Advertisement

CuboidTrust: A Global Reputation-Based Trust Model in Peer-to-Peer Networks

  • Ruichuan Chen
  • Xuan Zhao
  • Liyong Tang
  • Jianbin Hu
  • Zhong Chen
Part of the Lecture Notes in Computer Science book series (LNCS, volume 4610)

Abstract

Peer-to-Peer communication model has the potential to harness huge amounts of resources. However, some recent studies indicate that most of current Peer-to-Peer systems suffer from inauthentic resource attacks. One way to cope with these attacks is to constitute a reputation-based trust model to help evaluating the trust values of peers and predicting their future behaviors. In this paper, we propose a global reputation-based trust model, called CuboidTrust. It builds four relations among three trust factors including contribution, trustworthiness and quality of resource, and applies power iteration to compute the global trust value of each peer. The experimental results show that CuboidTrust performs efficiently, and significantly decreases the count of inauthentic resource downloads under various threat models.

Keywords

Trust Model Simulation Cycle Trust Factor Threat Model Malicious Peer 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Atkinson, K.E.: An Introduction to Numerical Analysis, 2nd edn. pp. 602–605. John Wiley & Sons, West Sussex (1989)zbMATHGoogle Scholar
  2. 2.
    Chen, R., Guo, W., Tang, L., Hu, J., Chen, Z.: Hybrid Overlay Structure Based on Virtual Node. In: Proceedings of the 12th IEEE Symposium on Computers and Communications. Aveiro, Portugal (2007)Google Scholar
  3. 3.
  4. 4.
    Kamvar, S.D., Schlosser, M.T., Garcia-Molina, H.: The EigenTrust Algorithm for Reputation Management in P2P Networks. In: Proceedings of the 12th International Conference on World Wide Web. Budapest, Hungary, pp. 640–651 (2003)Google Scholar
  5. 5.
  6. 6.
    Li, J., Wang, X., Liu, B., Wang, Q., Zhang, G.: A Reputation Management Scheme Based on Global Trust Model for Peer-to-Peer Virtual Communities. In: Proceedings of the 7th International Conference on Web-Age Information Management. Hong Kong, China, pp. 205–216 (2006)Google Scholar
  7. 7.
    Liang, J., Kumar, R., Xi, Y., Ross, K.W.: Pollution in P2P File Sharing Systems. In: Proceedings of IEEE INFOCOM. Miami, USA, pp. 1174–1185 (2005)Google Scholar
  8. 8.
    Merugu, S., Srinivasan, S., Zegura, E.: Adding Structure to Unstructured Peer-to-Peer Networks: The Role of Overlay Topology. In: Proceedings of Networked Group Communication. Munich, Germany, pp. 83–94 (2003)Google Scholar
  9. 9.
    Saroiu, S., Gummadi, P.K., Gribble, S.D.: A Measurement Study of Peer-to-Peer File Sharing Systems. In: Proceedings of Multimedia Computing and Networking. San Jose, USA, pp. 156–170 (2002)Google Scholar
  10. 10.
    Xiong, L., Liu, L.: A Reputation-Based Trust Model for Peer-to-Peer eCommerce Communities. In: Proceedings of IEEE International Conference on Electronic Commerce. Newport Beach, USA, pp. 275–284 (2003)Google Scholar
  11. 11.
    Xiong, L., Liu, L.: PeerTrust: Supporting Reputation-Based Trust for Peer-to-Peer Electronic Communities. IEEE Transactions on Knowledge and Data Engineering 16(7), 843–857 (2004)CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2007

Authors and Affiliations

  • Ruichuan Chen
    • 1
  • Xuan Zhao
    • 1
  • Liyong Tang
    • 1
  • Jianbin Hu
    • 1
  • Zhong Chen
    • 1
  1. 1.School of Electronics Engineering and Computer Science, Peking University, Beijing 100871P.R. China

Personalised recommendations