Peer-to-Peer Networking and Applications

, Volume 11, Issue 3, pp 619–631 | Cite as

sureTrust: a super peer-aware trust model for 2-level P2P networks



With the growth of P2P applications, more and more trust models have been proposed for curbing malicious behavior, most of which are suitable for pure P2P networks, including the structured P2P networks and the unstructured P2P networks. This paper presents a super peer-aware trust model, sureTrust, for 2-level P2P networks. The super peer of a subnet is responsible for calculating the peers’ trust in its subnet, and the super peer’s trust is correlated with the trust of the peers in its subnet. To discourage peers from behaving maliciously, we allow a peer to establish transactions only with the peers whose trust is similar to that of the peer. Also, a super peer could separate the connections of a peer in its subnet to the outside subnets as the punishment on the peer’s behavior. The simulation results show that the sureTrust model could improve normal peers’ successful download rate and resist different types of attacks.


2-level P2P network Trust model Super peer Feedback verification Punishment 


  1. 1.
    Sepandar DK, Mario TS, Hector GM (2003) The EigenTrust algorithm for reputation management in P2P networks. In: proc. of the 12th Int’l Conf. On world wide web. Budapest, ACM press, pp 640–651Google Scholar
  2. 2.
    A. Das, MM. Islam (2011) SecuredTrust: a dynamic trust computation model for secured communication in multiagent systems. IEEE Trans. Dependable and Secure Computing, vol. 2, pp 261–274Google Scholar
  3. 3.
    Xiong L, Liu L (2004) PeerTrust: supporting reputation-based trust in peer-to-peer communities. IEEE Trans. Data and knowledge engineering. Special Issue on Peer-to-Peer Based Data Management 7:843–857Google Scholar
  4. 4.
    Su X, Zhang MJ, Mu Y (2010) PBTrust: a priority-based trust model for service selection in general service-oriented environments. In: Proc. of IEEE/IFIP International Conference on Embedded and Ubiquitous ComputingGoogle Scholar
  5. 5.
    Meng XF, Ding YL, Gong Y (2012) @trust: a trust model based on feedback-arbitration in structured P2P network. Comput Commun 16:2044–2053CrossRefGoogle Scholar
  6. 6.
    Tian CQ, Yang BJ, Zhong JD, Liu XJ (2014) Trust-based incentive mechanism to motivate cooperation in hybrid P2P networks. Comput Netw 73(11):244–255CrossRefGoogle Scholar
  7. 7.
    Lian Q, Zhang Z, Yang M, et al (2007) An empirical study of collusion behavior in the maze P2P file-sharing system. ICDCS 27th International Conference on distributed computing systems, IEEE, Toronto, pp 1–10Google Scholar
  8. 8.
    Liang J, Kumar R, Ross KW (2006) The fast-track overlay: a measurement study. Comput Netw 50(6):842–858CrossRefGoogle Scholar
  9. 9.
    Tian CQ, Yang BJ (2011) R2Trust, a reputation and risk based trust management framework for large-scale, fully decentralized overlay networks. Future Gener Comput Syst (Elsevier) 27(8):1135–1143CrossRefGoogle Scholar
  10. 10.
    Wang Y, Vassileva J (2003) Trust and reputation model in peer-to-peer networks. In: proceedings of International Conference on peer-to-peer computing (P2P’03), Washington, pp 150–157Google Scholar
  11. 11.
    Schmidt S, Steele R, Dillon TS, Chang E (2007) Fuzzy trust evaluation and credibility development in multi-agent systems. Appl Soft Comp J 2:492–505CrossRefGoogle Scholar
  12. 12.
    Lin HQ, Li ZT, Huang QF (2011) Multifactor hierarchical fuzzy trust evaluation on peer-to-peer networks. Peer-to-Peer Network Appl 4:376–390CrossRefGoogle Scholar
  13. 13.
    eBay International. Accessed 20 Jan 2017
  14. 14.
    Resnick P, Zeckhauser R (2002) Trust among strangers in internet transactions: empirical analysis of eBay’s reputation system. Econ Internet E-Commerce Advan Appl Microecon 11:127–157CrossRefGoogle Scholar
  15. 15.
    Xue WL, Liu YQ, Li KQ et al (2012) DHTrust: a robust and distributed reputation system for trusted peer-to-peer networks. Concurrency and computation: practice and experience. Special Issue on Advances in Network and System Security 10:1037–1051Google Scholar
  16. 16.
    Li XY, Zhou F, Yang XD (2011) A multi-dimensional trust evaluation model for large-scale P2P computing. J Parall Distribut Comp 6:837–847CrossRefMATHGoogle Scholar
  17. 17.
    Jia C, Xie L, Gan XC, Liu WH, Han ZG (2012) A trust and reputation model considering overall peer consulting distribution. IEEE Trans. Systems man and cybernetics part a. Sys Human 1:164–177CrossRefGoogle Scholar
  18. 18.
    Fan X, Li M, Ma J et al (2012) Behavior-based reputation management in P2P file-sharing networks. J Comput Syst Sci 78(6):1737–1750MathSciNetCrossRefMATHGoogle Scholar
  19. 19.
    Jia C, Xie L, Gan XC et al (2012) A trust and reputation model considering overall peer consulting distribution. IEEE Trans Sys Man Cyber: Part A-Systems Humans 42(1):164–177CrossRefGoogle Scholar
  20. 20.
    Zhao HY, Li XL (2013) VectorTrust: trust vector aggregation scheme for trust management in peer-to-peer networks. J Supercomput 64(3):805–829CrossRefGoogle Scholar
  21. 21.
    Ren YZ, Li MC, Sakurai K (2011) FineTrust: a fine-grained trust model for peer-to-peer networks. Sec Commun Network 4:61–69CrossRefGoogle Scholar
  22. 22.
    Li X, Zhou F, Yang X (2012) Scalable feedback aggregating (SFA) overlay for large-scale P2P trust management. IEEE Trans Parallel Distribut Sys 23(10):1944–1957CrossRefGoogle Scholar
  23. 23.
    Can AB, Bhargava B (2013) SORT: a self-organizing trust model for peer-to-peer systems. IEEE Trans Depend Secure Comp 10(1):14–27CrossRefGoogle Scholar
  24. 24.
    Lu K, Wang JL, Li MC (2016) An Eigentrust dynamic evolutionary model in P2P file-sharing systems. Peer-to-peer Network Appl 9:599–612CrossRefGoogle Scholar
  25. 25.
    Tutschku K (2004) A measurement-based traffic profile of the eDonkey file sharing service, 5th International workshop. Springer, France, pp 12–21Google Scholar
  26. 26.
    Huang D, Zhang A, Huang J, Li J (2008) Research on Peer-to-peer network Gnutella 0.6 architecture. Comp Appl Software 25(6):208–210Google Scholar
  27. 27.
    Jin Y, Liu Y, Zhao HW (2010) Trust-based supernode selection in peer-to-peer systems. ICFCC Future Computer and communication 2010 2nd International Conference on, IEEE, Wuhan, V1-285-V1-289Google Scholar
  28. 28.
    Luo HF, Deng L (2013) Research on a P2P supper node selection mechanism based on trust model. ICCSE the 8th International Conference on Computer Science & Education, IEEE, Colombo, pp 851–854Google Scholar
  29. 29.
    Han J, Park D (2003) A lightweight personal grid using a super node network. P2P’03 proceedings of the third International Conference on peer-to-peer computing, IEEE, pp 168–175Google Scholar
  30. 30.
    Mark J, Alberto M, Gian P, et al. Accessed 16 Jan 2017

Copyright information

© Springer Science+Business Media, LLC 2017

Authors and Affiliations

  1. 1.School of Computer Science and TechnologyDalian University of TechnologyDalianChina

Personalised recommendations