Heuristic Discovery of Role-Based Trust Chains in Peer-to-Peer Networks

被引:24
作者
Chen, Ke [1 ]
Hwang, Kai [2 ]
Chen, Gang [1 ]
机构
[1] Zhejiang Univ, Sch Comp Sci, Hangzhou 310027, Peoples R China
[2] Univ So Calif, Dept Elect Engn & Comp Sci, Los Angeles, CA 90089 USA
基金
美国国家科学基金会;
关键词
Peer-to-peer networks; trust delegation; role-based credentials; heuristic semantics; Internet applications;
D O I
10.1109/TPDS.2008.60
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Credential chains are needed in trusted peer-to-peer (P2P) applications, where trust delegation must be established between each pair of peers at specific role level. Role-based trust is refined from the coarse-grained trust model used in most P2P reputation systems. This paper offers a novel heuristic-weighting approach to selecting the most likely path to construct a role-based trust chain. We apply history-sensitive heuristics to measure the path complexity and to assess the chaining efficiency. Our method discovers successive edges of a trust chain, adaptively, to match with the demands in any given P2P application. New heuristic chaining algorithms are developed for backward, forward, and bidirectional discovery of trust chains. Our heuristic chain discovery scheme shortens the search time, reduces the memory requirement, and enhances the chaining accuracy in scalable P2P networks. Consider a trust graph over N credentials and M distinct role nodes. Our heuristic trust-chain discovery algorithms require O(N(2)logN) search time and O(M) memory space, if the secondary heuristics are generated offline in advance. These are improved from O(N-3) search time and O(NM) space required in nonheuristic discovery algorithms developed by Li et al. [12]. Our analytical results are verified by extensive simulation experiments over typical classes of role- based trust graphs.
引用
收藏
页码:83 / 96
页数:14
相关论文
共 28 条
  • [1] Aberer Karl, 2001, P 10 INT C INF KNOWL
  • [2] Agrawal R., 1993, SIGMOD Record, V22, P207, DOI 10.1145/170036.170072
  • [3] [Anonymous], P 4 INT WORKSH PEER
  • [4] AURA T, 1998, P 3 AUSTR C INF SEC, P284
  • [5] Trust-X:: A peer-to-peer framework for trust establishment
    Bertino, E
    Ferrari, E
    Squicciarini, AC
    [J]. IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2004, 16 (07) : 827 - 842
  • [6] Decentralized trust management
    Blaze, M
    Feigenbaum, J
    Lacy, J
    [J]. 1996 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 1996, : 164 - 173
  • [7] Blaze M., 1998, P FINANCIAL CRYPTOGR, P254
  • [8] Clarke D., 2001, Journal of Computer Security, V9, P285
  • [9] A FORMAL BASIS FOR HEURISTIC DETERMINATION OF MINIMUM COST PATHS
    HART, PE
    NILSSON, NJ
    RAPHAEL, B
    [J]. IEEE TRANSACTIONS ON SYSTEMS SCIENCE AND CYBERNETICS, 1968, SSC4 (02): : 100 - +
  • [10] KULBAK Y, 2005, TR200503 HEBR U