摘要
It is necessary to construct an effective trust model to build trust relationship between peers in peer-to-peer (P2P) network and enhance the security and reliability of P2P systems. The current trust models only focus on the consumers' evaluation to a transaction, which may be abused by malicious peers to exaggerate or slander the provider deliberately. In this paper, we propose a novel trust model based on mutual evaluation, called METrust, to suppress the peers' malicious behavior, such as dishonest evaluation and strategic attack. METrust considers the factors including mutual evaluation, similarity risk, time window, incentive, and punishment mechanism. The trust value is composed of the direct trust value and the recommendation trust value. In order to inhibit dishonest evaluation, both participants should give evaluation information based on peers' own experiences about the transaction while computing the direct trust value. In view of this, the mutual evaluation consistency factor and its time decay function are proposed. Besides, to reduce the risk of computing the recommendation trust based on the recommendations of friend peers, the similarity risk is introduced to measure the uncertainty of the similarity computing, while similarity is used to measure credibility. The experimental results show that METrust is effective, and it has advantages in the inhibition of the various malicious behaviors.
It is necessary to construct an effective trust model to build trust relationship between peers in peer-to-peer (P2P) network and enhance the security and reliability of P2P systems. The current trust models only focus on the consumers' evaluation to a transaction, which may be abused by malicious peers to exaggerate or slander the provider deliberately. In this paper, we propose a novel trust model based on mutual evaluation, called METrust, to suppress the peers' malicious behavior, such as dishonest evaluation and strategic attack. METrust considers the factors including mutual evaluation, similarity risk, time window, incentive, and punishment mechanism. The trust value is composed of the direct trust value and the recommendation trust value. In order to inhibit dishonest evaluation, both participants should give evaluation information based on peers' own experiences about the transaction while computing the direct trust value. In view of this, the mutual evaluation consistency factor and its time decay function are proposed. Besides, to reduce the risk of computing the recommendation trust based on the recommendations of friend peers, the similarity risk is introduced to measure the uncertainty of the similarity computing, while similarity is used to measure credibility. The experimental results show that METrust is effective, and it has advantages in the inhibition of the various malicious behaviors.
基金
supported by National Natural Science Foundation of China (No.60873231)
Research Fund for the Doctoral Program of Higher Education (No.20093223120001)
Science and Technology Support Program of Jiangsu Province (No.BE2009158)
Natural Science Fund of Higher Education of Jiangsu Province(No.09KJB520010)
Special Fund for Fast Sharing of Science Paper in Net Era by CSTD (No.2009117)
作者简介
Corresponding author:Chun-Ling Cheng received the B.Sc.degree in computer software and M.Sc.degree in computer application from Nanjing University of Science and Technology,Jiangsu,PRC in 1993 and 1996,respec-tively.She is currently an associate professor at the College of Computer,Nanjing University of Posts and Telecommunications.Her research interests includes covers network and information security.E-mail:chengcl@njupt.edu.cn;Xiao-Long Xu received the M.Sc.and Ph.D.degrees in computer science and technology from Nanjing University of Posts and Telecommunications,Jiangsu,PRC in 2002 and 2008,respectively.He is currently an associate professor at the College of Computer,Nanjing University of Posts and Telecommunications.His research interests include computer software,distributed computing,and Information Security.E-mail:xuxl@njupt.edu.cn;Bing-Zhen Gao received the B.Sc.degree in mathematics from Shandong Normal University,PRC in 2007.She is currently working toward the M.Sc.degree in computer application at Nanjing University of Posts and Telecommunications.Her research interests include informa-tion security and P2P network.E-mail:qianrui25@126.com