Advertisement

A Trust Evolution Model for P2P Networks

  • Yuan Wang
  • Ye Tao
  • Ping Yu
  • Feng Xu
  • Jian Lü
Part of the Lecture Notes in Computer Science book series (LNCS, volume 4610)

Abstract

The issue of selecting the peers with reliable information, resources or services becomes very difficult for the decentralized architecture of P2P networks. Trust is a new approach to predict the quality of resources of the peers. This paper proposes a trust evolution model to build trust relationships among peers automatically and support trust evolution, in which two critical dimensions, experience and context, are taken into account. This model supports decentralized trust management. Furthermore, it proposes an approach to form trust according to the information of relevant contexts. Results of simulation show that the model can suit the P2P networks effectively.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    William, K.J., Sirer, E.G., Schneider, F.B.: Peer-to-Peer Authentication with a Distributed Single Sign-On Service. IPTPS, pp. 250–258 (2004)Google Scholar
  2. 2.
    Resnickand, Zeckhauserand, R., Friedman, E., Kuwabara, K.: Reputation systems. Communications of the ACM 43(12) (2000) Google Scholar
  3. 3.
    Abdul-Rahman, A., Hailes, S.: A distributed trust model. In: Proceedings of, New Security Paradigms Workshop, pp. 48–60. ACM Press, Cumbria (1998), http://www.ib.hu-berlin.de/~kuhlen/VERT01/abdul-rahman-trust-model1997.pdf Google Scholar
  4. 4.
    Beth, T., et al.: Valuation of Trust In Open Network. In: Proceedings of European Symposium On Research in Security, pp. 3–18. Springer, Brighton (1994)Google Scholar
  5. 5.
    Jøsang, A., Knapskog, S.J.: A metric for trusted systems. Global IT Security. Wien: Austrian Computer Society 541–549 (1998) Google Scholar
  6. 6.
    English, C., Nixon, P., Terzis, S., et al.: Dynamic Trust Models for Ubiquitous computing Environments. In: First Workshop on Security in Ubiquitous Computing at the Fourth Annual conference on Ubiquitous computing (October 2002)Google Scholar
  7. 7.
  8. 8.
  9. 9.
    Gambetta, D.: Can we trust trust? In: Gambetta, D. (ed.) Trust: Making and Breaking Cooperative Relations, pp. 213–237. Oxford Press, Blackwell (1990)Google Scholar
  10. 10.
    Kinateder, M., Rothermel, K.: Architecture and Algorithms for a Distributed Reputation Systems. In: Proceeding of First International Conference on Trust Management, iTrust 2003, Heraklion, Crete, Greece, pp. 1–16 (May 2003)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2007

Authors and Affiliations

  • Yuan Wang
    • 1
  • Ye Tao
    • 1
  • Ping Yu
    • 1
  • Feng Xu
    • 1
  • Jian Lü
    • 1
  1. 1.State Key Laboratory for Novel Software Technology, Nanjing University, Nanjing, JiangsuChina

Personalised recommendations