A New Reputation Mechanism Against Dishonest Recommendations in P2P Systems

  • Junsheng Chang
  • Huaimin Wang
  • Gang Yin
  • Yangbin Tang
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 4831)

Abstract

In peer-to-peer (P2P) systems, peers often must interact with unknown or unfamiliar peers without the benefit of trusted third parties or authorities to mediate the interactions. Trust management through reputation mechanism to facilitate such interactions is recognized as an important element of P2P systems. However current P2P reputation mechanism can not process such strategic recommendations as correlative and collusive ratings. Furthermore in them there exists unfairness to blameless peers. This paper presents a new reputation mechanism for P2P systems. It has a unique feature: a recommender’s credibility and level of confidence about the recommendation is considered in order to achieve a more accurate calculation of reputations and fair evaluation of recommendations. Theoretic analysis and simulation show that the reputation mechanism we proposed can help peers effectively detect dishonest recommendations in a variety of scenarios where more complex malicious strategies are introduced.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Oram, A.: Peer to Peer: Harnessing the power of disruptive technologies (2001), ISBN 0-596-00110-XGoogle Scholar
  2. 2.
    Aberer, K., Despotovic, Z.: Managing Trust in a Peer-2-Peer Information System. In: The Proceedings of Intl. Conf. on Information and Knowledge Management (2001)Google Scholar
  3. 3.
    Kamwar, S.D., Schlosser, M.T., Garcia-Molina, H.: The Eigentrust Algorithm for Reputation Management in P2P Networks. In: The Proceedings of the twelfth international conference on World Wide Web, Budapest, Hungary (2003)Google Scholar
  4. 4.
    Damiani, E., De Capitani di Vimercati, S., Paraboschi, S., Samarati, P.: Managing and sharing servents’ reputations in p2p systems. IEEE Transactions on Data and Knowledge Engineering 15(4), 840–854 (2003)CrossRefGoogle Scholar
  5. 5.
    Xiong, L., Liu, L.: PeerTrust: Supporting reputation-based trust in peer-to-peer communities. IEEE Transactions on Data and Knowledge Engineering, Special Issue on Peer-to-Peer Based Data Management 16(7), 843–857 (2004)Google Scholar
  6. 6.
    Yu, B., Singh, M.P., Sycara, K.: Developing trust in large-scale peer-to-peer systems. In: Proceedings of First IEEE Symposium on Multi-Agent Security and Survivability (2004)Google Scholar
  7. 7.
    Junsheng, C., Huaimin, W., Gang, Y.: A Time-Frame Based Trust Model for P2P Systems. In: Proceedings of 9th International Conference on Information Security Cryptology, Seoul, Korea (2006)Google Scholar
  8. 8.
    Lam, S.K., Riedl, J.: Shilling recommender systems for fun and profit. In: Proceedings of the 13th World Wide Web Conference (2004)Google Scholar
  9. 9.
    Srivatsa, M., Xiong, L., Liu, L.: TrustGuard: countering vulnerabilities in reputation management for decentralized overlay networks. In: WWW 2005, pp. 422–431 (2005)Google Scholar
  10. 10.
    Withby, A., Jøsang, A., Indulska, J.: Filtering Out Unfair Ratings in Bayesian Reputation Systems. In: AAMAS 2004. Proceedings of the 7th Int. Workshop on Trust in Agent Societies, ACM, New York (2004)Google Scholar
  11. 11.
    Dellarocas, C.: Immunizing Online Reputation Reporting Systems Against Unfair Ratings and Discriminatory Behavior. In: ACM Conference on Electronic Commerce, pp. 150–157 (2000)Google Scholar
  12. 12.
    Chen, M., Singh, J.: Computing and Using Reputations for Internet Ratings. In: EC 2001. Proceedings of the Third ACM Conference on Electronic Commerce, ACM, New York (2001)Google Scholar
  13. 13.
    Feng, Z.J., Xian, T., Feng, G.J.: An Optimized Collaborative Filtering Recommendation Algorithm. Journal of Computer Research and Development 41(10) (2004) (in Chinese)Google Scholar
  14. 14.
    Huynh, T.D., Jennings, N.R., Shadbolt, N.: On handling inaccurate witness reports. In: Proc. 8th International Workshop on Trust in Agent Societies, Utrecht, The Netherlands, pp. 63–77 (2005)Google Scholar
  15. 15.
    Beth, T., Borcherding, M., Klein, B.: Valuation of Trust in Open Networks. In: Gollmann, D. (ed.) Computer Security - ESORICS 1994. LNCS, vol. 875, Springer, Heidelberg (1994)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2007

Authors and Affiliations

  • Junsheng Chang
    • 1
  • Huaimin Wang
    • 1
  • Gang Yin
    • 1
  • Yangbin Tang
    • 1
  1. 1.School of Computer, National University of Defense Technology, HuNan Changsha 410073China

Personalised recommendations