• Article
  • | |
  • Metrics
  • |
  • Reference [10]
  • |
  • Related
  • |
  • Cited by [19]
  • | |
  • Comments
    Abstract:

    Reputation-Based trust mechanism can efficiently solve the problems of virus flooding and malicious behaviors in P2P network. Most of the existing trust mechanisms use a single reputation value to depict the node's reliability, which cannot prevent malicious nodes from concealing dishonest selling behaviors with honest buying behaviors, and cannot separate the new node from the malicious one. This paper provides a new distributed trust mechanism, which iteratively calculates for each node a global seller reputation value and a global buyer reputation value based on transaction history, and whether a node is trustable or not can be identified from them. Comparison experiments and performance analysis between the mechanism and EigenTrust show that the mechanism can reduce the global reputation value of malicious node rapidly, restrain collusion attack, and decrease probability malicious transactions.

    Reference
    [1]Kahney L.Cheaters bow to peer pressure.2001.http://www.wired.com/news/technology/0,1282,41838,00.html
    [2]Liang J,Kumar R,Xi Y,Ross KW.Pollution in file sharing systems.In:Makki K,Knightly E,eds.Proc.of the IEEE Infocom 2005,INFOCOM.New York:IEEE Press,2005.1174-1185.
    [3]Page L,Brin S,Motwani R,Winograd T.The PageRank citation ranking:Bringing order to the Web.Technical Report,SIDL-WP-1999-0120,Stanford University,1999.
    [4]Lian Q,Peng Y,Yang M,Zhang Z,Dai YF,Li XM.Robust incentives via multi-level tit-for-tat.In:Proc.of the 5th Int'l Workshop on Peer-to-Peer Systems (IPTPS).Santa Barbara,2006.http://iptps06.cs.ucsb.edu/
    [5]Kamvar SD,Schlosser MT,Garcia-Molina H.The EigenTrust algorithm for reputation management in P2P networks.In:Bakonyi P,Hencsey G,eds.Proc.of the 12th Int'l Conf.on World Wide Web.Budapest:ACM Press,2003.640-651.
    [6]Guha R,Kumar R,Raghavan.P,Tomkins A.Propagation of trust and distrust.In:Feldman SI,Uretsky M,Najork M,Wills CE,eds.Proc.of the 13th Int'l Conf.on World Wide Web.New York:ACM Press,2004.403-412.
    [7]Song S,Hwang K,Zhou R,Kwok YK.Trusted P2P transactions with fuzzy reputation aggregation.IEEE Internet Computing,2005,9(6):24-34.
    [8]Aberer K,Despotovic Z.Managing trust in a peer-to-peer information system.In:Paques H,Liu L,Grossman D,eds.Proc.of the 10th Int'l Conf.on Information and Knowledge Management (CIKM 2001).Atlanta:ACM Press,2001.310-317.
    [9]Swamynathan G,Zhao BY,Almeroth KC.Exploring the feasibility of proactive reputations.In:Proc.of the 5th Int'l Workshop on Peer-to-Peer Systems (IPTPS).Santa Barbara,2006.http://iptps06.cs.ucsb.edu/
    [10]Stoica I,Morris R,Liben-Nowell D,Karger DR,Kaashoek MF,Dabek F,Balakrishnan H.Chord:A scalable peer-to-peer lookup protocol for Internet applications.IEEE/ACM Trans.on Networking,2003,11(1):17-32.
    Related
    Comments
    Comments
    分享到微博
    Submit
Get Citation

彭冬生,林 闯,刘卫东.一种直接评价节点诚信度的分布式信任机制.软件学报,2008,19(4):946-955

Copy
Share
Article Metrics
  • Abstract:4715
  • PDF: 6395
  • HTML: 0
  • Cited by: 0
History
  • Received:July 01,2006
  • Revised:December 27,2006
You are the first2038515Visitors
Copyright: Institute of Software, Chinese Academy of Sciences Beijing ICP No. 05046678-4
Address:4# South Fourth Street, Zhong Guan Cun, Beijing 100190,Postal Code:100190
Phone:010-62562563 Fax:010-62562533 Email:jos@iscas.ac.cn
Technical Support:Beijing Qinyun Technology Development Co., Ltd.

Beijing Public Network Security No. 11040202500063