期刊文献+

METrust: A Mutual Evaluation-based Trust Model for P2P Networks 被引量:2

METrust: A Mutual Evaluation-based Trust Model for P2P Networks
在线阅读 下载PDF
导出
摘要 It is necessary to construct an effective trust model to build trust relationship between peers in peer-to-peer (P2P) network and enhance the security and reliability of P2P systems. The current trust models only focus on the consumers' evaluation to a transaction, which may be abused by malicious peers to exaggerate or slander the provider deliberately. In this paper, we propose a novel trust model based on mutual evaluation, called METrust, to suppress the peers' malicious behavior, such as dishonest evaluation and strategic attack. METrust considers the factors including mutual evaluation, similarity risk, time window, incentive, and punishment mechanism. The trust value is composed of the direct trust value and the recommendation trust value. In order to inhibit dishonest evaluation, both participants should give evaluation information based on peers' own experiences about the transaction while computing the direct trust value. In view of this, the mutual evaluation consistency factor and its time decay function are proposed. Besides, to reduce the risk of computing the recommendation trust based on the recommendations of friend peers, the similarity risk is introduced to measure the uncertainty of the similarity computing, while similarity is used to measure credibility. The experimental results show that METrust is effective, and it has advantages in the inhibition of the various malicious behaviors. It is necessary to construct an effective trust model to build trust relationship between peers in peer-to-peer (P2P) network and enhance the security and reliability of P2P systems. The current trust models only focus on the consumers' evaluation to a transaction, which may be abused by malicious peers to exaggerate or slander the provider deliberately. In this paper, we propose a novel trust model based on mutual evaluation, called METrust, to suppress the peers' malicious behavior, such as dishonest evaluation and strategic attack. METrust considers the factors including mutual evaluation, similarity risk, time window, incentive, and punishment mechanism. The trust value is composed of the direct trust value and the recommendation trust value. In order to inhibit dishonest evaluation, both participants should give evaluation information based on peers' own experiences about the transaction while computing the direct trust value. In view of this, the mutual evaluation consistency factor and its time decay function are proposed. Besides, to reduce the risk of computing the recommendation trust based on the recommendations of friend peers, the similarity risk is introduced to measure the uncertainty of the similarity computing, while similarity is used to measure credibility. The experimental results show that METrust is effective, and it has advantages in the inhibition of the various malicious behaviors.
机构地区 College of Computer
出处 《International Journal of Automation and computing》 EI 2012年第1期63-71,共9页 国际自动化与计算杂志(英文版)
基金 supported by National Natural Science Foundation of China (No.60873231) Research Fund for the Doctoral Program of Higher Education (No.20093223120001) Science and Technology Support Program of Jiangsu Province (No.BE2009158) Natural Science Fund of Higher Education of Jiangsu Province(No.09KJB520010) Special Fund for Fast Sharing of Science Paper in Net Era by CSTD (No.2009117)
关键词 Peer-to-peer (P2P) network REPUTATION trust model mutual evaluation similarity risk Peer-to-peer (P2P) network, reputation, trust model, mutual evaluation, similarity risk
作者简介 Corresponding author:Chun-Ling Cheng received the B.Sc.degree in computer software and M.Sc.degree in computer application from Nanjing University of Science and Technology,Jiangsu,PRC in 1993 and 1996,respec-tively.She is currently an associate professor at the College of Computer,Nanjing University of Posts and Telecommunications.Her research interests includes covers network and information security.E-mail:chengcl@njupt.edu.cn;Xiao-Long Xu received the M.Sc.and Ph.D.degrees in computer science and technology from Nanjing University of Posts and Telecommunications,Jiangsu,PRC in 2002 and 2008,respectively.He is currently an associate professor at the College of Computer,Nanjing University of Posts and Telecommunications.His research interests include computer software,distributed computing,and Information Security.E-mail:xuxl@njupt.edu.cn;Bing-Zhen Gao received the B.Sc.degree in mathematics from Shandong Normal University,PRC in 2007.She is currently working toward the M.Sc.degree in computer application at Nanjing University of Posts and Telecommunications.Her research interests include informa-tion security and P2P network.E-mail:qianrui25@126.com
  • 相关文献

参考文献5

二级参考文献77

共引文献132

同被引文献8

引证文献2

二级引证文献15

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部