Heuristic Discovery of Role-Based Trust Chains in Peer-to-Peer Networks

被引:24
|
作者
Chen, Ke [1 ]
Hwang, Kai [2 ]
Chen, Gang [1 ]
机构
[1] Zhejiang Univ, Sch Comp Sci, Hangzhou 310027, Peoples R China
[2] Univ So Calif, Dept Elect Engn & Comp Sci, Los Angeles, CA 90089 USA
基金
美国国家科学基金会;
关键词
Peer-to-peer networks; trust delegation; role-based credentials; heuristic semantics; Internet applications;
D O I
10.1109/TPDS.2008.60
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Credential chains are needed in trusted peer-to-peer (P2P) applications, where trust delegation must be established between each pair of peers at specific role level. Role-based trust is refined from the coarse-grained trust model used in most P2P reputation systems. This paper offers a novel heuristic-weighting approach to selecting the most likely path to construct a role-based trust chain. We apply history-sensitive heuristics to measure the path complexity and to assess the chaining efficiency. Our method discovers successive edges of a trust chain, adaptively, to match with the demands in any given P2P application. New heuristic chaining algorithms are developed for backward, forward, and bidirectional discovery of trust chains. Our heuristic chain discovery scheme shortens the search time, reduces the memory requirement, and enhances the chaining accuracy in scalable P2P networks. Consider a trust graph over N credentials and M distinct role nodes. Our heuristic trust-chain discovery algorithms require O(N(2)logN) search time and O(M) memory space, if the secondary heuristics are generated offline in advance. These are improved from O(N-3) search time and O(NM) space required in nonheuristic discovery algorithms developed by Li et al. [12]. Our analytical results are verified by extensive simulation experiments over typical classes of role- based trust graphs.
引用
收藏
页码:83 / 96
页数:14
相关论文
共 50 条
  • [21] Bayesian network trust model in peer-to-peer networks
    Wang, Y
    Vassileva, J
    AGENTS AND PEER-TO-PEER COMPUTING, 2004, 2872 : 23 - 34
  • [22] AbsoluteTrust: Algorithm for Aggregation of Trust in Peer-to-Peer Networks
    Awasthi, Sateesh Kumar
    Singh, Yatindra Nath
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2022, 19 (01) : 176 - 189
  • [23] Reputation and trust management in heterogeneous peer-to-peer networks
    Chu, Xiaowen
    Chen, Xiaowei
    Zhao, Kaiyong
    Liu, Jiangchuan
    TELECOMMUNICATION SYSTEMS, 2010, 44 (3-4) : 191 - 203
  • [24] Sources and Monitors: A Trust Model for Peer-to-Peer Networks
    Li, Yan
    Gouda, Mohamed G.
    2008 PROCEEDINGS OF 17TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONS AND NETWORKS, VOLS 1 AND 2, 2008, : 285 - 290
  • [25] Fuzzy Trust for Peer-to-Peer Based Systems
    Azzedin, Farag
    Ridha, Ahmad
    Rizvi, Ali
    PROCEEDINGS OF WORLD ACADEMY OF SCIENCE, ENGINEERING AND TECHNOLOGY, VOL 21, 2007, 21 : 123 - +
  • [26] Trust and Credit: The Role of Appearance in Peer-to-peer Lending
    Duarte, Jefferson
    Siegel, Stephan
    Young, Lance
    REVIEW OF FINANCIAL STUDIES, 2012, 25 (08): : 2455 - 2483
  • [27] A resource discovery strategy for mobile peer-to-peer networks
    State Key Laboratory of Rail Traffic Control and Safety, Beijing Jiaotong University, 100044 Beijing, China
    WINSYS - Proc. Int. Conf. Wirel. Inf. Networks Syst., (42-46):
  • [28] A Survey of Resource Discovery in Mobile Peer-to-Peer Networks
    Zhou Xin-Xin
    Zou Zhen-Wan
    Kong Peng
    Song Ren-Jie
    2015 FIFTH INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS AND NETWORK TECHNOLOGIES (CSNT2015), 2015, : 122 - 125
  • [29] A RESOURCE DISCOVERY STRATEGY FOR MOBILE PEER-TO-PEER NETWORKS
    Wu, Hao
    Cheng, Chao
    Zhong, Zhangdui
    WINSYS 2010: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON WIRELESS INFORMATION NETWORKS AND SYSTEM, 2010, : 42 - 46
  • [30] Programmable resource discovery using peer-to-peer networks
    Smith, P
    Simpson, S
    Hutchison, D
    ACTIVE NETWORKS, PROCEEDINGS, 2002, 2546 : 229 - 240