• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Wu Peng, Wu Guoxin, and Fang Qun. A Reputation-Based Trust Model Based on Probability and Statistics for P2P Systems[J]. Journal of Computer Research and Development, 2008, 45(3): 408-416.
Citation: Wu Peng, Wu Guoxin, and Fang Qun. A Reputation-Based Trust Model Based on Probability and Statistics for P2P Systems[J]. Journal of Computer Research and Development, 2008, 45(3): 408-416.

A Reputation-Based Trust Model Based on Probability and Statistics for P2P Systems

More Information
  • Published Date: March 14, 2008
  • Peer to peer (P2P) technology has been widely used in file-sharing, distributed computing, e-market and information management. One of the fundamental challenges for P2P systems is the ability to manage risks involved in interacting and collaborating with prior unknown and potentially malicious parties. Reputation-based trust management systems can successfully mitigate this risk by deriving the trustworthiness of a certain peer from that peer's behavior history. However, in current trust models employed by the existing P2P systems, the validity of peers' trust valuation is seriously affected by peers' malicious behaviors. For example, there are many strategic cheating and dishonest recommendation. To solve this problem, a novel reputation-based trust model based on probability and statistics for P2P systems is proposed. Referring to subjective trust relationship of sociological theory, the proposed model uses experience-based and recommendation-based trust relationship to compute the trustworthiness of peers. In particular, this model introduces three parameters, namely, experience's time-sensitivity, referee's credibility and recommended information's reliability, and thus it can provide adequate reaction to peers' malicious behaviors. Theoretical analysis and simulation show that the proposed model has advantages in coping with peers' malicious behaviors over the existing P2P reputation systems. It is highly effective in countering malicious peers regarding strategic cheating, dishonest recommendation, and collusion.
  • Related Articles

    [1]Yang Donghui, Zeng Bin, Li Zhenyu. New gTLD Resolution Behavior Analysis and Malicious Domain Detection Method[J]. Journal of Computer Research and Development, 2024, 61(4): 1038-1048. DOI: 10.7544/issn1000-1239.202220846
    [2]Zhang Lei, He Chongde, Wei Lifei. Efficient and Malicious Secure Three-Party Private Set Intersection Computation Protocols for Small Sets[J]. Journal of Computer Research and Development, 2022, 59(10): 2286-2298. DOI: 10.7544/issn1000-1239.20220471
    [3]Sun Yong, Tan Wenan, Jin Ting, Zhou Liangguang. A Collaborative Collusion Detection Method Based on Online Clustering[J]. Journal of Computer Research and Development, 2018, 55(6): 1320-1332. DOI: 10.7544/issn1000-1239.2018.20170231
    [4]Wang Ruiqin, Jiang Yunliang, Li Yixiao, Lou Jungang. A Collaborative Filtering Recommendation Algorithm Based on Multiple Social Trusts[J]. Journal of Computer Research and Development, 2016, 53(6): 1389-1399. DOI: 10.7544/issn1000-1239.2016.20150307
    [5]Miao Guangsheng, Feng Dengguo, Su Purui. A Collusion Detector Based on Fuzzy Logic in P2P Trust Model[J]. Journal of Computer Research and Development, 2011, 48(12): 2187-2200.
    [6]Feng Jingyu, Zhang Yuqing, Chen Shenlong, Fu Anmin. GoodRep Attack and Defense in P2P Reputation Systems[J]. Journal of Computer Research and Development, 2011, 48(8): 1473-1480.
    [7]Kang Le, Jing Jiwu, and Wang Yuewu. The Trust Expansion and Control in Social Network Service[J]. Journal of Computer Research and Development, 2010, 47(9): 1611-1621.
    [8]Yue Guangxue, Li Renfa. An Efficient Virtual Co-Allocation Service Model in P2P Networks[J]. Journal of Computer Research and Development, 2008, 45(11): 1928-1938.
    [9]Wu Peng, Wu Guoxin, and Fang Qun. A Reputation-Based Trust Model Based on Probability and Statistics for P2P Systems[J]. Journal of Computer Research and Development, 2008, 45(3): 408-416.
    [10]Guo Leitao, Yang Shoubao, Wang Jing, and Zhou Jinyang. A Distributed Trust Model Based on Vector Space in P2P Networks[J]. Journal of Computer Research and Development, 2006, 43(9): 1564-1570.

Catalog

    Article views (411) PDF downloads (462) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return