Outlier detection in reputation management system for P2P networks using rough set theory

被引:1
|
作者
Selvaraj, Chithra [1 ]
Anand, Sheila [2 ]
机构
[1] SSN Coll Engn, Madras, Tamil Nadu, India
[2] Rajalakshmi Engn Coll, Madras, Tamil Nadu, India
关键词
peer-to-peer computing; rough set theory; reputation; indiscernibility decision matrix; logical rules;
D O I
10.1002/sec.685
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Peer-to-peer (P2P) networks are distributed, decentralized, dynamic networks that are self-organized and self-managed. P2P networks have emerged over the past several years as an effective and scalable medium for sharing distributed resources. However, determining the reliability and trustworthiness of the participating peers still remains a major security challenge. Reputation-based trust management calculates peer trust as a measure of recommendations received from other peers. Malicious peers may give wrong reputation scores and also collude with other peers to make themselves or others appear trustworthy. In this paper, we propose the use of outlier detection technique to detect false testimony as outliers. We have applied rough set theory, an efficient and intelligent mathematical tool, to detect the outliers in the trust scores. We present the detailed methodology for implementing rough set theory for P2P network and detecting outlier scores in reputation metrics given by other peers and compared the model with the mechanism to detect outliers with the Eigen Trust model and eBay system. Trust computation without the outlier scores would be more accurate and enable proper verification and evaluation of peer trustworthiness. Copyright (c) 2013 John Wiley & Sons, Ltd.
引用
收藏
页码:1153 / 1160
页数:8
相关论文
共 50 条
  • [1] An independent reputation system for P2P networks
    Tayabovorn, Chaiyasit
    Maneewongvatana, Songrit
    ICEIS 2007: PROCEEDINGS OF THE NINTH INTERNATIONAL CONFERENCE ON ENTERPRISE INFORMATION SYSTEMS: SOFTWARE AGENTS AND INTERNET COMPUTING, 2007, : 249 - 252
  • [2] An Algorithm for Outlier Detection Using Rough Set Theory
    Lou, Mingzhu
    2015 INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND ENGINEERING APPLICATIONS (CSEA 2015), 2015, : 99 - 103
  • [3] Propagation Model of Reputation in P2P Networks
    Sun, Hua
    Li, Li
    Yang, Wenzhong
    Qian, Yurong
    COMMUNICATIONS AND INFORMATION PROCESSING, PT 1, 2012, 288 : 368 - +
  • [4] A fuzzy reputation management system with punishment mechanism for P2P network
    Hu Z.
    Lin H.
    Zhou Y.
    Journal of Networks, 2011, 6 (02) : 190 - 197
  • [5] Research and Design on P2P based Reliable Reputation Management System
    Liu, Shouqiang
    Qi, Deyu
    Baogang Chen
    2008 ISECS INTERNATIONAL COLLOQUIUM ON COMPUTING, COMMUNICATION, CONTROL, AND MANAGEMENT, VOL 3, PROCEEDINGS, 2008, : 390 - +
  • [6] P2P reputation management: Probabilistic estimation vs. social networks
    Despotovic, Z
    Aberer, K
    COMPUTER NETWORKS, 2006, 50 (04) : 485 - 500
  • [7] Verifiable Storage Structure for Reputation in P2P Networks
    Sun, Hua
    Yu, Jiong
    Liao, Bin
    Yang, Xing-yao
    INFORMATION-AN INTERNATIONAL INTERDISCIPLINARY JOURNAL, 2012, 15 (11B): : 4953 - 4958
  • [8] Credibility Based Reputation Calculation in P2P Networks
    Prasad, R. V. V. S. V.
    Srinivas, Vegi
    Kumari, V. Valli
    Raju, K. V. S. V. N.
    DISTRIBUTED COMPUTING AND INTERNET TECHNOLOGY, PROCEEDINGS, 2008, 5375 : 188 - +
  • [9] Trust management without reputation in P2P games
    Wierzbicki, Adam
    SECRYPT 2006: Proceedings of the International Conference on Security and Cryptography, 2006, : 126 - 134
  • [10] Behavior-based reputation management in P2P file-sharing networks
    Fan, Xinxin
    Li, Mingchu
    Ma, Jianhua
    Ren, Yizhi
    Zhao, Hui
    Su, Zhiyuan
    JOURNAL OF COMPUTER AND SYSTEM SCIENCES, 2012, 78 (06) : 1737 - 1750