Quantitative Analysis of Trust Evidence in Internet

With the development of the computer network, Internet environment is increasingly complicated and unpredictable, which makes more applications need to establish trust between two entities, especially among strange entities. The trust includes direct trust, indirect trust and reputation trust. Indirect trust and reputation trust are both based on direct trust. Meanwhile, the direct trust is based on trust evidences obtained from past actions during interaction with other entity. The paper puts forward a method of how to update trust evidences dynamically and how to use updated trust evidence to compute trust and trust attribute of evaluated entity. We have proved that the method have good trust characteristics, such as "rise-slowly, decline-quickly", which can prevent from attack of malice entity; the subjective trust factor beta embodies subjective characteristic of updating trust evidences. With the increase of the number of interaction, the method can automatically improve trustworthiness of the evaluated entity, so the algorithm is self-adaptive. Meanwhile, when the entities do not interact with each other for a long time, the evidence value would decrease gradually and automatically; the method can prolong updating time automatically by computing dynamic standard variance of trust evidence, which can improve performance.

[1]  Hector Garcia-Molina,et al.  Taxonomy of trust: Categorizing P2P reputation systems , 2006, Comput. Networks.

[2]  John S. Baras,et al.  On trust models and trust evaluation metrics for ad hoc networks , 2006, IEEE Journal on Selected Areas in Communications.

[3]  Muthucumaru Maheswaran,et al.  Towards Trust-Aware Resource Management in Grid Computing Systems , 2002, 2nd IEEE/ACM International Symposium on Cluster Computing and the Grid (CCGRID'02).

[4]  Muthucumaru Maheswaran,et al.  Evolving and managing trust in grid computing systems , 2002, IEEE CCECE2002. Canadian Conference on Electrical and Computer Engineering. Conference Proceedings (Cat. No.02CH37373).

[5]  Vinny Cahill,et al.  Exploiting user behaviour for context-aware power management , 2005, WiMob'2005), IEEE International Conference on Wireless And Mobile Computing, Networking And Communications, 2005..

[6]  Peng Xue Research on Trustworthy Networks , 2005 .