Heuristic Discovery of Role-Based Trust Chains in Peer-to-Peer Networks

被引:24
|
作者
Chen, Ke [1 ]
Hwang, Kai [2 ]
Chen, Gang [1 ]
机构
[1] Zhejiang Univ, Sch Comp Sci, Hangzhou 310027, Peoples R China
[2] Univ So Calif, Dept Elect Engn & Comp Sci, Los Angeles, CA 90089 USA
基金
美国国家科学基金会;
关键词
Peer-to-peer networks; trust delegation; role-based credentials; heuristic semantics; Internet applications;
D O I
10.1109/TPDS.2008.60
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Credential chains are needed in trusted peer-to-peer (P2P) applications, where trust delegation must be established between each pair of peers at specific role level. Role-based trust is refined from the coarse-grained trust model used in most P2P reputation systems. This paper offers a novel heuristic-weighting approach to selecting the most likely path to construct a role-based trust chain. We apply history-sensitive heuristics to measure the path complexity and to assess the chaining efficiency. Our method discovers successive edges of a trust chain, adaptively, to match with the demands in any given P2P application. New heuristic chaining algorithms are developed for backward, forward, and bidirectional discovery of trust chains. Our heuristic chain discovery scheme shortens the search time, reduces the memory requirement, and enhances the chaining accuracy in scalable P2P networks. Consider a trust graph over N credentials and M distinct role nodes. Our heuristic trust-chain discovery algorithms require O(N(2)logN) search time and O(M) memory space, if the secondary heuristics are generated offline in advance. These are improved from O(N-3) search time and O(NM) space required in nonheuristic discovery algorithms developed by Li et al. [12]. Our analytical results are verified by extensive simulation experiments over typical classes of role- based trust graphs.
引用
收藏
页码:83 / 96
页数:14
相关论文
共 50 条
  • [41] DGTM: a dynamic grouping based trust model for mobile peer-to-peer networks
    Jia, Mei-juan
    Wang, Hui-qiang
    Lin, Jun-yu
    Feng, Guang-sheng
    Yu, Hai-tao
    FRONTIERS OF INFORMATION TECHNOLOGY & ELECTRONIC ENGINEERING, 2017, 18 (04) : 559 - 569
  • [42] CuboidTrust: A global reputation-based trust model in Peer-to-Peer networks
    Chen, Ruichuan
    Zhao, Xuan
    Tang, Liyong
    Hu, Jianbin
    Chen, Zhong
    AUTONOMIC AND TRUSTED COMPUTING, PROCEEDINGS, 2007, 4610 : 203 - +
  • [43] Trust-based community formation in peer-to-peer file sharing networks
    Wang, Y
    Vassileva, J
    IEEE/WIC/ACM INTERNATIONAL CONFERENCE ON WEB INTELLIGENCE (WI 2004), PROCEEDINGS, 2004, : 341 - 348
  • [44] Generalized Analysis of Convergence of Absolute Trust in Peer-to-Peer Networks
    Awasthi, Sateesh Kumar
    Singh, Yatindra Nath
    IEEE COMMUNICATIONS LETTERS, 2016, 20 (07) : 1345 - 1348
  • [45] Multifactor hierarchical fuzzy trust evaluation on peer-to-peer networks
    Lin, Huaiqing
    Li, Zhitang
    Huang, Qingfeng
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2011, 4 (04) : 376 - 390
  • [46] Multifactor hierarchical fuzzy trust evaluation on peer-to-peer networks
    Huaiqing Lin
    Zhitang Li
    Qingfeng Huang
    Peer-to-Peer Networking and Applications, 2011, 4 : 376 - 390
  • [47] A Trust Framework for Peer-to-Peer Interaction in Ad Hoc Networks
    Boodnah, Javesh
    Poslad, Stefan
    2009 COMPUTATION WORLD: FUTURE COMPUTING, SERVICE COMPUTATION, COGNITIVE, ADAPTIVE, CONTENT, PATTERNS, 2009, : 707 - 712
  • [48] Combining search and trust models in unstructured peer-to-peer networks
    Mashayekhi, Hoda
    Habibi, Jafar
    JOURNAL OF SUPERCOMPUTING, 2010, 53 (01): : 66 - 85
  • [49] A gossip-based approach for resource discovery in structured peer-to-peer networks
    Deng, Ze
    Feng, Dan
    Zhou, Ke
    Shi, Zhan
    Tien Tzu Hsueh Pao/Acta Electronica Sinica, 2010, 38 (11): : 2510 - 2517
  • [50] Combining search and trust models in unstructured peer-to-peer networks
    Hoda Mashayekhi
    Jafar Habibi
    The Journal of Supercomputing, 2010, 53 : 66 - 85