Consistency-based trust management in P2P networks

Consistency-based trust management in P2P networks

Detecting malicious peers is a challenging task in peer-to-peer networks due to their decentralized structureand lack of central authority. Trust models can help identify malicious peers by maintaining information about peerrelations and interactions. Keeping information about trust relations helps to reduce risks when providing or usingservices. This paper introduces two consistency concepts in trust management. Feedback consistency is used to evaluatehow consistent feedback is with respect to past feedbacks. On the other side, peer consistency measures consistencyof a peer’s past feedbacks. These metrics help to reduce malicious interactions and increase successful downloads.Furthermore, the model offers better service quality for good peers by using consistency metrics. A file-sharing applicationis implemented on a simulation environment. The proposed model can effectively reduce the malicious download rate,even in 50% malicious environments, and increases successful download rates.

___

  • [1] Montresor A, Jelasity M. PeerSim: A scalable P2P simulator. In: IEEE International Conference on Peer-to-Peer Computing; 9–11 September 2009; Seattle, WA, USA. New York, NY, USA: IEEE. pp. 99-100.
  • [2] Aberer K, Despotovic Z. Managing Trust in a Peer-2-Peer Information System. In: Proceedings of the Tenth International Conference on Information and Knowledge Management (CIKM), 5–10 October 2001; Atlanta, GA, USA. New York, NY, USA: ACM. pp. 310-317.
  • [3] Kamva SD, Schlosse MT, Molina H. G. The Eigentrust Algorithm for Reputation Management in P2P Networks. In: 12th World Wide Web Conference; 20–24 May 2003; Budapest, Hungary. New York, NY, USA: ACM. pp. 640-651.
  • [4] Li X, Liu L. Peertrust: Supporting reputation-based trust for peer-to-peer electronic communities. IEEE T Knowl Data En 2004; 16: 843-857.
  • [5] Guo L, Yang S, Wang J, Zhou J. Trust model based on similarity measure of vectors in P2P networks. In: International Conference on Grid and Cooperative Computing; 30 November–3 December 2005; Beijing, China. Berlin, Germany: Springer. pp. 836-847.
  • [6] Liu YM, Yang SM, Guo LT. A distributed trust-based reputation model in P2P System. In: Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing; 30 July–1 August 2007; Qingdao, China. Basel, Switzerland: Springer International. pp. 294-299.
  • [7] Hu J, Wu Q, Zhou B. FCTrust: a robust and efficient feedback credibility-based distributed P2P trust model. In: IEEE Young Computer Scientists; 18–21 November 2008; Hunan, China. New York, NY, USA: IEEE. pp. 1963-1968.
  • [8] Can AB, Bhargava B. Sort: A self-organizing trust model for peer-to-peer systems. IEEE T Depend Secure 2013; 10: 14-27.
  • [9] Cornelli F, Damiani E, di Vimercati SDC, Paraboschi S, Samarati P. Choosing Reputable Servents in a P2P Network. In: 11th World Wide Web Conf. (WWW); 7–11 May 2002; Honolulu, HI, USA. New York, NY, USA: ACM. pp. 376-386.
  • [10] Selcuk AA, Uzun E, Pari MR. A reputation-based trust management system for P2P networks. In: IEEE Cluster Computing and the Grid; 19–22 April 2004; Chicago, IL, USA. New York, NY, USA: IEEE. pp. 251-258.
  • [11] Su Z, Liu L, Li M, Fan X, Zhou Y. ServiceTrust: trust management in service provision networks. In: 2013 IEEE International Conference on Services Computing; 28 June–3 July 2013; Santa Clara, CA, USA. New York, NY, USA: IEEE. pp. 272-279.
  • [12] Su Z, Liu L, Li M, Fan X, Zhou Y. Reliable and resilient trust management in distributed service provision networks. ACM Trans Web 2015; 9: 1-37.
  • [13] Song S, Hwang K, Zhou R, Kwok YK. Trusted P2P transactions with fuzzy reputation aggregation. IEEE Internet Comput 2005; 9: 24-34.
  • [14] Tian C, Yang B. A DS evidence theory based fuzzy trust model in file-sharing P2P networks. Peer Peer Netw Appl 2014; 7: 332-345.
  • [15] Saeed J, Shojafar M, Shariatmadari S, Ahrabi SS. FR trust: a fuzzy reputation–based model for trust management in semantic P2P grids. Int J Grid Util Comp 2014; 6: 57-66.
  • [16] Guo L, Luo Y, Zhou Z, Ji M. A recommendation trust method based on fuzzy clustering in P2P networks. Journal of Software 2013; 8: 357-360.
  • [17] Tahta UE, Sen S, Can AB. GenTrust: A genetic trust management model for peer-to-peer systems. Appl Soft Comput 2015; 34: 693-704.
  • [18] Liu X, Tiredan G, Datta A. A generic trust framework for large-scale open systems using machine learning. Comput Intell 2014; 30: 700-721.
  • [19] Das A, Islam MM. SecuredTrust: A dynamic trust computation model for secured communication in multiagent systems. IEEE T Depend Secure; 2012; 9: 261-274.
  • [20] Xei Z, Geng Y, Bi J. STTM: Similarity transitivity chain based trust model in P2P environment. In: 2010 IEEE International Conference on Communications; 23–27 May 2010; Cape Town, South Africa. New York, NY: IEEE. pp. 1-5.
  • [21] Wang G, Musau F, Guo S, Abdullahi MB. Neighbor similarity trust against Sybil attack in P2P E-commerce. IEEE T Parall Distr 2015; 26: 824-833.
  • [22] Zhou R, Hwang K, Cai M. GossipTrust for fast reputation aggregation in peer-to-peer networks. IEEE T Knowl Data En 2008; 20: 1282-1295.
  • [23] Wen T, Zhong C. Research of subjective trust management model based on the fuzzy set theory. Journal of Software 2003; 8: 1401-1408.
Turkish Journal of Electrical Engineering and Computer Sciences-Cover
  • ISSN: 1300-0632
  • Yayın Aralığı: Yılda 6 Sayı
  • Yayıncı: TÜBİTAK
Sayıdaki Diğer Makaleler

Brain–computer interface: controlling a robotic arm using facial expressions

Humaira NISAR, Hong-Way KHOW, Kim-Ho YEAP

Design and comparison of embedded air coils for small satellites

Khalil ULLAH, Anwar ALI, Zeeshan MUKHTAR, Leonardo REYNERI

Data clustering using eDE, an enhanced differential evolution algorithm with fuzzy c-means technique

Meera RAMADAS, Ajith ABRAHAM

Volumetric 3D reconstruction of real objects using voxel mapping approach in a multiple-camera environment

Kulbir SINGH, Tushar JADHAV, Aditya ABHYANKAR

Prediction of the mass unbalance of a variable speed induction motor by stator current multiple approaches

Abdelkarim BOURAS, Slimane BOURAS, Samir KERFALI

Simplification of harmonics filter for a matrix converter-based drive

Gytis PETRAUSKAS, Gytis SVINKUNAS, Rasa JURASKIENE

Electronically tunable grounded/floating inductance simulators using Z-copy CFCCC

Raj SENANI, Alok Kumar SINGH, Pragati KUMAR

Electrostatic discharge currents and their derivatives’ approximation by piecewise power-exponential functions

Sergei SILVESTROV, Vesna JAVOR, Karl LUNDENGARD, Milica RANCIC

Transient- and probabilistic neural network-based fault classification in EHV three-terminal lines

Ravi Kumar Varma BHUPATIRAJU, Venkata Sesha Samba Siva Sarma DHANIKONDA, Venkata Ramana Rao PULIPAKA

MutatedSocioAgentSim (MSAS): semisupervised modelling of multiagent simulation to predict and detect the mutation in a camouflaged social network

Karthika SUBBARAJ, Bose SUNDAN