Skip to main content
Log in

VectorTrust: trust vector aggregation scheme for trust management in peer-to-peer networks

  • Published:
The Journal of Supercomputing Aims and scope Submit manuscript

Abstract

With emerging Internet-scale open content and resource sharing, social networks, and complex cyber-physical systems, trust issues become prominent. Conventional trust mechanisms are inadequate at addressing trust issues in decentralized open environments. In this paper, we propose a trust vector based trust management scheme called VectorTrust for aggregation of distributed trust scores. Leveraging a Bellman–Ford based algorithm for fast and lightweight trust score aggregation, VectorTrust features localized and distributed concurrent communication. Built on a trust overlay network in a peer-to-peer network, a VectorTrust-enabled system is decentralized by nature and does not rely on any centralized server or centralized trust aggregation. We design, implement, and analyze trust rating, trust aggregation, and trust management strategies. To evaluate the performance, we design and implement a VectorTrust simulator (VTSim) in an unstructured P2P network. The analysis and simulation results demonstrate the efficiency, accuracy, scalability, and robustness of VectorTrust scheme. On average, VectorTrust converges faster and involves less complexity than most existing trust schemes. VectorTrust remains robust and tolerant to malicious peers and malicious behaviors. With dynamic growth of P2P network scales and topology complexities, VectorTrust scales well with reasonable overheads (about O(lg N) communication overheads) and fast convergence speed (about O(log  D N) iterations).

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Advogato’s trust metric (white paper). http://www.advogato.org/trustmetric.html

  2. Donato D, Castillo C, Paniccia M, Cortese G, Selis M, Leonardi S (2007) New metrics for reputation management in p2p networks. In: 3rd international workshop on adversarial information retrieval on the web, Banff, Alberta, Canada, May 8, 2007, pp 65–72

    Google Scholar 

  3. eBay. http://www.ebay.com

  4. Feng Q, Yang Y, Sun YL, Dai Y (2008) Modeling attack behaviors in rating systems. In: 28th international conference on distributed computing systems workshops. ICDCS ’08, Beijing, China, June 17–20, 2008, pp 241–248

    Chapter  Google Scholar 

  5. Kamvar SD, Schlosser MT, Molina H-G (2003) The eigentrust algorithm for reputation management in p2p networks. In: Proceedings of the 12th international conference on world wide web (WWW2003), Budapest, Hungary, May 20–24, 2003, pp 640–651

    Google Scholar 

  6. Lee S, Sherwood R, Bhattacharjee B (2003) Cooperative peer groups in nice. In: INFOCOM 2003. Twenty-second annual joint conference of the IEEE computer and communications societies. March–April 2003, vol 2. IEEE Press, New York, pp 1272–1282

    Google Scholar 

  7. Li X., Ling L. (2004) Peertrust: supporting reputation-based trust for peer-to-peer electronic communities. IEEE Trans Knowl Data Eng 16(7):843–857

    Article  Google Scholar 

  8. Liang Z, Shi W (2005) Pet: a personalized trust model with reputation and risk evaluation for p2p resource sharing. In: Proceedings of the 38th annual Hawaii international conference on system sciences. HICSS ’05, Jan 2005

    Google Scholar 

  9. Liang Z., Shi W. (2008) Analysis of ratings on trust inference in open environments. Perform Eval 65(2):99–128

    Article  Google Scholar 

  10. Marti S, Garcia-Molina H (2006) Taxonomy of trust: categorizing p2p reputation systems. Comput Netw 50(4):472–484

    Article  MATH  Google Scholar 

  11. Mekouar L, Iraqi Y, Boutaba R (2005) A reputation management and selection advisor schemes for peer-to-peer systems. In: 15th IFIP/IEEE international workshop on distributed systems: operations and management (DSOM’04), Davis, CA, Nov 15, 2004, pp 208–219

    Google Scholar 

  12. Piatek M, Isdal T, Krishnamurthy A, Anderson T (2008) One hop reputations for peer to peer file sharing workloads. In: NSDI’08: Proceedings of the 5th USENIX symposium on networked systems design and implementation, Berkeley, CA, USA, 2008, pp 1–14

    Google Scholar 

  13. Resnick P, Zeckhauser R, Friedman E, Kuwabara K (2000) Reputation systems. Commun ACM 43(12):45–48

    Article  Google Scholar 

  14. Ruohomaa S, Kutvonen L, Koutrouli E (2007) Reputation management survey. In: ARES ’07: proceedings of the second international conference on availability, reliability and security, Washington, DC, USA, 2007. IEEE Comput. Soc., Los Alamitos, pp 103–111

    Chapter  Google Scholar 

  15. Selcuk AA, Uzun E, Pariente MR (2008) A reputation-based trust management system for p2p networks. Int J Netw Secur 6(3):235–245

    Google Scholar 

  16. Song S, Hwang K, Zhou R, Kwok Y-K (2005) Trusted p2p transactions with fuzzy reputation aggregation. IEEE Internet Comput 9(6):24–34

    Article  Google Scholar 

  17. Microsoft TechNet. “split horizon” and “split horizon with Poisson reverse”. Convergence in RIP Internetworks

  18. Sun YL, Han Z, Yu W, Liu KJR (2006) A trust evaluation framework in distributed networks: Vulnerability analysis and defense against attacks. In: Proceedings of INFOCOM 2006. 25th IEEE international conference on computer communications, Barcelona, April 2006, pp 1–13

    Chapter  Google Scholar 

  19. Walsh K, Sirer EG (2006) Experience with an object reputation system for peer-to-peer filesharing. In: NSDI’06: proceedings of the 3rd conference on 3rd symposium on networked systems design, Berkeley, CA, USA, 2006, p 1

    Google Scholar 

  20. Wang Y, Vassileva J (2007) A review on trust and reputation for web service selection. In: 27th International conference on distributed computing systems workshops. ICDCSW ’07, Los Alamitos, CA, USA, June 25–29, 2007, p 25

    Chapter  Google Scholar 

  21. Wilensky U (1999) Netlogo

  22. Yao D, Tamassia R, Proctor S (2007) Private distributed scalar product protocol with application to privacy-preserving computation of trust. In: Proceedings of IFIPTM-joint iTrust and PST conferences on privacy, trust management and security, Moncton, New Brunswick, Canada, Jul 2007

    Google Scholar 

  23. Yu B, Singh MP (2000) A social mechanism of reputation management in electronic communities. In: Proceedings of fourth international workshop on cooperative information agents, pp 154–165

    Google Scholar 

  24. Yu B, Singh MP, Sycara K (2004) Developing trust in large-scale peer-to-peer systems. In: IEEE first symposium on multi-agent security and survivability, Aug 2004, pp 1–10

    Google Scholar 

  25. Zhang Q, Yu T (2008) On the modeling of honest players in reputation systems. In: 28th international conference on distributed computing systems workshops. ICDCS ’08, Beijing, China, June 17–20, 2008, pp 249–254

    Chapter  Google Scholar 

  26. Zhao H, Li X (2008) H-trust: a robust and lightweight group reputation system for peer-to-peer desktop grid. In: 28th international conference on distributed computing systems workshops. ICDCS ’08, Beijing, China, June 17–20, 2008, pp 235–240

    Chapter  Google Scholar 

  27. Zhao H, Li X (2009) H-trust: a robust and lightweight group reputation system for peer-to-peer desktop grid. J Comput Sci Technol 24(5):833–843

    Article  Google Scholar 

  28. Zhao H, Li X (2009) VectorTrust: Trust vector aggregation scheme for trust management in peer-to-peer networks. In: The 18th IEEE international conference on computer communications and networks (ICCCN 2009), San Francisco, CA, USA, Aug 2–6, 2009

    Google Scholar 

  29. Zhou R, Hwang K (2007) Powertrust: a robust and scalable reputation system for trusted peer-to-peer computing. IEEE Trans Parallel Distrib Syst 18(4):460–473

    Article  Google Scholar 

  30. Zhou R, Hwang K, Cai M (2008) Gossiptrust for fast reputation aggregation in peer-to-peer networks. IEEE Trans Knowl Data Eng 20(9):1282–1295

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Xiaolin Li.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Zhao, H., Li, X. VectorTrust: trust vector aggregation scheme for trust management in peer-to-peer networks. J Supercomput 64, 805–829 (2013). https://doi.org/10.1007/s11227-011-0576-6

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11227-011-0576-6

Keywords

Navigation