GeTrust: A Guarantee-Based Trust Model in Chord-Based P2P Networks

More and more users are attracted by P2P networks characterized by decentralization, autonomy and anonymity. However, users’ unconstrained behavior makes it necessary to use a trust model when establishing trust relationships between peers. Most existing trust models are based on recommendations, which, however, suffer from the shortcomings of slow convergence and high complexity of trust computations, as well as huge overhead of network traffic. Inspired by the establishment of trust relationships in human society, a guarantee-based trust model, GeTrust, is proposed for Chord-based P2P networks. A service peer needs to choose its guarantee peer(s) for the service it is going to provide, and they are both required to pledge reputation mortgages for the service. The request peer makes evaluations on all the candidates of service peer by referring their service reputations and their guarantee peers’ reputations, and selects the one with highest evaluation to be its service provider. In order to enhance GeTrust's availability and prevent malicious behavior, we also present incentive mechanism and anonymous reputation management strategy. Simulation results show that GeTrust is effective and efficient in terms of improving successful transaction rate, resisting complex attacks, reducing network overhead and lowering computational complexity.

[1]  Marco Grangetto,et al.  Simple Countermeasures to Mitigate the Effect of Pollution Attack in Network Coding-Based Peer-to-Peer Live Streaming , 2015, IEEE Transactions on Multimedia.

[2]  Li Jian-Zhong,et al.  A Reputation-Based Trust Mechanism for P2P E-Commerce Systems , 2007 .

[3]  Liangmin Guo,et al.  A Recommendation Trust Method Based on Fuzzy Clustering in P2P Networks , 2013, J. Softw..

[4]  Paolo Santi,et al.  MeshChord: A Location-Aware, Cross-Layer Specialization of Chord for Wireless Mesh Networks (concise contribution) , 2008, 2008 Sixth Annual IEEE International Conference on Pervasive Computing and Communications (PerCom).

[5]  Feng Wu,et al.  SocialTrust: Enabling long-term social cooperation in peer-to-peer services , 2013, Peer-to-Peer Networking and Applications.

[6]  Robert Morris,et al.  Chord: A scalable peer-to-peer lookup service for internet applications , 2001, SIGCOMM 2001.

[7]  Tian Chun A Novel Super-Peer Based Trust Model for Peer-to-Peer Networks , 2010 .

[8]  Esther Pacitti,et al.  Leveraging Social and Content-based Recommendation in P2P Systems , 2011, AP2PS 2011.

[9]  Ling Liu,et al.  PeerTrust: supporting reputation-based trust for peer-to-peer electronic communities , 2004, IEEE Transactions on Knowledge and Data Engineering.

[10]  David R. Karger,et al.  Chord: A scalable peer-to-peer lookup service for internet applications , 2001, SIGCOMM '01.

[11]  Ali Ghodsi,et al.  Multicast and Bulk Lookup in Structured Overlay Networks , 2010 .

[12]  Anupam Das,et al.  SecuredTrust: A Dynamic Trust Computation Model for Secured Communication in Multiagent Systems , 2012, IEEE Transactions on Dependable and Secure Computing.

[13]  Bharat K. Bhargava,et al.  SORT: A Self-ORganizing Trust Model for Peer-to-Peer Systems , 2013, IEEE Transactions on Dependable and Secure Computing.

[14]  Zou Peng,et al.  A Recommendation-Based Peer-to-Peer Trust Model , 2004 .

[15]  Chien-Ming Cheng,et al.  Adaptive Lookup Protocol for Two-Tier VANET/P2P Information Retrieval Services , 2015, IEEE Transactions on Vehicular Technology.

[16]  Leandros Tassiulas,et al.  Trust-based exchange of services to motivate cooperation in P2P networks , 2011, Peer-to-Peer Netw. Appl..

[17]  Bin Zhou,et al.  FCTrust: A Robust and Efficient Feedback Credibility-Based Distributed P2P Trust Model , 2008, 2008 The 9th International Conference for Young Computer Scientists.

[18]  Caterina M. Scoglio,et al.  Reward only is not enough: Evaluating and improving the fairness policy of the P2P file sharing network eMule/eDonkey , 2012, Peer-to-Peer Netw. Appl..

[19]  Wei Xing A Trust Management Model Based on Recommendation for P2P Network , 2010 .

[20]  Yu Yi,et al.  A Survey on Overcoming Free Riding in Peer-to-Peer Networks , 2008 .

[21]  Kai Hwang,et al.  GossipTrust for Fast Reputation Aggregation in Peer-to-Peer Networks , 2008, IEEE Transactions on Knowledge and Data Engineering.

[22]  Zhong Chen,et al.  Sorcery: Overcoming deceptive votes in P2P content sharing systems , 2011, Peer-to-Peer Netw. Appl..

[23]  Panayiotis Kotzanikolaou,et al.  Chord-PKI: A distributed trust infrastructure based on P2P networks , 2012, Comput. Networks.

[24]  Richard L. Meyer,et al.  Guarantee Schemes: An alternative to the Supervised Credit Program , 1988 .

[25]  Steven Hazel,et al.  Achord: A Variant of the Chord Lookup Service for Use in Censorship Resistant Peer-to-Peer Publishing Systems , 2002 .

[26]  Zoran Despotovic,et al.  P2P Reputation Management Through Social Networking , 2010 .

[27]  Hong Wang,et al.  Securing network coding against pollution attacks in P2P converged ubiquitous networks , 2015, Peer Peer Netw. Appl..

[28]  Yuh-Min Tseng,et al.  A free-rider aware reputation system for peer-to-peer file-sharing networks , 2011, Expert Syst. Appl..

[29]  Feng Zhou,et al.  Scalable Feedback Aggregating (SFA) Overlay for Large-Scale P2P Trust Management , 2012, IEEE Transactions on Parallel and Distributed Systems.

[30]  Raouf Boutaba,et al.  Reputation-Based Trust Management in Peer-to-Peer Systems: Taxonomy and Anatomy , 2010 .

[31]  Jingping Bi,et al.  STTM: Similarity Transitivity Chain Based Trust Model in P2P Environment , 2010, 2010 IEEE International Conference on Communications.

[32]  Xiaolei Wang,et al.  PeerDigger: Digging Stealthy P2P Hosts through Traffic Analysis in Real-Time , 2014, 2014 IEEE 17th International Conference on Computational Science and Engineering.

[33]  Xuemin Shen,et al.  Exchanging Peers to Establish P2P Networks , 2010 .

[34]  Hector Garcia-Molina,et al.  The Eigentrust algorithm for reputation management in P2P networks , 2003, WWW '03.

[35]  Lu Zhengding,et al.  Time-based dynamic trust model using ant colony algorithm , 2008, Wuhan University Journal of Natural Sciences.