کد مقاله | کد نشریه | سال انتشار | مقاله انگلیسی | نسخه تمام متن |
---|---|---|---|---|
425714 | 685824 | 2011 | 7 صفحه PDF | دانلود رایگان |
![عکس صفحه اول مقاله: R2Trust, a reputation and risk based trust management framework for large-scale, fully decentralized overlay networks R2Trust, a reputation and risk based trust management framework for large-scale, fully decentralized overlay networks](/preview/png/425714.png)
Peer-to-peer (P2P) networking is widely used to exchange, contribute, or obtain files from any participating user. Building trust relationships between peers in a large-scale distributed P2P file-sharing system is a fundamental and challenging research topic. However, it is difficult to build a good trust relationship with the traditional mechanism. Recommendation based trust model from social relationship can be adopted to resolve the problem. But it faces the challenges of subjectivity, and experiential referral weighting. This paper presents R2Trust—a robust Reputation and Risk evaluation based Trust management model. Our novel framework uses both reputation and risk to evaluate the trustworthiness of a peer and it is applicable for unstructured P2P networks. The model will evaluate peer trust values from direct interactions and peers referrals. R2Trust also distinguishes the credibility of peers. As a result, the aggregated trust value will filter out the noises and reflect more accurate trust values. The proposed R2Trust can also defense against several malicious attacks, such as simple malicious attacks, collusive attacks, and strategic attacks. Our experimental results show that, compared to the existing trust models, our model is cleanly a winner when security is the major concern of a system.
► We evaluate the overall trust value of a peer by its trust value and risk value.
► We present the methods to quantify and update the credibility of a peer.
► The risk value of a peer is computed by information entropy.
► Our model can defense against several malicious attacks.
Journal: Future Generation Computer Systems - Volume 27, Issue 8, October 2011, Pages 1135–1141