DISTRIBUTED TRUST INFERENCE MODEL BASED ON PROBABILITY AND BALANCE THEORY FOR PEER-TO-PEER SYSTEMS

Publications

Share / Export Citation / Email / Print / Text size:

International Journal on Smart Sensing and Intelligent Systems

Professor Subhas Chandra Mukhopadhyay

Exeley Inc. (New York)

Subject: Computational Science & Engineering, Engineering, Electrical & Electronic

GET ALERTS

eISSN: 1178-5608

DESCRIPTION

3
Reader(s)
8
Visit(s)
0
Comment(s)
0
Share(s)

VOLUME 5 , ISSUE 4 (December 2012) > List of articles

DISTRIBUTED TRUST INFERENCE MODEL BASED ON PROBABILITY AND BALANCE THEORY FOR PEER-TO-PEER SYSTEMS

Zhenhua Tan * / Guangming Yang * / Wei Cheng *

Keywords : trust model, trust inference, peer-to-peer security, distributed system, trusted evidence chain, trust probability, peer-to-peer network.

Citation Information : International Journal on Smart Sensing and Intelligent Systems. Volume 5, Issue 4, Pages 1,063-1,080, DOI: https://doi.org/10.21307/ijssis-2017-523

License : (CC BY-NC-ND 4.0)

Received Date : 01-August-2012 / Accepted: 30-October-2012 / Published Online: 01-December-2012

ARTICLE

ABSTRACT

Researchers have done much around how to measure trust degrees or levels by local and global style in a given distributed network. However, how to infer trust degree for a strange node efficiently in a large-scale distributed environment was little done. This paper focuses on this problem, and proposes a novel trust model based on balance theory and probability theory. We firstly design a simple direct trust model for evidence computing, then construct trust relations network and trust inference network based on direct trust network. In order to discover trusted evidence chains during complex relations, we design two inference rules and propose mathematics models to infer indirect trust value based on Markov chain theory. Simulations proved the rightness and effectiveness in intensive trust relations environment and intensive distrust environment.

Content not available PDF Share

FIGURES & TABLES

REFERENCES

[1] L. MEKOUAR, Y. IRAQI, and R. BOUTABA, “Peer-to-peer's most wanted: malicious peers”, Computer Networks, Vol. 50, No. 4, 2006, pp. 545-562.
[2] H. Q. Lin, Z. T. Li, and Q. F. Huang, “Multifactor hierarchical fuzzy trust evaluation on peer-to-peer networks”, Peer-to-Peer Network Applications, Vol. 4, 2011, pp. 376–390.
[3] J. Li, “mSSL: A framework for trusted and incentivized peer-to-peer data sharing between distrusted and selfish clients”, Peer-to-Peer Network Applications,Vol. 4, 2011, pp. 325–345.
[4] L. Mui, M. Mohtashemi, and A. Halberstadt, “A Computational Model of Trust and Reputation for E-Businesses”, Proc. 35th Ann. Hawaii Int’l Conf. System Sciences (HICSS ’02), , 2002, pp. 2431-2439.
[5] A. Das, M. M. Islam, “SecuredTrust: A Dynamic Trust Computation Model for Secured Communication in Multiagent Systems”, IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, Vol. 9, No. 2, 2012, pp. 261-274.
[6] K. Aberer, Z. Despotovic, “Managing trust in a peer-to-peer information system”, In proceedings of the 10th International Conference on Information and Knowledge Management, ACM Press, Atlanta, GA, United states, 2001, pp. 1-7.
[7] S. D. Kamvar, M. T. Schlosser, and H. GarciaMolina, “The EigenTrust algorithm for reputation management in P2P networks”, in proceedings of ACM WWW 2003, pp. 640-651.
[8] W. Dou, H. M. Wang, and Y. Jia, “A recommendation-based peer-2-peer trust model”, Journal of Software, Vol.15, no.4, 2004, pp. 571−583.
[9] L. Xiong, L. Liu, “PeerTrust: supporting reputation-based trust for Peer-to-Peer electronic communities”, IEEE Transactions on Knowledge and Data Engineering, Vol.16, no.7, 2004, pp. 843-857.
[10] A. Jøsang, R. Hayward, and S. Pope, “Trust network analysis with subjective logic”, In proceedings of ACSC 2006, pp. 85-94.
[11] A. Jøsang, T. Bhuiyan, “Optimal trust network analysis with subjective logic”, In proceedings of SECURWARE 2008, pp. 179-184.
[12] G. Wang, J. Wu, “Multi-dimensional evidence-based trust management with multi-trusted paths”, Future Generation Computer Systems, Vol. 27, No. 5, 2011, pp.529-538.
[13] S. X. Jiang, J. Z. Li, “A Reputation-Based Trust Mechanism for P2P E-Commerce Systems”, Journal of Software, Vol.18, No.10, 2007, pp. 2551-2563.
[14] Z. H. Tan, X. W. Wang, W. Cheng, G. R. Chang, and Z. L. Zhu, “A Distributed Trust Model for Peer-to-Peer Networks Based on Multi-Dimension-History Vector”, Chinese Journal of Computers, Vol. 33, No. 9, 2010, pp. 1725-1735.
[15] E. Damiani, S. D. C. Vimercati, and S. Paraboschi, “A reputation-based approach for choosing reliable resources in peer-to-peer networks”, the 9th ACM Conference on Computer and Communications Security, Washington, DC, 2002, pp. 207-216.
[16] Z. Despotovic, K. Aberer, “Maximum likelihood estimation of peers’ performance in P2P networks”, the 2nd Workshop on the Economics of Peer-to-Peer Systems, Cambridge, 2004, pp. 1-9.
[17] F. Heider, “The Psychology of Interpersonal Relations”, Wiley, 1958.
[18] Z. H. Tan, H. Wang, W. Cheng, and G. R. Chang, “A distributed Trust Model for P2P overlay networks based on correlativity of communication history”, Journal of Northeastern University (Natural Science), Vol. 30, No.9, 2009, pp. 1245-1248.
[19] J. Leskovec, D. Huttenlocher, and J. Kleinberg,“Signed Networks in Social Media“, 28th ACM Conference on Human Factors in Computing Systems , 2010, pp. 1361-1370.

EXTRA FILES

COMMENTS