An effective calculation of reputation in P2P networks

被引:3
作者
Prasad, R.V.V.S.V. [1 ]
Srinivas, Vegi [2 ]
Kumari, V. Valli [3 ]
Raju, K.V.S.V.N. [3 ]
机构
[1] Department of Computer Science and Engineering, Bhimavaram Institute of Engineering and Technology, Pennada-534243, Bhimavaram
[2] Department of Computer Science and Engineering, Dadi Institute of Engineering and Technology, Anakapalli-531002, Visakhapatnam
[3] Department of Computer Science and Systems Engineering, College of Engineering, Andhra University
关键词
Credibility; Feedback; Peer-to-peer; Recommender systems; Reputation; Similarity; Transaction; Trust;
D O I
10.4304/jnw.4.5.332-342
中图分类号
学科分类号
摘要
With the advent of sophisticated networking technologies and the related applications, more and more computers are getting hooked to the Internet. This is mainly for utilizing several services ranging from information sharing to electronic transactions. P2P networks which allow decentralized systems, have posed problems related to trust when transactions have to be carried out. Current literature proposes several solutions for trust management and reputation computation. The solutions base their assessment of reputations on the number of successful transactions or on the similarity of the feedbacks. There are some concerns in the feedback ratings if we are not considering the issues like number of transactions, frequency of transactions with the same peer and different peers, age of transaction, how frequently a given peer attends a common vendor, and the number of common vendors between the pairs. This paper puts forward a reputation computation system addressing these concerns. It implicitly allows detection of malicious peers. It also incorporates a corrective mechanism, if the feedbacks are from more number of malicious peers. The implementations and the results that support our claims are also presented. © 2009 ACADEMY PUBLISHER.
引用
收藏
页码:332 / 342
页数:10
相关论文
共 18 条
[1]  
Abdul-Rahman A., Hailes S., Using recommendations for managing trust in distributed systems, Proceedings of the IEEE International Conference on Communication, (1997)
[2]  
Wang Y., Vassileva J., Bayesian network trust model in peer-to-peer networks, International Workshop Peers and Peer-to-Peer Computing, (2003)
[3]  
Srivatsa M., Xiong L., Liu L., Trustguard: Countering vulnerabilities in reputation management for decentralized overlay networks, International Conference of World Wide Web, pp. 422-431, (2005)
[4]  
Xiong L., Liu L., Peertrust: Supporting reputation based trust of peer-to-peer electronic communities, IEEE Trans. on Knowledge and Data Engineering, 16, 7, pp. 843-857, (2004)
[5]  
Xiong L., Liu L., Building trust in decentralized peer-to-peer electronic communities, Proceedings of the International Conference on Electronic Commerce Research (ICECR-5), (2004)
[6]  
Zhu B., Jajodia S., Kankanhalli M.S., Building trust in peer-to-peer systems: A review, International Journal on Security and Networks, 1, 1-2, pp. 103-112, (2006)
[7]  
Zou Y., Liang G., Li G., Xie B., Mei H., Rectifying Prejudicial Feedback Ratings in Reputation based trust management, IEEE International Conference on Services Computing, pp. 530-535
[8]  
Josang A., Ismail R., Boyd C., A Survey of Trust and Reputation Systems for Online Service Provision, Decision Support Systems, 43, 2, pp. 618-644, (2007)
[9]  
Sabater J., Sierra C., Review on computational trust and reputation models, Artif. Intell. Rev., 24, 1, pp. 33-60, (2005)
[10]  
Kamvar S.D., Schlosser M.T., Garcia-Molina H., The eigen trust algorithm for reputation management in p2p networks, international conference on World Wide Web, pp. 640-651, (2003)