EigenTrust for Hierarchically Structured Chord

  • Kalonji KalalaEmail author
  • Tao Feng
  • Iluju Kiringa
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 10547)


The paper proposes Hierarchical EigenTrust, an extension of EigenTrust, a trust and reputation algorithm that was proposed for flat peer-to-peer networks. The paper introduces the components of the hierarchical model architecture based on Chord, a scalable P2P (Peer-to-Peer) lookup service for Internet applications. The paper also extends the EigenTrust scheme to the hierarchically structured Chord P2P network. The proposed algorithm handles a huge number of nodes disseminated in different Chord rings, which improves complexity and reduces the number of malicious nodes. The experiments verify and compare the reduction of downloads from malicious peers, load distribution as well as convergence speed between a flat structured network and a hierarchically structured network. Results of the experiments show that hierarchical EigenTrust outperforms the flat EigenTrust in a P2P network that uses only one big ring.


Hierarchical P2P network Hierarchical Chord Trust Reputation DHT Overlay network EigenTrust 


  1. 1.
    Awasthi, S.K., Singh, Y.N.: Absolute trust: algorithm for aggregation of trust in peer-to-peer networks. IEEE Commun. Lett. 20(7), 1345–1348 (2016)Google Scholar
  2. 2.
    Foster, I., Kesselman, C., Nick, J., Tuecke, S.: The physiology of the grid: an open grid services architecture for distributed systems integration. Technical report, Global Grid Forum (2002)Google Scholar
  3. 3.
    Garcés-Erice, L., Biersack, E.W., Felber, P.A., Ross, K.W., Urvoy-Keller, G.: Hierarchical peer-to-peer systems. In: Kosch, H., Böszörményi, L., Hellwagner, H. (eds.) Euro-Par 2003. LNCS, vol. 2790, pp. 1230–1239. Springer, Heidelberg (2003). doi: 10.1007/978-3-540-45209-6_166 CrossRefGoogle Scholar
  4. 4.
    Gu, Y., Boukerche, A.: HD tree: a novel data structure to support multi-dimensional range query for P2P networks. J. Parallel Distrib. Comput. 71(8), 1111–1124 (2011)CrossRefzbMATHGoogle Scholar
  5. 5.
    Hofstatter, Q., Zols, S., Michel, M., Despotovic, Z., Kellerer, W.: Chordella - a hierarchical peer-to-peer overlay implementation for heterogeneous, mobile environments. In: 2008 Eighth International Conference on Peer-to-Peer Computing, pp. 75–76 (2008)Google Scholar
  6. 6.
    Jagadish, H.V., Ooi, B.C., Vu, Q.H.: BATON: a balanced tree structure for peer-to-peer networks. In: Proceedings of the 31st International Conference on Very Large Data Bases, pp. 149–160 (2005)Google Scholar
  7. 7.
    Kamvar, S.D., Schlosser, M.T., Garcia-Molina, H.: The EigenTrust algorithm for reputation management in P2P networks. In: 12th International Conference on World Wide Web (WWW), p. 640 (2003)Google Scholar
  8. 8.
    Maenpaa, J., Camarillo, G.: Study on maintenance operations in a chord-based Peer-to-Peer session initiation protocol overlay network. In: IEEE International Symposium on Parallel Distributed Processing (IPDPS 2009), p. 19 (2009)Google Scholar
  9. 9.
    Montresor, A., Jelasity, M., Babaoglu, O.: Chord on demand. In: Proceedings - Fifth IEEE International Conference on Peer-to-Peer Computing, P2P 2005, vol. 2005, pp. 87–94 (2005)Google Scholar
  10. 10.
    Pujol, J.M., Sangesa, R., Delgado, J.: Extracting reputation in multi agent systems by means of social network topology. In: Proceedings of the First International Joint Conference on Autonomous Agents Multiagent Systems Part 1, pp. 467–474 (2002)Google Scholar
  11. 11.
    Ratnasamy, S., Francis, P., Handley, M., Karp, R., Shenker, S.: A scalable content addressable network. In: Proceedings of the ACM SIGCOMM, vol. TR-00-010, pp. 161–172 (2000)Google Scholar
  12. 12.
    Rowstron, A., Druschel, P.: Pastry: scalable, decentralized object location, and routing for large-scale peer-to-peer systems. In: Guerraoui, R. (ed.) Middleware 2001. LNCS, vol. 2218, pp. 329–350. Springer, Heidelberg (2001). doi: 10.1007/3-540-45518-3_18 CrossRefGoogle Scholar
  13. 13.
    Stingl, D., Gross, C., Ruckert, J., Nobach, L., Kovacevic, A., Steinmetz, R.: PeerfactSim.KOM: a simulation framework for peer-to-peer systems. In: Proceedings of the 2011 International Conference on High Performance Computing and Simulation, HPCS 2011, pp. 577–584 (2011)Google Scholar
  14. 14.
    Stoica, I., Morris, R., Karger, D., Kaashoek, M.F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup service for internet applications. In: Proceedings of the 2001 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications, pp. 149–160 (2001)Google Scholar
  15. 15.
    Xiong, L., Liu, L.: PeerTrust: supporting reputation-based trust for peer-to-peer electronic communities. IEEE Trans. Knowl. Data Eng. 16(7), 843–857 (2004)CrossRefGoogle Scholar
  16. 16.
    Zhou, R., Hwang, K.: PowerTrust: a robust and scalable reputation system for trusted peer-to-peer computing. IEEE Trans. Parallel Distrib. Syst. 18(4), 460–473 (2007)CrossRefGoogle Scholar

Copyright information

© Springer International Publishing AG 2017

Authors and Affiliations

  1. 1.School of Electrical Engineering and Computer ScienceUniversity of OttawaOttawaCanada

Personalised recommendations