The Journal of Supercomputing

, Volume 69, Issue 3, pp 1382–1409 | Cite as

An incentive compatible reputation mechanism for P2P systems

  • Junsheng Chang
  • Zhengbin Pang
  • Weixia Xu
  • Huaimin Wang
  • Gang Yin
Article

Abstract

In peer-to-peer (P2P) systems, peers often must interact with unknown or unfamiliar peers without the benefit of trusted third parties or authorities to mediate the interactions. Trust management through reputation mechanism to facilitate such interactions is recognized as an important element of P2P systems. It is, however, faced by the problems of how to stimulate reputation information sharing and honest recommendation elicitation. This paper presents an incentive compatible reputation mechanism for P2P systems. It has two unique features: (1) a recommender’s trustworthiness and level of confidence about the recommendation is considered for a more accurate calculation of reputations and fair evaluation of recommendations. (2) Incentive for participation and honest recommendation is implemented through a fair differential service mechanism. It relies on peer’s level of participation and on the recommendation credibility. Theoretic analysis and simulation show that the reputation mechanism we propose can help peers effectively detect dishonest recommendations in a variety of scenarios where more complex malicious strategies are introduced. Moreover, it can also stimulate peers to send sufficiently honest recommendations. The latter is realized by ensuring that active and honest recommenders, compared to inactive or dishonest ones, can elicit the most honest (helpful) recommendations and thus suffer the least number of wrong trust decisions.

Keywords

Trust Reputation mechanism Recommendation Incentive mechanism 

References

  1. 1.
    Andy O (2001) Peer to peer: harnessing the power of disruptive technologies. ISBN: 0-596-00110-XGoogle Scholar
  2. 2.
    Karl A, Zoran D (2001) Managing trust in a peer-to-peer information system. In: The Proceedings of Intl. Conf. on information and knowledge managementGoogle Scholar
  3. 3.
    Sepandar DK, Mario TS, Hector G-M (2003) The eigentrust algorithm for reputation management in P2P networks. In: The Proceedings of the twelfth international conference on World Wide Web, Budapest, HungaryGoogle Scholar
  4. 4.
    Damiani E, De Capitani di Vimercati S, Paraboschi S, Samarati P (2003) Managing and sharing servents’ reputations in p2p systems. IEEE Trans Data Knowl Eng 15(4):840–854Google Scholar
  5. 5.
    Xiong L, Liu L (July 2004) PeerTrust: supporting reputation-based trust in peer-to-peer communities. IEEE Trans Data Knowl Eng Special Issue Peer-to-Peer Based Data Manag 16(6):843–857Google Scholar
  6. 6.
    Yu B, Singh MP, Sycara K (2004) Developing trust in large-scale peer-to-peer systems. In: Proceedings of First IEEE symposium on multi-agent security and survivabilityGoogle Scholar
  7. 7.
    Zhao H, Li X (2009) H-Trust: a group trust management system for peer-to-peer desktop grid. J Computer Sci Technol 24(5):833–843Google Scholar
  8. 8.
    Anupam D, Mahfuzul IM (2012) SecuredTrust : a dynamic trust computation model for secured communication in multi-agent systems. IEEE Trans Dependable Secur Comput 9(2):1–15CrossRefGoogle Scholar
  9. 9.
    Swamynathan G, Zhao BY (2010) The design of a reliable reputation system. Electron Commer Res 10:239–270CrossRefMATHGoogle Scholar
  10. 10.
    Wang X, Liu L, Su J (2010) RLM: a general model for trust representation and aggregation. IEEE Trans Services Comput 5(1):131–143Google Scholar
  11. 11.
    Chang J, Wang H, Yin G (2006) A time-frame based trust model for P2P systems. In: Proceedings of 9th International Conference on information security cryptology, Seoul, KoreaGoogle Scholar
  12. 12.
    Jurca R, Faltings B (2003) An incentive compatible reputation mechanism. In: Proceedings of the IEEE Conference on electronic commerce, Newport Beach, CA, USAGoogle Scholar
  13. 13.
    Jurca R, Garcin F, Talwar A, Faltings B (2010) Reporting Incentives and biases in online review forums. ACM Trans Web (TWEB) 4(2):1–27Google Scholar
  14. 14.
    Lam SK, Riedl J (2004) Shilling recommender systems for fun and profit. In: Proceedings of the 13th World Wide Web ConferenceGoogle Scholar
  15. 15.
    Srivatsa M, Li X, Liu L (2005) TrustGuard: countering vulnerabilities in reputation management for decentralized overlay networks. WWW 2005:422–431Google Scholar
  16. 16.
    Feng Q, Liu L, Dai Y (2012) Vulnerabilities and countermeasures in context-aware social rating services, special issue on context-aware web services for the future internet. ACM Trans Internet Technol (TOIT) 11(3):11:1–11:27Google Scholar
  17. 17.
    Mozhgan T, Kevin CA (2012) A taxonomy to express open challenges in trust and reputation systems. J Commun 7(6):538–551Google Scholar
  18. 18.
    Withby A, Jøsang A, Indulska J (2004) Filtering out unfair ratings in Bayesian reputation systems. In: Proceedings of the 7th Int. workshop on trust in agent societies (at AAMAS’04). ACMGoogle Scholar
  19. 19.
    Dellarocas C (2000) Immunizing online reputation reporting systems against unfair ratings and discriminatory behavior. In: ACM Conference on electronic commerce, pp 150–157Google Scholar
  20. 20.
    Chen M, Singh J (2001) Computing and using reputations for internet ratings. In: Proceedings of the Third ACM Conference on electronic commerce (EC’01). ACMGoogle Scholar
  21. 21.
    Li X (2005) Resilient reputation and trust management: models and techniques. PhD Thesis, Georgia Institute of TechnologyGoogle Scholar
  22. 22.
    Despotovic Z, Aberer K (2004) Maximum likelihood estimation of peers’ performances in P2P networks. In: Proceedings of the 2nd workshop on the economics of peer-to-peer systems, Cambridge, MA, USA, pp 1–9Google Scholar
  23. 23.
    Zhou R, Hwang K (2007 )Power-Trust: a robust and scalable reputation system for trusted peer-to-peer computing. IEEE Trans Parallel Distrib Syst 18(4):460–473Google Scholar
  24. 24.
    Zhou R, Hwang K, Cai M (2008) GossipTrust for fast reputation aggregation in peer-to-peer networks. IEEE Trans Knowl Data Eng 20(9):1282–1295CrossRefGoogle Scholar
  25. 25.
    Liang Z, Shi W (2008) Analysis of ratings on trust inference in open environments. Perform Eval 65(2):99–128CrossRefGoogle Scholar
  26. 26.
    Fernandes A, Kotsovinos E, Ostring S, Dragovic B (2004) Pinocchio: incentives for honest participation in distributed trust management. In Proceedings of 2nd Intl Conf. on trust management (iTrust 2004)Google Scholar
  27. 27.
    Feldman M, Lai K, Stoica I, Chuang J (2004) Robust. Incentive techniques for peer-to-peer networks. In: 4th ACM conference on electronic commerce(EC04). NewYork, NY, USAGoogle Scholar
  28. 28.
    Miller N, Resnick P, Zeckhauser R (2005) Eliciting informative feedback: the peer-prediction method. Manag Sci 51(9):1359–1373CrossRefGoogle Scholar
  29. 29.
    Zhao H, Yang X, Li X (2012) An incentive mechanism to reinforce truthful reports in reputation systems. J Netw Computer Appl 35:951–961CrossRefGoogle Scholar
  30. 30.
    Pranata I, Skinner G, Athauda R (2013) Modeling decentralized reputation-based trust for initial transactions in digital environments. ACM Trans Internet Technol 12(3):8CrossRefGoogle Scholar
  31. 31.
    Papaioannou TG, Stamoulis GD (2005) An incentives’ mechanism promoting truthful feedback in peer-to-peer systems. In: Proceedings of the 5th IEEE/ACM International symposium in cluster computing and the grid, Cardi, UKGoogle Scholar
  32. 32.
    Papaioannou TG, Stamoulis GD (2010) A mechanism that provides incentives for truthful feedback in peer-to-peer systems. Electron Commer Res 10:331–362Google Scholar
  33. 33.
    Dellarocas C (2006) Reputation mechanisms. In: Hendershott T (ed) Handbook on information systems and economics. Elsevier Publishing, AmsterdamGoogle Scholar
  34. 34.
    Beth T, Borcherding M, Klein B (1994) Valuation of trust in open networks. In: Proceedings of 3rd European symposium on research in computer security—ESORICS ’94Google Scholar
  35. 35.
    Murata T, Saito K (2006) Extracting user interests from web log data. In; Proceedings of the 2006 IEEE/WIC/ACM International Conference on Web, Intelligence, pp 343–346Google Scholar
  36. 36.
    Shaun HH, Yanis V (2004) Game theory: a critical text. Routledge. ISBN: 0-415-25094-3, p 191Google Scholar
  37. 37.
    Liu J, Issarny V (2006) An incentive compatible reputation mechanism for ubiquitous computing environments. In: PST 2006. International Conference on privacy, security and trust, Toronto, CanadaGoogle Scholar
  38. 38.
    Yu B, Venkatraman M, Singh MP (2003) An adaptive social network for information access: theoretical and experimental results. J Appl Artif Intell 17(1):21–38CrossRefGoogle Scholar

Copyright information

© Springer Science+Business Media New York 2014

Authors and Affiliations

  • Junsheng Chang
    • 1
  • Zhengbin Pang
    • 1
  • Weixia Xu
    • 1
  • Huaimin Wang
    • 1
  • Gang Yin
    • 1
  1. 1.Computer CollegeNational University of Defense TechnologyChangshaChina

Personalised recommendations