Evaluation of P2P Algorithms for Probabilistic Trust Inference in a Web of Trust

  • Huqiu Zhang
  • Aad van Moorsel
Part of the Lecture Notes in Computer Science book series (LNCS, volume 5261)


The problem of finding trust paths and estimating the trust one can place in a partner arises in various application areas, including virtual organisations, authentication systems and reputation systems. We study the use of peer-to-peer algorithms for finding trust paths and probabilistically assessing trust values in systems where trust is organised similar to the ‘web of trust’. We do this through discrete event simulation of random as well as scale free trust networks based on flooding as well as selective search algorithms. Our main conclusion is that in many situations these algorithms can be seen as belonging to a single class of algorithms that perform equally, and only differ through (and are sensitive to) parameter choices. We will also see that flooding is the only applicable method if one stresses the requirement for finding all trust paths, and if networks are less connected.


Peer-to-Peer Web of Trust Trust Paths Trust Inference 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Jonczy, J., Wüthrich, M., Haenni, R.: A probabilistic trust model for GnuPG. In: 23C3, 23rd Chaos Communication Congress, Berlin, Germany, pp. 61–66 (2006)Google Scholar
  2. 2.
    Ribeiro de Mello, E., van Moorsel, A.P.A., da Silva Fraga, J.: Evaluation of P2P search algorithms for discovering trust paths. In: European Performance Engineering Workshop. LNCS, pp. 112–124. Springer, Heidelberg (2007)Google Scholar
  3. 3.
    Michiardi, P., Molva, R.: Core: a collaborative reputation mechanism to enforce node coopeation in mobile ad hoc networks. In: Proceedings of the IFIP TC6/TC11 Sixth Joint Working Conference on Communications and Multimedia Security, pp. 107–121. Kluwer, B. V, Dordrecht (2002)Google Scholar
  4. 4.
    Kamvar, S.D., Schlosser, M.T., Garcia-Molina, H.: The eigentrust algorithm for reputation management in P2P networks. In: WWW 2003: Proceedings of the 12th International Conference on World Wide Web, pp. 640–651. ACM, New York (2003)Google Scholar
  5. 5.
    Srivatsa, M., Xiong, L., Liu, L.: Trustguard: countering vulnerabilities in reputation management for decentralized overlay networks. In: WWW 2005: Proceeding of the 14th international conference on World Wide Web, pp. 422–431. ACM, New York (2005)CrossRefGoogle Scholar
  6. 6.
    Nandi, A., Ngan, T.W., Singh, A., Druschel, P., Wallach, D.S.: Scrivener: Providing incentives in cooperative content distribution systems. In: Middleware, pp. 270–291 (2005)Google Scholar
  7. 7.
    Aringhieri, R., Damiani, E., Vimercati, S.D.C.D., Paraboschi, S., Samarati, P.: Fuzzy techniques for trust and reputation management in anonymous peer-to-peer systems. J. Am. Soc. Inf. Sci. Technol. 57(4), 528–537 (2006)CrossRefGoogle Scholar
  8. 8.
    Walsh, K., Sirer, E.G.: Experience with an object reputation system for peer-to-peer filesharing. In: NSDI 2006: Proceedings of the 3rd conference on 3rd Symposium on Networked Systems Design & Implementation. USENIX Association (2006)Google Scholar
  9. 9.
    Hoffman, K., Zage, D., Nita-Rotaru, C.: A survey of attack and defense techniques for reputation systems. Technical report, Purdue University (2007)Google Scholar
  10. 10.
    Lv, Q., Cao, P., Cohen, E., Li, K., Shenker, S.: Search and replication in unstructured peer-to-peer networks. In: ICS 2002: Proceedings of the 16th international conference on Supercomputing, pp. 84–95. ACM, New York (2002)CrossRefGoogle Scholar
  11. 11.
    Jøsang, A., Gray, E., Kinateder, M.: Simplification and analysis of transitive trust networks. Web Intelligence and Agent Systems 4(2), 139–161 (2006)Google Scholar
  12. 12.
    Mahoney, G., Myrvold, W., Shoja, G.C.: Generic reliability trust model. In: Third Annual Conference on Privacy, Security and Trust (2005)Google Scholar
  13. 13.
    Ball, M.O., Magnanti, T.L., Monma, C.L., Nmehauser, G.L.: Network Models. North Holland, Amsterdam (1995)MATHGoogle Scholar
  14. 14.
    Fishman, G.S.: Monte Carlo: concepts, algorithms, and applications. Springer, Heidelberg (1995)Google Scholar
  15. 15.
    Jesi, G.P.: Peersim: A peer-to-peer simulator (2004), http://peersim.sourceforge.net
  16. 16.
    Albert, R., Barabási, A.: Statistical mechanics of complex networks. Reviews of Modern Physics 74 (2002)Google Scholar
  17. 17.
    Gnutella: The Gnutella Protocol Specification v0.4 (2001)Google Scholar
  18. 18.
    Yang, B., Garcia-Molina, H.: Improving search in peer-to-peer networks. In: ICDCS 2002: Proceedings of the 22nd International Conference on Distributed Computing Systems, pp. 5–14. IEEE Computer Society, Los Alamitos (2002)CrossRefGoogle Scholar
  19. 19.
  20. 20.
    Cochran, W.: Sampling Techniques, 3rd edn. Wiley and Sons, Chichester (1977)MATHGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2008

Authors and Affiliations

  • Huqiu Zhang
    • 1
  • Aad van Moorsel
    • 1
  1. 1.School of Computing ScienceNewcastle UniversityNewcastle upon TyneUK

Personalised recommendations