GroupTrust: Dependable Trust Management

被引:34
作者
Fan, Xinxin [1 ,2 ]
Liu, Ling [2 ]
Li, Mingchu [1 ]
Su, Zhiyuan [3 ]
机构
[1] Dalian Univ Technol, Sch Software Technol, Dalian 116620, Peoples R China
[2] Georgia Inst Technol, Coll Comp, Atlanta, GA 30332 USA
[3] State Key Lab High End Server & Storage Technol, Jinan 250510, Peoples R China
基金
美国国家科学基金会;
关键词
Trust propagation; trust and reputation management; decentralized computing network; open systems;
D O I
10.1109/TPDS.2016.2611660
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
As advanced computing and communication technologies penetrate every aspect of our life, we have witnessed the persistent growth of open systems where entities interact with one another without prior knowledge or experiences. Trust becomes an important metric in such open systems. This paper presents a dependable trust management scheme-GroupTrust, and a working systemto support GroupTrust. It makes three original contributions. First, we identify a set of vulnerabilities that are common in existing reputation based trust models. We show that reputation trust built solely on direct experiences or by combining direct experiences with uniform trust propagation can be vulnerable. Second, we develop GroupTrust, a dependable trust management scheme to provide reliable trust management in the presence of dishonest ratings, malicious camouflage, and malicious collusive behaviors. The GroupTrust scheme is novel in two aspects: (i) we develop a pairwise similarity based feedback credibility to enhance the resilience of trust computation in the presence of dishonest ratings; (ii) we propose to propagate trust based on a Susceptible-Infected-Recovered ( SIR) model, which defines trust propagation threshold to control how trust should be propagated. Finally, we evaluate the effectiveness of GroupTrust against four threat models using both simulated and real world datasets. Our experimental results show that feedback credibility based local trust computation can effectively constrain strategically malicious participants from taking advantages of their dishonest ratings. SIR-based trust propagation control enables safe trust propagation and blocks irrational trust propagation. We show that GroupTrust scheme significantly outperforms other trust models in terms of both performance and attack resilience in the presence of dishonest feedbacks, sparse feedbacks, and strategically malicious participants against four representative threat models.
引用
收藏
页码:1076 / 1090
页数:15
相关论文
共 21 条
[1]   SORT: A Self-ORganizing Trust Model for Peer-to-Peer Systems [J].
Can, Ahmet Burak ;
Bhargava, Bharat .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2013, 10 (01) :14-27
[2]   Epidemic thresholds in real networks [J].
Chakrabarti, Deepayan ;
Wang, Yang ;
Wang, Chenxi ;
Leskovec, Jurij ;
Faloutsos, Christos .
ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, 2008, 10 (04)
[3]   Towards the evolution of social structure [J].
Edmonds, Bruce ;
Norling, Emma ;
Hales, David .
COMPUTATIONAL AND MATHEMATICAL ORGANIZATION THEORY, 2009, 15 (02) :78-94
[4]   Computer science - Weaving a Web of trust [J].
Golbeck, Jennifer .
SCIENCE, 2008, 321 (5896) :1640-1641
[5]   Discrete-time Markov chain approach to contact-based disease spreading in complex networks [J].
Gomez, S. ;
Arenas, A. ;
Borge-Holthoefer, J. ;
Meloni, S. ;
Moreno, Y. .
EPL, 2010, 89 (03)
[6]   Nonperturbative heterogeneous mean-field approach to epidemic spreading in complex networks [J].
Gomez, Sergio ;
Gomez-Gardenes, Jesus ;
Moreno, Yamir ;
Arenas, Alex .
PHYSICAL REVIEW E, 2011, 84 (03)
[7]   A survey of trust and reputation systems for online service provision [J].
Josang, Audun ;
Ismail, Roslan ;
Boyd, Colin .
DECISION SUPPORT SYSTEMS, 2007, 43 (02) :618-644
[8]  
Josang Audun, 2002, Proceedings of the 15th Bled Electronic Commerce Conference, V41, P324
[9]  
Kamvar S. D., 2003, WWW 03, P640, DOI [10.1145/775152.775242, DOI 10.1145/775152.775242]
[10]   The many proofs and applications of Perron's theorem [J].
MacCluer, CR .
SIAM REVIEW, 2000, 42 (03) :487-498