DOUBLEFACE: ROBUST REPUTATION RANKING BASED ON LINK ANALYSIS IN P2P NETWORKS

In this paper, we propose the DoubleFace algorithm to infer peers’ reputation rankings, which explicitly includes two phases. First is the computation of peers’ Recommendation Ability (RA) based on the following intuitive idea: Peer's RA will be reversely determined by how many peers it points to and how bad those peers have been rated, which comprise two subroutines: the badness propagation and the conversion of RA from badness. In the first subroutine, we thoroughly consider the effect of sybils’ attack on badness propagation, which has been investigated in previous work rarely; in the second subroutine, we design two methods to convert the badness into peer's RA: the disproportional way and the logistic way. The second phase is the integration of RA into adjacent matrix used to represent P2P trust graph, to reflect peer's RA in trust propagation. The simulation results show that the disproportional and logistic DoubleFace can be robust against sybils’ and front peers’ attacks to reputation ranking and can achieve significant performance improvement in comparison with Eigentrust-like algorithms, in hostile P2P environments. Moreover, we also discuss the effect of hostile and hospitable P2P environments on the performance of DoubleFace. Specifically, disproportional DoubleFace can perform slightly better than logistic DoubleFace in hostile P2P environments, but, in hospitable P2P environments, disproportional DoubleFace performs anti-intuitively poorly, and logistic DoubleFace achieves the same performance as traditional Eigentrust-like algorithms.

[1]  Hector Garcia-Molina,et al.  Taxonomy of trust: Categorizing P2P reputation systems , 2006, Comput. Networks.

[2]  Hector Garcia-Molina,et al.  Combating Web Spam with TrustRank , 2004, VLDB.

[3]  J. Rodgers,et al.  Thirteen ways to look at the correlation coefficient , 1988 .

[4]  Michael Kaminsky,et al.  SybilGuard: Defending Against Sybil Attacks via Social Networks , 2008, IEEE/ACM Transactions on Networking.

[5]  Mark E. J. Newman,et al.  The Structure and Function of Complex Networks , 2003, SIAM Rev..

[6]  Hector Garcia-Molina,et al.  The Eigentrust algorithm for reputation management in P2P networks , 2003, WWW '03.

[7]  Audun Jøsang,et al.  A survey of trust and reputation systems for online service provision , 2007, Decis. Support Syst..

[8]  Tad Hogg,et al.  Enhancing reputation mechanisms via online social networks , 2004, EC '04.

[9]  Brian D. Davison,et al.  Propagating Trust and Distrust to Demote Web Spam , 2006, MTW.

[10]  Taher H. Haveliwala,et al.  The Second Eigenvalue of the Google Matrix , 2003 .

[11]  Weisong Shi,et al.  Analysis of ratings on trust inference in open environments , 2008, Perform. Evaluation.

[12]  Jon Kleinberg,et al.  Authoritative sources in a hyperlinked environment , 1999, SODA '98.

[13]  Rajeev Motwani,et al.  The PageRank Citation Ranking : Bringing Order to the Web , 1999, WWW 1999.

[14]  Ling Liu,et al.  PeerTrust: supporting reputation-based trust for peer-to-peer electronic communities , 2004, IEEE Transactions on Knowledge and Data Engineering.

[15]  Paolo Avesani,et al.  Controversial Users Demand Local Trust Metrics: An Experimental Study on Epinions.com Community , 2005, AAAI.

[16]  Gerhard Weikum,et al.  The Juxtaposed approximate PageRank method for robust PageRank approximation in a peer-to-peer web search network , 2008, The VLDB Journal.

[17]  Yufeng Wang,et al.  Poisonedwater: An improved approach for accurate reputation ranking in P2P networks , 2010, Future Gener. Comput. Syst..

[18]  John R. Douceur,et al.  The Sybil Attack , 2002, IPTPS.

[19]  Akihiro Nakao,et al.  Poisonedwater: an adaptive approach to reducing the reputation ranking error in P2P networks , 2009, 2009 First International Conference on Future Information Networks.

[20]  Shlomo Moran,et al.  SALSA: the stochastic approach for link-structure analysis , 2001, TOIS.

[21]  Ling Liu,et al.  Spam-Resilient Web Rankings via Influence Throttling , 2007, 2007 IEEE International Parallel and Distributed Processing Symposium.

[22]  Akbar Ghaffarpour Rahbar,et al.  PowerTrust: A Robust and Scalable Reputation System for Trusted Peer-to-Peer Computing , 2007, IEEE Transactions on Parallel and Distributed Systems.

[23]  Ling Liu,et al.  Countering web spam with credibility-based link analysis , 2007, PODC '07.

[24]  Brian D. Davison,et al.  Measuring similarity to detect qualified links , 2007, AIRWeb '07.

[25]  Brian D. Davison,et al.  Identifying link farm spam pages , 2005, WWW '05.

[26]  Jonathon T. Giffin,et al.  An auctioning reputation system based on anomaly , 2005, CCS '05.

[27]  Geoffrey Canright,et al.  Introducing Network Analysis , 2008 .

[28]  J. Parreira,et al.  The JXP Method for Robust PageRank Approximation in a Peer-to-Peer Web Search Network , 2007 .

[29]  Cristina Nita-Rotaru,et al.  A survey of attack and defense techniques for reputation systems , 2009, CSUR.

[30]  Allan Borodin,et al.  Link analysis ranking: algorithms, theory, and experiments , 2005, TOIT.

[31]  Debora Donato,et al.  New metrics for reputation management in P2P networks , 2007, AIRWeb '07.

[32]  Kai Hwang,et al.  PowerTrust: A Robust and Scalable Reputation System for Trusted Peer-to-Peer Computing , 2007, IEEE Transactions on Parallel and Distributed Systems.

[33]  Audun Jøsang,et al.  Optimal Trust Network Analysis with Subjective Logic , 2008, 2008 Second International Conference on Emerging Security Information, Systems and Technologies.

[34]  Georg Lausen,et al.  Propagation Models for Trust and Distrust in Social Networks , 2005, Inf. Syst. Frontiers.