Abstract
In this paper, we propose a new trust model called EnhanEigen. This model uses the comprehensive trust to evaluate the peers and enhanced probabilistic peer selection algorithm to filter malicious peers and select the peers with high trust value. This comprehensive trust is composed of local trust value, global trust value, malicious percent (MP) and feedback consistency percent (FCP). MP and FCP are important parameters to help filter malicious peers. In experiments, good peers, malicious and malign peers, feedback cheating peers are used to validate the performance of the new trust model in peer to peer file sharing environment. Experiment show that the new trust model can greatly reduce the false feedbacks adopted by the network, has the shorter algorithm execution time and has a higher success rate of transactions. The new model can distinguish false feedbacks to resist the cooperative attacks from malicious peers and feedback cheating peers effectively.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Yang M, Yang Y (2014) Applying network coding to peer-to-peer file sharing. IEEE Trans Comput 63(8):1938–1950
Dharanipragada J, Chennai J, Haridas H (2012) Stabilizing peer-to-peer systems using public cloud: a case study of peer-to-peer search. In: Proceedings of 11th international symposium on parallel and distributed computing (ISPDC), IEEE, Munich, Germany, pp 135–142
Haase P, Siebes R, van Harmelen F (2008) Expertise based peer selection in peer-to-peer networks. Knowl Inf Syst 15(1):75–107 (Periodical style)
Schollmeier PR (2001) A definition of peer-to-peer networking for the classification of peer-to-peer architectures and applications. In: Proceedings of the first international conference on peer-to-peer computing, IEEE, Linkoping, Sweden, pp 101–102
Yu J, Li M (2008) CBT: a proximity-aware peer clustering system in large-scale BitTorrent-like peer-to-peer networks. Comput Commun 31(3):591–602 (Periodical style)
Feigenbaum J, Parkes DC, David M (2009) Computational challenges in e-commerce. Commun ACM 52(1):70–74 (Periodical style)
Beatty P, Reay I, Dick S, Miller J (2011) Consumer trust in e-commerce web sites: a meta-study. ACM Comput Surv 43(14):1–46 (Periodical style)
Hoffman K, Zage D, Nita-Rotaru C (2009) Expertise-based peer selection in peer-to-peer networks. A survey of attack and defense techniques for reputation systems. ACM Comput Surv 42(1):1–31 (Periodical style)
Oliveira L (2012) Clustering of distinct PACS archives using a cooperative peer-to-peer network. Comput Methods Programs Biomed 108(3):1002–1011 (Periodical style)
Fan W-J, Yang S-L, Perros H, Pei J (2015) A multi-dimensional trust-aware cloud service selection mechanism based on evidential reasoning approach. Int J Autom Comput 12(2):208–219
Noor TH, Sheng QZ, Zeadally S, Yu J (2013) Trust management of services in cloud environments: obstacles and solutions. ACM Comput Surv 46(1):12
Hughes D, Coulson G, Walkerdine J (2005) Free riding on Gnutella revisited: the bell tolls. IEEE Distrib Syst Online 6(6):1–18
Marsh SP (1994) Formalising trust as a computational concept. Ph.D. dissertation, University of Stirling, UK
Mui L (2003) Computational models of trust and reputation: agents, evolutionary games, and social networks. Ph.D. dissertation, Massachusetts Institute of Technology, USA
Mui L, Mohtashemi M, Andhalberstadt A (2002) A computational model of trust and reputation. In: Proceedings of the 35th Hawaii international conference on system sciences (HICSS02), IEEE, Los Alamitos, Canada, pp 188–196
Sherchan W, Nepal S, Paris C (2013) A survey of trust in social networks. ACM Comput Surv 45(4):1–33
Stoica I, Morris R, karger D, Kaashoek F, Balakrishnan H (2001) Chord: a scalable peer-to-peer lookup service for internet applications. In: Proceedings of special interest group on data communication, ACM, California, USA. Availabe: http://www.cse.iitb.ac.in/dbms/Data/Courses/CS632/2010/Papers/chord.pdf
Xiong L, Liu L (2004) PeerTrust: supporting reputation based trust for peer-to-peer electronic communities. IEEE Trans Knowl Data Eng 16(7):843–857
Kamvar SD, Schlosser MT, Garcia-Molina H (2003) The EigenTrust algorithm for reputation management in P2P networks. In: Proceedings of the 12th international conference on world wide web, New York, USA, pp 640–651
Zhou R, Hwang K (2007) PowerTrust: a robust and scalable reputation system for trusted peer-to-peer computing. IEEE Trans Parallel Distrib Syst 18(5):1–14
Zhou R, Hwang K, Cai M (2008) GossipTrust for fast reputation aggregation in peer-to-peer networks. IEEE Trans Knowl Data Eng 20(9):1282–1295
Acknowledgements
This paper is supported by the National Science Foundation (Granted number is 61602539 and 51375504).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Li, X., Gao, Q., Wu, L., Sun, X., Deng, S. (2018). EnhanEigen: A New Comprehensive Trust Model for Peer-to-Peer Network. In: Deng, Z. (eds) Proceedings of 2017 Chinese Intelligent Automation Conference. CIAC 2017. Lecture Notes in Electrical Engineering, vol 458. Springer, Singapore. https://doi.org/10.1007/978-981-10-6445-6_12
Download citation
DOI: https://doi.org/10.1007/978-981-10-6445-6_12
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-10-6444-9
Online ISBN: 978-981-10-6445-6
eBook Packages: EngineeringEngineering (R0)