues in Distributed and Mobile Object Systems, volume 1603 of Lecture Notes in Computer Science, July 1999, 183–210.Google Scholar
  10. 10.
    Y. Zhong, Y. Yu, Dynamic Trust Production Based on Interaction Sequence Technical Report, CSD-TR 03-006, Dept. of Computer Science, Pudure University, 2003.Google Scholar

Copyright information

© International Federation for Information Processing 2007

Authors and Affiliations

  • Fen Xu
    • 1
  • Yajun Guo
    • 1
  • Qin Wang
    • 1
  1. 1.Department of Computer ScienceHuazhong Normal UniversityWuhan, HubeiChina

Personalised recommendations