Skip to main content
Log in

Multifactor hierarchical fuzzy trust evaluation on peer-to-peer networks

  • Published:
Peer-to-Peer Networking and Applications Aims and scope Submit manuscript

Abstract

Decentralized Peer-to-Peer (P2P) networks offer not only opportunities but also threats. Due to the autonomy, self-interest and heterogeneousness of peers, the interaction outcomes are uncertain. One way to minimize the threats in such an open environment is exploiting the reputation method to evaluate the trustworthiness and predict the future behaviors of peers. While most of the existing reputation-based trust models focus on preventing network from the malicious peers, peers’ capabilities to fulfill the tasks are mostly ignored. In this paper, we present a novel trust model MHFTrust which quantifies and compares the trustworthiness of peers based on hierarchical fuzzy system. Six capability factors are identified to describe the peers’ trust on the capability, and one security factor, named “Malicious behavior” is used to evaluate the peers’ trust on security. Our trust model consisted of local-trust computation based on fuzzy techniques and global reputation aggregation, which integrates feedback from other peers to produce a global reputation for each peer. Credibility and weight of feedback are introduced to facilitate the computation of global reputation. It is shown in simulation that our trust model greatly improves the efficiency of P2P system, while the number of inauthentic files on the network is significantly decreased.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15

Similar content being viewed by others

References

  1. Milojicic DS, Kalogeraki V, Lukose R, Nagaraja K, Pruyne J, Richard B, Rollins S, Xu ZC (2002) Peer-to-Peer Computing. HP Laboratories Palo Alto HPL-2002-57

  2. Altman JE (2003) PKI Security for JXTA overlay networks. Sun Microsystem Palo Alto TR-I2-03-06

  3. Khambatti M, Dasgupta P, Ryu KD (2004) A role-based trust model for peer-to-peer communities and dynamic coalitions. In: Proceedings of the Second IEEE International Information Assurance Workshop, Charlotte, North Carolina, pp 141–154

  4. Li NH, Mitchell JC, Winsborough WH (2002) Design of a role-based trust management framework. In: Proceedings of the 2002 IEEE Symposium on Security and Privacy, Berkeley, California, USA, pp 114–130

  5. Winsborough WH, Seamons KE, Jones VE (2000) Automated trust negotiation. In: Proceedings of DARPA Information Survivability Conference and Exposition, Hilton Head, South Carolina, pp 88–102

  6. Resnick P, Zeckhauser R (2002) Trust among strangers in internet transactions: empirical analysis of ebay’s reputation system. Adv Appl Microecon 11:127–157

    Article  Google Scholar 

  7. Kamvar SD, Schlosser MT, Hector Garcia-Molina (2003) EigenRep: reputation management in P2P networks. In: Proceedings of the 12th international conference on World Wide Web, vol. 1, pp 123~134

  8. Dou W, Wang HM, Yan JIA, Peng ZOU (2004) A recommendation-based peer-to-peer trust model. Journal of Software 15(4):571–583

    MathSciNet  MATH  Google Scholar 

  9. Xiong L, Liu L (2004) PeerTrust: supporting reputation-based trust for peer-to-peer electronic communities. IEEE Trans Knowl Data Eng 16(7):843–857

    Article  Google Scholar 

  10. Wang Y, Vassileva J (2003) Bayesian network-based trust model. In: Proceedings of IEEE/WIC International Conference on Web Intelligence, Halifax, Canada, pp 372–378

  11. Wang Y, Vassileva J (2003) Trust and reputation model in peer-to-peer networks. In: Proceedings of the Third IEEE International Conference on Peer-to-Peer Computing, Linköping, Sweden, pp 150–158

  12. Song WH, Phoha VV (2004) Neural network-based reputation model in a distributed system. In: proceedings of IEEE 2004 CEC, Beijing, China, pp 321–324

  13. Hou MS, Lu XL, Zhou X, Zhan C (2005) A trust model of p2p system based on confirmation theory. Operat Syst Rev 39(1):56–62

    Article  Google Scholar 

  14. Chen H, Yu S, Shang J etc (2009) Comparison with several fuzzy trust methods for P2P-based system. In: proceedings of the 2009 International Conference on Information Technology and Computer Science, Washington, DC, USA, pp 188–191

  15. Zhang S, Lu D, Yang Y (2004) A fuzzy set based trust and reputation model in P2P networks. Lect Notes Comput Sci 3177:211–217

    Article  Google Scholar 

  16. Xi J, Nie P, Lu J (2008) A P2P trust model based on dynamic fuzzy theory. In: proceedings of 2008 International Symposiums on Information Processing, Moscow, Russia, pp187–191

  17. Aringhieri R, Damiani E, Vimercati SDCD, Paraboschi S, Samarati P (2006) Fuzzy techniques for trust and reputation management in anonymous peer-to-peer systems: special topic section on soft approaches to information retrieval and information access on the web. J Am Soc Inf Sci Technol 57(4):528–537

    Article  Google Scholar 

  18. Bedi P, Kaur H (2006) Trust based personalized recommender system. INFOCOM J Comput Sci 5(1):19–26

    Google Scholar 

  19. Griffiths N, Chao KM, Younas M (2006) Fuzzy trust for peer-to-peer systems. In: Proceedings of the 26th IEEE International Conference Workshops on Distributed Computing Systems, Lisbon, Portugal, pp 73

  20. Song SS, Hwang K, Kwok YK (2005) Trusted grid computing with security binding and trust integration. J Grid Comput 3(1):53–73

    Article  Google Scholar 

  21. Song SS, Hwang K, Zhou RF, Kwok YK (2005) Trusted P2P transactions with fuzzy reputation aggregation. IEEE Internet Comput 9(6):24–34

    Article  Google Scholar 

  22. Aberer K, Despotovic Z (2001) Managing trust in a Peer-2-Peer information system. In: Proceedings of the 10th International Conference on Information and Knowledge Management, Atlanta, Georgia, USA, pp 310–317

  23. Zadeh LA (1965) Fuzzy sets. Inf Control 8:338–353

    Article  MathSciNet  MATH  Google Scholar 

  24. Raju GVS, Zhou J, Kisner RA (1991) Hierarchical fuzzy control. Int J Control 54(5):1201–1216

    Article  MathSciNet  MATH  Google Scholar 

  25. Wang LX (1999) Analysis and design of hierarchical fuzzy systems. IEEE Trans Fuzzy Syst 7(5):617–624

    Article  Google Scholar 

  26. Lazzerini B, Marcelloni F (2006) A hierarchical fuzzy clustering-based system to create user profiles. Soft Comput 11(2):157–168

    Article  Google Scholar 

  27. Mohammadian M (2005) Innovative design of adaptive hierarchical fuzzy logic systems. In: Proceedings of the 2005 International Conference on Computational Intelligence for Modelling, Control and Automation, and International Conference on Intelligent Agents, Web Technologies and Internet Commerce, Xian, China, pp 1072–1079

  28. Rattasiri W, Halgamuge SK (2003) Computationally advantageous and stable hierarchical fuzzy systems for active suspension. IEEE Trans Ind Electron 50(1):48–61

    Article  Google Scholar 

  29. Singh A, Liu L (2003) TrustMe: Anonymous management of trust relationships in decentralized p2p systems. In: Proceedings of IEEE International Conference on P2P Computing, Linköping, Sweden, pp 142–149

Download references

Acknowledgements

This work was supported by the National Natural Science Foundation of China (No. 60573120). Mr. Ho Simon Wang at Academic Writing Center, and Dr. Yong-cai Tao at College of Computer Science, HUST, have provided tutorial assistance to improve the manuscript of the paper.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Huaiqing Lin.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Lin, H., Li, Z. & Huang, Q. Multifactor hierarchical fuzzy trust evaluation on peer-to-peer networks. Peer-to-Peer Netw. Appl. 4, 376–390 (2011). https://doi.org/10.1007/s12083-010-0096-9

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12083-010-0096-9

Keywords

Navigation