skip to main content
article

A trust model of p2p system based on confirmation theory

Published: 01 January 2005 Publication History

Abstract

The feature of the peer-to-peer system such as user anonymity, open nature makes that some peers are not responsible for their distributing inauthentic information. An effective solution is that set up the trust model in the p2p system. This paper presents a novel global trust model based on confirmation theory. The reputation of peers is calculated by C-F model according the bartering history, and then the peer decides to download the sharing file from which the peer has good reputation. Analyses and simulations show that this trust model can discard the malicious peer from p2p system effectively and improve the rate of successful barter greatly.

References

[1]
Aberer K, Despotovic Z. Managing trust in a peer-2-peer information system, in Ninth International Conference on Information and Knowledge Management, Nov. 2001, 310--317.]]
[2]
Damiani E, De Capitani di Vimercati, Paraboschi S, et al. A reputation-based approach for choosing reliable resources in peer-to-peer networks, in 9th ACM Conference on Computer and Communications Security, Nov. 2002.]]
[3]
Clip2 Company, Gnutella. http://www.clip2.com/gnutella.html]]
[4]
F. Cornelli, E. Damiani, S. D. C. di Vimercati, et al. Choosing Reputable Servents in a P2P Network. In Proc. of the Eleventh Int'l WWW Conference, Honolulu, HI, 2002.]]
[5]
Lee S, Sherwood R, and Bhattacharjee B, Cooperative peer groups in NICE, in IEEE Infocom, Apr. 2003, p1272--1282.]]
[6]
Kamvar S D, Schlosser M, and Garcia-Molina H, Eigenrep: Reputation management in p2p networks, In: Lawrence S, ed. Proc. of the 12th Int'l World Wide Web Conf. Budapest: ACM press, 123--134.]]
[7]
Wen Dou. The Research on Trust-aware P2P Topologies and Constructing Technologies. Ph.D Thesis, National University of Defense Technology, 2003.10]]
[8]
K.Aberer, P-Grid: A Self-Organizing Access Structure for P2P Information Systems, Sixth International Conference on Cooperative Information Systems (CoopIS 2001), Trento, Italy, LNCS 2172, Springer-Veralg, 2001, p179--194.]]
[9]
Wanshen Wang. Artificial Intelligence Principle and Application. Beijing. Publishing House of Electronic Industry. 2000.]]
[10]
Gnutella: To the Bandwidth Barrier and Beyond. http://lambda.cs.yale.edu/cs425/doc/gnutella.html .2001.]]
[11]
Saroiu S, Gummadi P K, and Gribble S D, A measurement study of peer-to-peer file sharing systems. In SPIE Conference on Multimedia Computing and networking, Jan. 2002, p156--170.]]
[12]
Marsh S. Formalising Trust as a Computational Concept Ph.D Thesis, University of Stirling, 1994.]]
[13]
Abdul-Rahman A, Hailes S. Supporting Trust in Virtual Communities. In Proceedings of the 33rd Hawaii International Conference on System Sciences, 2000, p 132--140]]
[14]
Bin Yu, Munindar P. Singh: A Social Mechanism of Reputation Management in Electronic Communities Proc. of the 4th International Workshop on Cooperative Information Agents, Matthias Klusch, Larry Kerschberg (Eds.), Lecture Notes in Computer Science, Vol. 1860, Springer, 2000. 154--165]]
[15]
L. Xiong and L. Liu, Building trust in decentralized peer-to-peer communities, in International Conference on Electronic Commerce Research (ICECR-5), Oct. 2002.]]
[16]
Minaxi Gupta, Paul Judge, Mostafa Ammar, A reputation system for peer-to-peer Networks NOSSDAV'03, 2003, p. 144--152.]]

Cited By

View all
  • (2021)Trust estimation in peer-to-peer network using BLUEPeer-to-Peer Networking and Applications10.1007/s12083-020-01049-314:2(888-897)Online publication date: 11-Jan-2021
  • (2014)Taxonomy of reputation assessment in peer-to-peer systems and analysis of their data retrievalThe Knowledge Engineering Review10.1017/S026988891400017429:04(463-483)Online publication date: 3-Oct-2014
  • (2013)Research of Trust Model Based on Peer-to-Peer Network SecurityProceedings of the 2013 International Conference on Information Technology and Applications10.1109/ITA.2013.35(126-129)Online publication date: 16-Nov-2013
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM SIGOPS Operating Systems Review
ACM SIGOPS Operating Systems Review  Volume 39, Issue 1
January 2005
93 pages
ISSN:0163-5980
DOI:10.1145/1044552
Issue’s Table of Contents

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 01 January 2005
Published in SIGOPS Volume 39, Issue 1

Check for updates

Author Tags

  1. confirmation theory
  2. peer-to-peer network
  3. referral
  4. reputation

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)8
  • Downloads (Last 6 weeks)0
Reflects downloads up to 03 Mar 2025

Other Metrics

Citations

Cited By

View all
  • (2021)Trust estimation in peer-to-peer network using BLUEPeer-to-Peer Networking and Applications10.1007/s12083-020-01049-314:2(888-897)Online publication date: 11-Jan-2021
  • (2014)Taxonomy of reputation assessment in peer-to-peer systems and analysis of their data retrievalThe Knowledge Engineering Review10.1017/S026988891400017429:04(463-483)Online publication date: 3-Oct-2014
  • (2013)Research of Trust Model Based on Peer-to-Peer Network SecurityProceedings of the 2013 International Conference on Information Technology and Applications10.1109/ITA.2013.35(126-129)Online publication date: 16-Nov-2013
  • (2011)A Secure Protocol for Sharing Trust Data in Hybrid P2P NetworkJournal of Networks10.4304/jnw.6.4.607-6146:4Online publication date: 1-Apr-2011
  • (2011)A Dynamic Social Feedback System to Support Learning and Social Interaction in Higher EducationIEEE Transactions on Learning Technologies10.1109/TLT.2011.94:4(340-352)Online publication date: 1-Oct-2011
  • (2010)Trust algorithms in P2P file sharing networksInternational Journal of Internet Technology and Secured Transactions10.1504/IJITST.2010.0314782:1/2(174-200)Online publication date: 1-Feb-2010
  • (2010)Study of E-commerce Trust Management Formal Model Based on ReputationProceedings of the 2010 International Conference on E-Business and E-Government10.1109/ICEE.2010.569(2253-2256)Online publication date: 7-May-2010
  • (2010)The Design and Evaluation of a Peer Ratings System for Online Learning CommunitiesProceedings of the 2010 43rd Hawaii International Conference on System Sciences10.1109/HICSS.2010.370(1-10)Online publication date: 5-Jan-2010
  • (2010)Research on a Multi-layered and Multi-grouped Model for P2P NetworksProceedings of the 2010 Ninth International Conference on Grid and Cloud Computing10.1109/GCC.2010.57(246-251)Online publication date: 1-Nov-2010
  • (2010)Multifactor hierarchical fuzzy trust evaluation on peer-to-peer networksPeer-to-Peer Networking and Applications10.1007/s12083-010-0096-94:4(376-390)Online publication date: 1-Dec-2010
  • Show More Cited By

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media