Advertisement

An Improved Global Trust Value Computing Method in P2P System

  • Fajiang Yu
  • Huanguo Zhang
  • Fei Yan
  • Song Gao
Part of the Lecture Notes in Computer Science book series (LNCS, volume 4158)

Abstract

Building a trust and reputation mechanism in P2P system is very important. This paper gives an improved global trust value computing method of choosing trusted source peers in P2P system. First, we give a basic description of our trust mechanism; then we bring out the global trust value computing method; third, we define trust computing operator; fourth, we introduce other related trust mechanisms; and finally we do some simulations to compare the performance of our method with other trust mechanism.

Keywords

Trust Management Reputation System Threat Model Trust Mechanism Direct Trust 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Patel, J., Luke Teacy, W.T., Jennings, N.R., Luck, M.: A Probabilistic Trust Model for Handling Inaccurate Reputation Sources. In: Herrmann, P., Issarny, V., Shiu, S.C.K. (eds.) iTrust 2005. LNCS, vol. 3477, pp. 193–209. Springer, Heidelberg (2005)CrossRefGoogle Scholar
  2. 2.
    Jøsang, A., Ismail, R.: The beta reputation system. In: The Proceedings of the 15th Bled Conference on Electronic Commerce, Bled, Slovenia (2002)Google Scholar
  3. 3.
    Jøsang, A.: An Algebra for Assessing Trust in Certification Chains. In: The proceedings of NDSS 1999, Network and Distributed System Security Symposium. Internet Society, San Diego (1999)Google Scholar
  4. 4.
    Jingmei, Z., Jingxiang, Z.: Researches on Trust Models of P2P Network Security. Computer Application Research 3, 76–77 (2003)Google Scholar
  5. 5.
    Junmao, Z., Shoubao, Y., Jianping, F., Mingyu, C.: A Grid&P2P Trust Model Based on Recommendation Evidence Reasoning. Computer Research and Development 42(5), 797–803 (2005)CrossRefGoogle Scholar
  6. 6.
    Huaijiang, S.: A Trust Acquisition Method for Trust Management in Open Multi-agent System. Computer Engineering and Application 29, 135–138 (2004)Google Scholar
  7. 7.
    Wen, T., Zhong, C.: Research of Subjective Trust Management Model Based on the Fuzzy Set Theory. Journal of Software 14(8), 1401–1408 (2003)MATHGoogle Scholar
  8. 8.
    Kamvar, S.D., Garcia-Molina, H.: The EigenTrust Algorithm for Reputation Management in P2P Networks. In: The Proceedings of the Twelfth International World Wide Web Conference (2003)Google Scholar
  9. 9.
    Richardson, M., Agrawal, R., Domingos, P.: Trust management for the semantic web. In: Fensel, D., Sycara, K.P., Mylopoulos, J. (eds.) ISWC 2003. LNCS, vol. 2870, pp. 351–368. Springer, Heidelberg (2003)CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2006

Authors and Affiliations

  • Fajiang Yu
    • 1
  • Huanguo Zhang
    • 1
  • Fei Yan
    • 1
  • Song Gao
    • 1
  1. 1.School of ComputerWuhan UniversityWuhan, HubeiChina

Personalised recommendations