Skip to main content
Log in

Self-nominating trust model based on hierarchical fuzzy systems for peer-to-peer networks

  • Published:
Peer-to-Peer Networking and Applications Aims and scope Submit manuscript

Abstract

Security is a critical constraint for the expansion of Peer-to-Peer (P2P) networks. The autonomy, dynamic and distribution natures benefit both valid and malicious users and also lead that P2P networks are extremely susceptible to malicious users. Exploiting a reputation-based trust model is a feasible solution in such an open environment to build trust relationship among peers. While most of existing trust models focus on restraining the abuse and malicious attacks, intentions and sharing capabilities of peers are mostly ignored. In this paper, we present a self-nominating trust model based on hierarchical fuzzy systems to quantify the behaviors of peers. The reputation is defined based on eight factors, where three promising factors are provided by resource holders to demonstrate their desires, and four capability factors are recorded by requesters to identify the provider’s service capability. The approach degree based updating recommendation is deployed to aggregate the global trust metrics. Experimental results illustrate that our trust model effectively improves the efficiency and security of P2P systems.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7

Similar content being viewed by others

References

  1. Marmol FG, Perez GM (2009) Security threats scenarios in trust and reputation models for distributed systems. Comput Secur 28:545–556

    Article  Google Scholar 

  2. Selvaraj C, Anand S (2012) A survey on security issues of reputation management systems for peer-to-peer networks. Comput Sci Rev 6:145–160

    Article  Google Scholar 

  3. Sergio M, Hector GM (2006) Taxonomy of trust: categorizing P2P reputation systems. Comput Netw 50:472–484

    Article  MATH  Google Scholar 

  4. Kamvar SD, Schlosser MT, Hector GM (2003) Eigenrep: reputation management in P2P networks. In: Proceedings of 12th International World Wide Web Conference, vol 1 , pp 123–134

  5. Wang HY, Wang F, Liu JC, Lin C, Xu K, Wang CG (2013) Accelerating peer-to-peer file sharing with social relations. IEEE J Sel Areas Commun 31(9):66–74

    Article  Google Scholar 

  6. Zhu HJ, Du SG, Gao ZY, Dong MX, Cao ZF (2014) A probabilistic misbehavior detection scheme toward efficient trust establishment in delay-tolerant networks. IEEE Trans Parallel Distrib Syst 25(1):22–32

    Article  Google Scholar 

  7. Zhu HJ, Lin XD, Lu RX, Fan YF, Shen XM (2009) SMART: a secure multilayer credit-based incentive scheme for delay-tolerant networks. IEEE Trans Veh Technol 58(8):4628–4639

    Article  Google Scholar 

  8. Zadeh LA (1965) Fuzzy sets. Inf Control 8:338–353

    Article  MathSciNet  MATH  Google Scholar 

  9. Lai PKY, Chow KP, Hui LCK, Yiu SM (2014) Modeling the initial stage of a file sharing process on a BitTorrent network. Peer-to-Peer Netw Appl 7(4):311–319

    Article  Google Scholar 

  10. Qiu D, Srikant R (2004) Modeling and performance analysis of bit torrent-like peer-to-peer networks. In: Proceedings of ACM SIGCOMM, pp 367–378

  11. Feldman M, Padimitriou C, Chuang J, Stoica I (2006) Free-riding and whitewashing in peer-to-peer systems. IEEE J Sel Areas Commun 24(5):1010–1019

    Article  Google Scholar 

  12. Carra D, Michiardi P, Salah H, Strufe T (2013) On the impact of incentives in eMule analysis and measurements of a popular file-sharing application. IEEE J Sel Areas Commun 31(9): 94–104

    Article  Google Scholar 

  13. Damiani E, Vimercati SDCD, Paraboschi S, Samarati P (2003) Managing and sharing servents reputations in P2P systems. IEEE Trans Knowl Data Eng 15(4):840–854

    Article  Google Scholar 

  14. Dou W, Wang HM, Yan J, Peng Z (2004) A recommendation-based peer-to-peer trust model. J Softw 15(4):571–583

    MathSciNet  MATH  Google Scholar 

  15. Xiong L, Liu L (2004) PeerTrust: supporting reputation-based trust for peer-to-peer electronic communities. IEEE Trans Knowl Data Eng 16(7):843–857

    Article  Google Scholar 

  16. Song SS, Hwang K, Zhou RF, Kwok YK (2005) Trusted P2P transactions with fuzzy reputation aggregation. IEEE Internet Comput 9(6):24–34

    Article  Google Scholar 

  17. Chen HW, Ye ZW (2008) Research of P2P trust based on fuzzy decision-making. In: Proceedings of 12th International Conference on Computer Supported Cooperative Work in Design, pp 793–796

  18. Lin HQ, Li ZT, Huang QF (2011) Multifactor hierarchical fuzzy trust evaluation on peer-to-peer networks. Peer-to-Peer Netw Appl 4(4):376–390

    Article  MathSciNet  Google Scholar 

  19. Raju GVS, Zhou J, Kisner RA (1991) Hierarchical fuzzy control. Int J Control 54(5):1201–1216

    Article  MathSciNet  MATH  Google Scholar 

  20. Wang LX (1999) Analysis and design of hierarchical fuzzy systems. IEEE Trans Fuzzy Syst 7(5):617–624

    Article  Google Scholar 

  21. Lazzerini B, Marcelloni F (2006) A hierarchical fuzzy clustering-based system to create user profiles. Soft Comput 11(2):157–168

    Article  MATH  Google Scholar 

  22. Mohammadian M (2005) Innovative design of adaptive hierarchical fuzzy logic systems. In: Proceedings of the 2005 International Conference on Computational Intelligence for Modelling, Control and Automation, and International Conference on Intelligent Agents, Web Technologies and Internet Commerce , pp 1072–1079

  23. Rattasiri W, Halgamuge SK (2003) Computationally advantageous and stable hierarchical fuzzy systems for active suspension. IEEE Trans Ind Electron 50(1):48–61

    Article  Google Scholar 

  24. Lopes N, Couto P, Jurio A, Pedro MP (2013) Hierarchical fuzzy logic based approach for object tracking. Knowl-Based Syst 54:255–268

    Article  Google Scholar 

  25. Lotfi M, Ghaderi S (2013) Coordination between long-term decision process and day-ahead unit commitment in deregulated markets: a fuzzy hierarchical bi-level modeling approach. Appl Math Model 37(7):5511–5527

    Article  MathSciNet  Google Scholar 

  26. Saroiu S, Gummadi PK, Gribble SD (2002) Measurement study of peer-to-peer file sharing systems. In: Proceedings of SPIE Multimedia Computing and Networking, pp 156–170

  27. Zhou RF, Hwang K (2007) PowerTrust: a robust and scalable reputation system for trusted peer-to-peer computing. IEEE Trans Parallel Distrib Syst 18(4):460–473

    Article  Google Scholar 

Download references

Acknowledgments

This work is supported by the NSFC (Grant No. 61271172 and 61372085), RFDP (Grant No. 20120185110030, 20130185130002 and 20120185110025), SRF for ROCS, SEM 863 high technology plan (Grant No. 2015AA01A707) and Sichuan International Corporation Project (Grant No. 2013HH0005).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Qiyi Han.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Han, Q., Wen, H., Feng, G. et al. Self-nominating trust model based on hierarchical fuzzy systems for peer-to-peer networks. Peer-to-Peer Netw. Appl. 9, 1020–1030 (2016). https://doi.org/10.1007/s12083-015-0365-8

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12083-015-0365-8

Keywords

Navigation