Analysis of Feedbacks and Ratings on Trust Merit for Peer-to-Peer Systems

In peer-to-peer (P2P) systems, peers often must interact with unknown or unfamiliar peers without the benefit of trusted third authorities to mediate the interactions. A peer will need reputation mechanisms by self-experiencing and incorporating the knowledge of other peers to decide whether to trust another peer in P2P systems. On the basis of introduction on the trust properties and common problems in P2P systems, this paper discusses the trust merits on both the feedback-only methods (direct) and the ratings (indirect). In the direct way, we propose the credibility to cope with some malicious attacks such as colluding and white-washing. The two metrics of the global trust merit and the complete trust metric are given. Further researches are also outlined.

[1]  Ling Liu,et al.  A reputation-based trust model for peer-to-peer ecommerce communities , 2003, EC.

[2]  Morris Sloman,et al.  A survey of trust in internet applications , 2000, IEEE Communications Surveys & Tutorials.

[3]  Julita Vassileva,et al.  Trust and reputation model in peer-to-peer networks , 2003, Proceedings Third International Conference on Peer-to-Peer Computing (P2P2003).

[4]  Julita Vassileva,et al.  Bayesian network-based trust model , 2003, Proceedings IEEE/WIC International Conference on Web Intelligence (WI 2003).

[5]  Jianguo Chen,et al.  A Solution for Whitewashing in P2P Systems Based on Observation Preorder , 2009, 2009 International Conference on Networks Security, Wireless Communications and Trusted Computing.

[6]  Munindar P. Singh Trustworthy Service Composition: Challenges and Research Questions , 2002, Trust, Reputation, and Security.

[7]  S. Buchegger,et al.  A Robust Reputation System for P2P and Mobile Ad-hoc Networks , 2004 .

[8]  Mudhakar Srivatsa,et al.  TrustGuard: countering vulnerabilities in reputation management for decentralized overlay networks , 2005, WWW '05.

[9]  Ross A. Malaga Web-Based Reputation Management Systems: Problems and Suggested Solutions , 2001, Electron. Commer. Res..

[10]  Jean-Yves Le Boudec,et al.  Self-policing mobile ad hoc networks by reputation systems , 2005, IEEE Communications Magazine.

[11]  Michael J. Butler,et al.  The Use of Formal Methods in the Analysis of Trust (Position Paper) , 2004, iTrust.

[12]  Jordi Sabater-Mir,et al.  Trust in Agent Societies, 11th International Workshop, TRUST 2008, Estoril, Portugal, May 12-13, 2008. Revised Selected and Invited Papers , 2008, AAMAS-TRUST.

[13]  Giorgos Zacharia,et al.  Trust management through reputation mechanisms , 2000, Appl. Artif. Intell..

[14]  A. Jøsang,et al.  Filtering Out Unfair Ratings in Bayesian Reputation Systems , 2004 .

[15]  Yolanda Gil,et al.  A survey of trust in computer science and the Semantic Web , 2007, J. Web Semant..

[16]  Weisong Shi,et al.  Enforcing Cooperative Resource Sharing in Untrusted P2P Computing Environments , 2005, Mob. Networks Appl..

[17]  Munindar P. Singh,et al.  Developing trust in large-scale peer-to-peer systems , 2004, IEEE First Symposium onMulti-Agent Security and Survivability, 2004.

[18]  Weisong Shi,et al.  Analysis of ratings on trust inference in open environments , 2008, Perform. Evaluation.