A Hierarchical Trust Model for Peer-to-Peer Networks
2019, Computers, Materials & Continua
https://doi.org/10.32604/CMC.2019.06236Abstract
Trust has become an increasingly important issue given society's growing reliance on electronic transactions. Peer-to-peer (P2P) networks are among the main electronic transaction environments affected by trust issues due to the freedom and anonymity of peers (users) and the inherent openness of these networks. A malicious peer can easily join a P2P network and abuse its peers and resources, resulting in a large-scale failure that might shut down the entire network. Therefore, a plethora of researchers have proposed trust management systems to mitigate the impact of the problem. However, due to the problem's scale and complexity, more research is necessary. The algorithm proposed here, HierarchTrust, attempts to create a more reliable environment in which the selection of a peer provider of a file or other resource is based on several trust values represented in hierarchical form. The values at the top of the hierarchical form are more trusted than those at the lower end of the hierarchy. Trust, in HierarchTrust, is generally calculated based on the standard deviation. Evaluation via simulation showed that HierarchTrust produced a better success rate than the well-established EigenTrust algorithm.
References (15)
- Androutsellis-Theotokis, S.; Spinellis, D. (2004): A survey of peer-to-peer content distribution technologies. ACM Computing Surveys, vol. 36, no. 4, pp. 335-371.
- Bhise, A. M.; Kamble, S. D. (2016): Detection and mitigation of sybil attack in peer-to- peer network. International Journal of Computer Network and Information Security, vol. 8, no. 9, pp. 56-63.
- Bursell, M. (2005): Security and trust in P2P systems. Peer-to-Peer Computing: the Evolution of a Disruptive Technology, pp. 145-165.
- Kamvar, S. D.; Schlosser, M. T.; Garcia-Molina, H. (2003): The eigentrust algorithm for reputation management in P2P networks. Proceedings of the 12th international conference on World Wide Web, pp. 640-651.
- Kurdi, H.; Alshayban, B.; Altoaimy, L.; Alsalamah, S. (2018): Trustyfeer: a subjective logic trust model for smart city peer-to-peer federated clouds. Wireless Communications and Mobile Computing, vol. 2018, pp. 1-13.
- Kurdi, H. (2015): Honestpeer: an enhanced eigentrust algorithm for reputation management in P2P systems. Journal of King Saud University-Computer and Information Sciences, vol. 27, no. 3, pp. 315-322.
- Lu, K.; Wang, J.; Xie, L.; Zhen, Q.; Li, M. (2016): An eigentrust-based hybrid trust model in P2P file sharing networks. Procedia Computer Science, vol. 94, no. 2016, pp. 366-371.
- Mondal, A.; Kitsuregawa, M. (2006): Privacy, security and trust in P2P environments: a perspective. Proceedings of the 17th International Workshop on Database and Expert Systems Applications, pp. 682-686.
- QTM (2018): P2P trust simulator. https://rtg.cis.upenn.edu/qtm/p2psim.php3.
- Shala, B.; Wacht, P.; Trick, U.; Lehmann, A.; Ghita, B.; Shiaeles, S. (2017): Ensuring trustworthiness for p2p-based m2m applications. Proceedings of the Internet Technologies and Applications, pp. 58-63.
- Xie, X.; Yuan, T.; Zhou, X.; Cheng, X. (2018): Research on trust model in container- based cloud service. Computers, Materials & Continua, vol. 56, no. 2, pp. 273-283.
- Xiong, L.; Liu, L. (2004): Peertrust: supporting reputation-based trust for peer-to-peer electronic communities. IEEE Transactions on Knowledge and Data Engineering, vol. 16, no. 7, pp. 843-857.
- Yang, L.; Qin, Z.; Wang, C.; Liu, Y.; Feng, C. (2010): A P2P reputation model based on ant colony algorithm. Proceedings of the International Conference on Communications, CMC, vol.59, no.2, pp.397-404, 2019
- Zhang, Y.; Zheng, H.; Liu, Y.; Li, K.; Qu, W. (2011): A grouptrust model based on service similarity evaluation in P2P networks. International Journal of Intelligent Systems, vol. 26, no. 1, pp. 47-62.
- Zhao, H.; Li, X. (2013): Vectortrust: trust vector aggregation scheme for trust management in peer-to-peer networks. Journal of Supercomputing, vol. 64, no. 3, pp. 805-829.