skip to main content
10.1145/2556871.2556916acmotherconferencesArticle/Chapter ViewAbstractPublication PagesicccConference Proceedingsconference-collections
research-article

A Trust Model Based on Reputation in P2P Network

Authors Info & Claims
Published:01 December 2013Publication History

ABSTRACT

A trust model is put forward based on reputation to solve trust issue between nodes in the P2P network. The trust is divided into direct trust and indirect trust in the model when the node trust is computed. And the value of the two trust as mentioned before is computed though the given method. According to the historic results and other's recommendation, node can evaluate the trust and then make a choice. Simulation results show that, the trust model can effectively resist the malicious nodes, greatly improve the success rate of information interaction and make more effective in building trust relationship between nodes.

References

  1. S. Marsh. 1994. Formalizing Trust as A Computational Concept.Google ScholarGoogle Scholar
  2. A.Jøsang, R.Ismail. 2002. The Beta Reputation System{C}. In Proceedings of the 15th Bled Electronic Commerce Conference, 2002.Google ScholarGoogle Scholar
  3. Y.Wang, J.Vassileva. 2003. Trust and Reputation Model in Peer-to-Peer Networks{C}. In Proceedings of the 3th International Conference on Peer- to-Peer Computing, 2003, 150-157. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. A.Abdul-Rahman, S.Hailes. 2000.Supporting Trust in Virtual Communities{C}. In Proceedings of Hawaii International Conference on System Sciences, 2000, 4-7. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. S.Song, K.Hwang. 2005.Trusted P2P Transactions with Fuzzy Reputation Aggregation{J}. IEEE Internet Computing, 2005, 9(6): 24-34. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. K.Aberer, Z.Despotovic. 2001. Managing Trust in a Peer-to-Peer Information System{C}. In Proceedings of the 10th International Conference on Information and Knowledge Management, 2001, 310-317. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. B.Yu, M.P.Singh. 2004. Developing Trust in Large-Scale Peer-to-Peer Systems{C}. In Proceedings of the 1th IEEE Symposium on Multi -Agent Security and Survivability, 2004, 1-10.Google ScholarGoogle Scholar
  8. F.cornclli, E.Damiani. 2002.Choosing Reputable Servents in a P2P Network{C}. In Proceedings of the 11th International World Wide Web Conference, 2002, 441-449. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Kamvar S D,Schlosser M T,Garcia-Molina H. 2003. The Eigentrust Algorithm for Reputation Management in P2P Networks{C}. In Proceedings of the 12th International World Wide Web Conference,2003,640-651. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Xiong L,Liu L. 2004. PeerTrust:Supporting reputation-based trust in peer-to-peer communities{J}.IEEE Transactions on Data and Knowledge Engineering(Special Issue on Peer-to-Peer Based Data Management),2004,16(7):843-857. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. A Trust Model Based on Reputation in P2P Network

            Recommendations

            Comments

            Login options

            Check if you have access through your login credentials or your institution to get full access on this article.

            Sign in
            • Published in

              cover image ACM Other conferences
              ICCC '13: Proceedings of the Second International Conference on Innovative Computing and Cloud Computing
              December 2013
              285 pages
              ISBN:9781450321198
              DOI:10.1145/2556871
              • General Chairs:
              • Min Wu,
              • Wei Lee,
              • Program Chairs:
              • Yiyi Zhouzhou,
              • Riza Esa,
              • Xiang Lee

              Copyright © 2013 ACM

              Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

              Publisher

              Association for Computing Machinery

              New York, NY, United States

              Publication History

              • Published: 1 December 2013

              Permissions

              Request permissions about this article.

              Request Permissions

              Check for updates

              Qualifiers

              • research-article
              • Research
              • Refereed limited

            PDF Format

            View or Download as a PDF file.

            PDF

            eReader

            View online with eReader.

            eReader