Trust Management Based on Fuzzy Sets Theory for P2P Networks

Because of the anonymity and dynamic characters of peer-to-peer(P2P) overlay networks, trust management plays a more and more role for information security and successful transaction. Although people have recognized the importance of security for their personal information, they remain uncertain when they have to define and enforce their own access control rules or have to handle indirect information. Indirect information and subjective judgment are the major sources of uncertainty in P2Ptrust management. This paper introduces fuzzy sets theory into the definition and evaluation of trust, and then provides a formal representation of fuzzy rules. It also offers a set of derivation rules based on improved-Einstein operators for analyzing and reasoning among fuzzy rules in order to enforce these rules with a certain level of uncertainty. Application of this model to autonomous interconnection in P2P networks environments provides a new method to handle uncertainty in trust management.

[1]  Nicolas Christin,et al.  Content availability, pollution and poisoning in file sharing peer-to-peer networks , 2005, EC '05.

[2]  G. G. Stokes "J." , 1890, The New Yale Book of Quotations.

[3]  John Erickson Trust metrics , 2009, 2009 International Symposium on Collaborative Technologies and Systems.

[4]  Morris Sloman,et al.  Trust Management Tools for Internet Applications , 2003, iTrust.

[5]  Nahid Shahmehri,et al.  Dynamic trust metrics for peer-to-peer systems , 2005, 16th International Workshop on Database and Expert Systems Applications (DEXA'05).

[6]  Joan Feigenbaum,et al.  Decentralized trust management , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.

[7]  Audun Jøsang,et al.  A Logic for Uncertain Probabilities , 2001, Int. J. Uncertain. Fuzziness Knowl. Based Syst..

[8]  Daniel W. Manchala,et al.  Trust metrics, models and protocols for electronic commerce transactions , 1998, Proceedings. 18th International Conference on Distributed Computing Systems (Cat. No.98CB36183).

[9]  Thomas Beth,et al.  Valuation of Trust in Open Networks , 1994, ESORICS.

[10]  Germano Caronni,et al.  Walking the Web of trust , 2000, Proceedings IEEE 9th International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WET ICE 2000).

[11]  Ninghui Li,et al.  DATALOG with Constraints: A Foundation for Trust Management Languages , 2003, PADL.