کد مقاله کد نشریه سال انتشار مقاله انگلیسی نسخه تمام متن
425714 685824 2011 7 صفحه PDF دانلود رایگان
عنوان انگلیسی مقاله ISI
R2Trust, a reputation and risk based trust management framework for large-scale, fully decentralized overlay networks
موضوعات مرتبط
مهندسی و علوم پایه مهندسی کامپیوتر نظریه محاسباتی و ریاضیات
پیش نمایش صفحه اول مقاله
R2Trust, a reputation and risk based trust management framework for large-scale, fully decentralized overlay networks
چکیده انگلیسی

Peer-to-peer (P2P) networking is widely used to exchange, contribute, or obtain files from any participating user. Building trust relationships between peers in a large-scale distributed P2P file-sharing system is a fundamental and challenging research topic. However, it is difficult to build a good trust relationship with the traditional mechanism. Recommendation based trust model from social relationship can be adopted to resolve the problem. But it faces the challenges of subjectivity, and experiential referral weighting. This paper presents R2Trust—a robust Reputation and Risk evaluation based Trust management model. Our novel framework uses both reputation and risk to evaluate the trustworthiness of a peer and it is applicable for unstructured P2P networks. The model will evaluate peer trust values from direct interactions and peers referrals. R2Trust also distinguishes the credibility of peers. As a result, the aggregated trust value will filter out the noises and reflect more accurate trust values. The proposed R2Trust can also defense against several malicious attacks, such as simple malicious attacks, collusive attacks, and strategic attacks. Our experimental results show that, compared to the existing trust models, our model is cleanly a winner when security is the major concern of a system.


► We evaluate the overall trust value of a peer by its trust value and risk value.
► We present the methods to quantify and update the credibility of a peer.
► The risk value of a peer is computed by information entropy.
► Our model can defense against several malicious attacks.

ناشر
Database: Elsevier - ScienceDirect (ساینس دایرکت)
Journal: Future Generation Computer Systems - Volume 27, Issue 8, October 2011, Pages 1135–1141
نویسندگان
, ,