A Novel Feedback Based Fast Adaptive Trust Model for P2P Networks

被引:0
作者
Das, Anupam [1 ]
Islam, M. Mahfuzul [1 ]
机构
[1] Bangladesh Univ Engn & Technol, Dept Comp Sci & Engn, Dhaka, Bangladesh
来源
IEEE LOCAL COMPUTER NETWORK CONFERENCE | 2010年
关键词
Peer-to-Peer(P2P); trust; reputation; trust model; malicious peer;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Peer-to-peer (P2P) networks have shown great potentials in providing a wide range of services starting from simple file sharing to distributed computing. However, P2P systems present ominous threats due to its anonymous and dynamic nature. One feasible way to minimize the threats is to evaluate the trust and reputation of the interacting peers. Trust models have often been deployed in determining the trust of peers in the network with the view to avoiding the malicious ones. Most of the existing trust models can successfully isolate malicious peers when the peers behave in a predictable way while others even fail to do so. On the other hand, these models suffer greatly when peers start to behave in a unpredictable way. Moreover, these models are ineffective in providing quick response to a peer's dynamic personality. To cope with such strategically altering behavior we present in this paper, a feedback based fast adaptive trust model which takes into account various factors in computing the trust of peers including recent trend, historical trend, sudden deviation of trust and so on. Simulations show that our model compared to other existing models can effectively identify and isolate the dynamic behavioral change of malicious peers.
引用
收藏
页码:552 / 559
页数:8
相关论文
共 15 条
[1]  
Adar E., 2000, First Monday, V5, DOI 10.5210/fm.v5i10.792
[2]  
Cornelli F., 2002, P 11 INT WORLD WIDE, P376, DOI DOI 10.1145/511446.511496
[3]  
Dou Wen, 2004, Journal of Software, V15, P571
[4]  
Hu JL, 2008, PROCEEDINGS OF THE 9TH INTERNATIONAL CONFERENCE FOR YOUNG COMPUTER SCIENTISTS, VOLS 1-5, P1963, DOI 10.1109/ICYCS.2008.444
[5]  
Kamvar S. D., 2003, P 12 INT C WORLD WID, P640
[6]   Trust Model of Users' behavior in Trustworthy Internet [J].
Li Wen ;
Ping Lingdi ;
Lu Kuijun ;
Chen Xiaoping .
2009 WASE INTERNATIONAL CONFERENCE ON INFORMATION ENGINEERING, ICIE 2009, VOL I, 2009, :403-406
[7]   Reputation systems [J].
Resnick, P ;
Zeckhauser, R ;
Friedman, E ;
Kuwabara, K .
COMMUNICATIONS OF THE ACM, 2000, 43 (12) :45-48
[8]  
Srivatsa Mudhakar., 2005, WWW 05, P422
[9]   P2P Recommendation Trust Model [J].
Wang, Xuan ;
Wang, Lei .
ISDA 2008: EIGHTH INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS DESIGN AND APPLICATIONS, VOL 2, PROCEEDINGS, 2008, :591-595
[10]  
Wang Y, 2003, IEEE/WIC INTERNATIONAL CONFERENCE ON WEB INTELLIGENCE, PROCEEDINGS, P372