HadithTrust: Trust Management Approach Inspired by Hadith Science for Peer-to-Peer Platforms

被引:5
|
作者
Alqahtani, Amal [1 ]
Kurdi, Heba [1 ,2 ]
Abdulghani, Majed [3 ]
机构
[1] King Saud Univ, Comp Sci Dept, Riyadh 12371, Saudi Arabia
[2] MIT, Mech Engn Dept, Cambridge, MA 02142 USA
[3] Kingston Univ, Fac Sci Engn & Comp, Comp Sci Dept, Kingston Upon Thames KT1 2EE, Surrey, England
关键词
peer-to-peer; distributed systems; file sharing; reputation; trust; security; Hadith; REPUTATION MANAGEMENT; SYSTEM; ALGORITHM; SERVICE; MODEL;
D O I
10.3390/electronics10121442
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Peer-to-peer (P2P) platforms are gaining increasing popularity due to their scalability, robustness and self-organization. In P2P systems, peers interact directly with each other to share resources or exchange services without a central authority to manage the interaction. However, these features expose P2P platforms to malicious attacks that reduce the level of trust between peers and in extreme situations, may cause the entire system to shut down. Therefore, it is essential to employ a trust management system that establishes trust relationships among peers. Current P2P trust management systems use binary categorization to classify peers as trustworthy or not trustworthy. However, in the real world, trustworthiness is a vague concept; peers have different levels of trustworthiness that affect their overall trust value. Therefore, in this paper, we developed a novel trust management algorithm for P2P platforms based on Hadith science where Hadiths are systematically classified into multiple levels of trustworthiness, based on the quality of narrator and content. To benchmark our proposed system, HadithTrust, we used two state-of-art trust management systems, EigenTrust and InterTrust, with no-trust algorithm as a baseline scenario. Various experimental results demonstrated the superiority of HadithTrust considering eight performance measures.
引用
收藏
页数:22
相关论文
共 50 条
  • [21] Supporting peer-to-peer collaboration through trust
    Griffiths, N
    Sun, SH
    PROCEEDINGS OF THE NINTH INTERNATIONAL CONFERENCE ON COMPUTER SUPPORTED COOPERATIVE WORK IN DESIGN, VOLS 1 AND 2, 2005, : 440 - 445
  • [22] A role-based trust model for peer-to-peer systems
    Zhang, Jie
    Zhao, Zheng
    Wang, Song
    Zhang, Qiang
    Zhao, Zhichao
    NEXT-GENERATION COMMUNICATION AND SENSOR NETWORKS 2006, 2006, 6387
  • [23] Trust and Reputation in the Sharing Economy: Toward a Peer-to-Peer Ethics
    Hongladarom, Soraj
    INTERNATIONAL REVIEW OF INFORMATION ETHICS, 2020, 28
  • [24] Managing data for evaluating trust in unstructured Peer-to-Peer networks
    Li, Zhitang
    Lin, Huaiqing
    Lu, Chuiwei
    Zhang, Yejiang
    ADVANCES IN GRID AND PERVASIVE COMPUTING, PROCEEDINGS, 2008, 5036 : 308 - 318
  • [25] Fuzzy Trust for Peer-to-Peer Based Systems
    Azzedin, Farag
    Ridha, Ahmad
    Rizvi, Ali
    PROCEEDINGS OF WORLD ACADEMY OF SCIENCE, ENGINEERING AND TECHNOLOGY, VOL 21, 2007, 21 : 123 - +
  • [26] An Elliptic Curve-Based Trust Management Protocol in Peer-to-Peer Networks
    Chen, Aiguo
    Luo, Guangchun
    Ren, Jinsheng
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2014, E97D (06): : 1656 - 1660
  • [27] The production of locality on peer-to-peer platforms
    van Nuenen, Tom
    COGENT SOCIAL SCIENCES, 2016, 2
  • [28] Identifying local bias on peer-to-peer rental platforms
    Zhang, Xiaoxia
    Zhang, Xi
    Law, Rob
    Liang, Sai
    INTERNATIONAL JOURNAL OF HOSPITALITY MANAGEMENT, 2021, 99
  • [29] A Trust Energy-efficient QoS Routing Scheme for Mobile Peer-to-Peer Networks
    Qu, Dapeng
    Liang, Dengyu
    Wu, Songlin
    Li, Jie
    Xuan, Weihong
    Wang, Xingwei
    2018 17TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (IEEE TRUSTCOM) / 12TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING (IEEE BIGDATASE), 2018, : 169 - 176
  • [30] A New Reputation Model Based on Trust Cluster in Peer-to-Peer Networks
    Jin, Yu
    Zhao, Hongwu
    ADVANCES IN ELECTRICAL ENGINEERING AND AUTOMATION, 2012, 139 : 287 - 292