A Hierarchical Trust Model for Peer-to-Peer Networks

被引:4
|
作者
Al-Otaiby, Nehal [1 ]
Kurdi, Heba [1 ]
Al-Megren, Shiroq [1 ]
机构
[1] King Saud Univ, Coll Comp & Informat Sci, Riyadh 11642, Saudi Arabia
来源
CMC-COMPUTERS MATERIALS & CONTINUA | 2019年 / 59卷 / 02期
关键词
Peer-to-peer network; trust management; reputation; malicious peers;
D O I
10.32604/cmc.2019.06236
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Trust has become an increasingly important issue given society's growing reliance on electronic transactions. Peer-to-peer (P2P) networks are among the main electronic transaction environments affected by trust issues due to the freedom and anonymity of peers (users) and the inherent openness of these networks. A malicious peer can easily join a P2P network and abuse its peers and resources, resulting in a large-scale failure that might shut down the entire network. Therefore, a plethora of researchers have proposed trust management systems to mitigate the impact of the problem. However, due to the problem's scale and complexity, more research is necessary. The algorithm proposed here, HierarchTrust, attempts to create a more reliable environment in which the selection of a peer provider of a file or other resource is based on several trust values represented in hierarchical form. The values at the top of the hierarchical form are more trusted than those at the lower end of the hierarchy. Trust, in HierarchTrust, is generally calculated based on the standard deviation. Evaluation via simulation showed that HierarchTrust produced a better success rate than the well-established EigenTrust algorithm.
引用
收藏
页码:397 / 404
页数:8
相关论文
共 50 条
  • [1] Trust and reputation model in peer-to-peer networks
    Wang, Y
    Vassileva, J
    [J]. THIRD INTERNATIONAL CONFERENCE ON PEER-TO-PEER COMPUTING (P2P2003), PROCEEDINGS, 2003, : 150 - 157
  • [2] Multifactor hierarchical fuzzy trust evaluation on peer-to-peer networks
    Lin, Huaiqing
    Li, Zhitang
    Huang, Qingfeng
    [J]. PEER-TO-PEER NETWORKING AND APPLICATIONS, 2011, 4 (04) : 376 - 390
  • [3] Multifactor hierarchical fuzzy trust evaluation on peer-to-peer networks
    Huaiqing Lin
    Zhitang Li
    Qingfeng Huang
    [J]. Peer-to-Peer Networking and Applications, 2011, 4 : 376 - 390
  • [4] Correlation Trust Authentication Model for Peer-to-Peer Networks
    Cheng, Wei
    Tan, Zhenhua
    [J]. PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION APPLICATIONS (ICCIA 2012), 2012, : 267 - 270
  • [5] Bayesian network trust model in peer-to-peer networks
    Wang, Y
    Vassileva, J
    [J]. AGENTS AND PEER-TO-PEER COMPUTING, 2004, 2872 : 23 - 34
  • [6] Sources and Monitors: A Trust Model for Peer-to-Peer Networks
    Li, Yan
    Gouda, Mohamed G.
    [J]. 2008 PROCEEDINGS OF 17TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONS AND NETWORKS, VOLS 1 AND 2, 2008, : 285 - 290
  • [7] Trust model based on reputation for peer-to-peer networks
    Tian, Chun-Qi
    Zou, Shi-Hong
    Wang, Wen-Dong
    Cheng, Shi-Duan
    [J]. Tongxin Xuebao/Journal on Communications, 2008, 29 (04): : 63 - 70
  • [8] Extending Trust in Peer-to-Peer Networks
    Clarke, Stephen
    Christianson, Bruce
    Xiao, Hannan
    [J]. ADVANCES IN DATABASES AND INFORMATION SYSTEMS, 2010, 5968 : 145 - 152
  • [9] Self-Nominating Trust Model Based on Hierarchical Fuzzy Systems for Peer-to-Peer Networks
    Han, Qiyi
    Wen, Hong
    Ma, Ting
    Wu, Bin
    [J]. 2014 IEEE/CIC INTERNATIONAL CONFERENCE ON COMMUNICATIONS IN CHINA (ICCC), 2014, : 199 - 203
  • [10] Self-nominating trust model based on hierarchical fuzzy systems for peer-to-peer networks
    Han, Qiyi
    Wen, Hong
    Feng, Gang
    Wu, Bin
    Ren, Mengyin
    [J]. PEER-TO-PEER NETWORKING AND APPLICATIONS, 2016, 9 (06) : 1020 - 1030