EnhanEigen: A New Comprehensive Trust Model for Peer-to-Peer Network

In this paper, we propose a new trust model called EnhanEigen. This model uses the comprehensive trust to evaluate the peers and enhanced probabilistic peer selection algorithm to filter malicious peers and select the peers with high trust value. This comprehensive trust is composed of local trust value, global trust value, malicious percent (MP) and feedback consistency percent (FCP). MP and FCP are important parameters to help filter malicious peers. In experiments, good peers, malicious and malign peers, feedback cheating peers are used to validate the performance of the new trust model in peer to peer file sharing environment. Experiment show that the new trust model can greatly reduce the false feedbacks adopted by the network, has the shorter algorithm execution time and has a higher success rate of transactions. The new model can distinguish false feedbacks to resist the cooperative attacks from malicious peers and feedback cheating peers effectively.

[1]  Cristina Nita-Rotaru,et al.  A survey of attack and defense techniques for reputation systems , 2009, CSUR.

[2]  Kai Hwang,et al.  GossipTrust for Fast Reputation Aggregation in Peer-to-Peer Networks , 2008, IEEE Transactions on Knowledge and Data Engineering.

[3]  Shanlin Yang,et al.  A multi-dimensional trust-aware cloud service selection mechanism based on evidential reasoning approach , 2015, Int. J. Autom. Comput..

[4]  Lik Mui,et al.  Computational models of trust and reputation: agents, evolutionary games, and social networks , 2002 .

[5]  Cécile Paris,et al.  A survey of trust in social networks , 2013, CSUR.

[6]  Rüdiger Schollmeier,et al.  A definition of peer-to-peer networking for the classification of peer-to-peer architectures and applications , 2001, Proceedings First International Conference on Peer-to-Peer Computing.

[7]  L. Mui,et al.  A computational model of trust and reputation , 2002, Proceedings of the 35th Annual Hawaii International Conference on System Sciences.

[8]  Minglu Li,et al.  CBT: A proximity-aware peer clustering system in large-scale BitTorrent-like peer-to-peer networks , 2008, Comput. Commun..

[9]  D. Janaki Ram,et al.  Stabilizing Peer-to-Peer Systems Using Public Cloud: A Case Study of Peer-to-Peer Search , 2012, 2012 11th International Symposium on Parallel and Distributed Computing.

[10]  Sherali Zeadally,et al.  Trust management of services in cloud environments: Obstacles and solutions , 2013, CSUR.

[11]  Akbar Ghaffarpour Rahbar,et al.  PowerTrust: A Robust and Scalable Reputation System for Trusted Peer-to-Peer Computing , 2007, IEEE Transactions on Parallel and Distributed Systems.

[12]  Joan Feigenbaum,et al.  Computational challenges in e-commerce , 2009, CACM.

[13]  Frank van Harmelen,et al.  Expertise-based peer selection in Peer-to-Peer networks , 2008, Knowledge and Information Systems.

[14]  Hector Garcia-Molina,et al.  The Eigentrust algorithm for reputation management in P2P networks , 2003, WWW '03.

[15]  Geoff Coulson,et al.  Free Riding on Gnutella Revisited: The Bell Tolls? , 2005, IEEE Distributed Syst. Online.

[16]  Stephen Marsh,et al.  Formalising Trust as a Computational Concept , 1994 .

[17]  Robert Morris,et al.  Chord: A scalable peer-to-peer lookup service for internet applications , 2001, SIGCOMM 2001.

[18]  Ling Liu,et al.  PeerTrust: supporting reputation-based trust for peer-to-peer electronic communities , 2004, IEEE Transactions on Knowledge and Data Engineering.

[19]  Scott Dick,et al.  Consumer trust in e-commerce web sites , 2011, ACM Comput. Surv..

[20]  Yuanyuan Yang,et al.  Applying Network Coding to Peer-to-Peer File Sharing , 2014, IEEE Transactions on Computers.

[21]  José Luís Oliveira,et al.  Clustering of distinct PACS archives using a cooperative peer-to-peer network , 2012, Comput. Methods Programs Biomed..