Abstract
In a heterogeneous ubiquitous peer-to-peer network, different peers may provide different qualities of service, and hence it is very important and helpful to identify those peers that can provide better services than others. In this paper, we use a reputation value to represent the quality of service offered by a peer. We design a novel reputation model which enables any peer to calculate the reputation value of any other peer, so as to differentiate peers that provide good quality of service from peers that provide poor or even faulty service. In order to speed up the convergence of reputation calculation, a peer collects recommendations from its neighbor peers. On the other hand, in order to overcome the problem of malicious recommendations, we propose an auxiliary trust mechanism which calculates a trust value for each peer. Our experimental results show that the reputation model achieves a fast convergence speed, and it is robust against a large portion of malicious peers that provide fraud recommendations.
Similar content being viewed by others
References
Huang, Y., Fu, T. Z., Chiu, Dr., Lui, J. C., & Huang, C. (2008). Challenges, design and analysis of a large-scale P2P-vod system. In Proceedings of the ACM SIGCOMM 2008 conference on data communication, Seattle, WA, USA, August 17–22, 2008 (pp. 375–388).
Meeker, M., & Joseph, D. (2006). State of the Internet—Web 2.0. In Web 2.0 conference, San Francisco, USA.
Jøsang, A., Ismail, R., & Boyd, C. (2007). A survey of trust and reputation systems for online service provision. Decision Support Systems, 43(2), 618–644.
Kamvar, S. D., Schlosser, M. T., & Garcia-Molina, H. (2003). The EigenTrust algorithm for reputation management in P2P networks. In Proceedings of the twelfth international world wide web conference, Budapest, Hungary.
Cornelli, F., Damiani, E., & De Capitani, S. (2002). Choosing reputable servents in a P2P network. In Proceedings of the 11th world wide web conference, Hawaii, USA.
Walsh, K., & Sirer, E. G. (2005). Fighting peer-to-peer SPAM and decoys with object reputation. In Applications, technologies, architectures, and protocols for computer communication (pp. 138–143).
Lee, S., & Sherwood, R. (2003). Cooperative peer groups in NICE. In Proceedings of IEEE Infocom 2003, San Francisco, USA.
Xiong, L., & Liu, L. (2003). A reputation-based trust model for peer-to-peer ecommerce communities. In IEEE international conference on E-commerce (CEC’03), Newport Beach, CA, USA.
Feng, Q., & Dai, Y. (2006). LIP: A lifetime and popularity based ranking approach to filter out fake files in P2P file sharing systems. Beijing: Peking University.
Aberer, K., & Despotovic, Z. (2001). Managing trust in a peer-2-peer information system. In The 10th international conference on information and knowledge management (CIKM), Atlanta, USA.
Zhou, R., & Hwang, K. (2007). PowerTrust: A robust and scalable reputation system for trusted peer-to-peer computing. IEEE Transactions on Parallel and Distributed Systems, 18(4), 460–473.
Adar, E. (2000). Free riding on Gnutella. http://www.hpl.hp.com/research/idl/papers/gnutella/gnutella.pdf. Accessed 28 Jun 2008.
Feng, Q.-Y., & Dai, Y.-F. (2007). P2P network trust mechanism review. Communication of CCF, 3, 31–40.
Zhou, L., Zhang, L., McSherry, F., Immorlica, N., Costa, M., & Chien, S. (2005). A first look at peer-to-peer worms: Threats and defenses. In Proceedings of 4th international workshop on peer-to-peer systems, IPTPS 2005, Ithaca, NY, USA.
Christin, N., Weigend, A. S., & Chuang, J. (2005). Content availability, pollution and poisoning in file sharing peer-to-peer networks. In Proceedings of the 6th ACM conference on electronic commerce (EC’05), Vancouver, Canada (pp. 68–77).
Liang, J., Naoumov, N., & Ross, K. W. (2006). The index poisoning attack in P2P file-sharing systems. In Proceedings of IEEE Infocom 2006, Barcelona, Spain.
Wilson, R. (1985). Reputation in games and markets. In A. Roth (Ed.), Game-theoretic models of bargaining (pp. 65–84). New York: Cambridge University Press.
Khambatti, M., Dasgupta, P., & Ryu, K. D. (2004). A role-based trust model for peer-to-peer communities and dynamic coalitions. In Information assurance workshop, 2004. Proceedings. Second IEEE international (pp. 141–154).
Lamport, L., Shostak, R., & Pease, M. (1982). The byzantine generals problem. ACM Transactions on Programming Languages and Systems, 4(3), 382–401.
Pease, M., Shostak, R., & Lamport, L. (1980). Reaching agreement in the presence of faults. Journal of the Association for Computing Machinery, 27, 228–234.
Wang, Y., & Varadharajan., V. (2005). Trust2: developing trust in peer-to-peer environments. In 2005 IEEE international conference on services computing (SCC’05) (Vol. 1, pp. 24–34).
Peng, D., Lin, C., & Liu, W. (2008). A distributed trust mechanism directly evaluating reputation of nodes. Journal of Software, 19(4), 946–955.
Nowak, A., & Sigmund, K. (1998). Evolution of indirect reciprocity by image scoring. Nature, 393, 573–577.
Ge, Z., Figueiredo, D. R., Jaiswal, S., Kurose, J., & Towsley, D. (2003). Modeling peer-peer file sharing system. In Proceedings of the IEEE Infocom 2003 (pp. 2188–2198).
Li, W., Xie, D., & Wu, Y. (2008). History and recommendation-based trust model in P2P environment. Application Research of Computers, 25(3), 915–919.
Dou, W., Wand, H., Jia, Y., & Zou, P. (2004). A recommendation-based peer-to-peer trust model. Journal of Software, 15(04), 571–583.
Guha, R., Kumar, R., Raghavan, P., & Tomkin, A. (2004). Propagation of trust and distrust. In Proceedings of the 13th international conference on world wide web (pp. 403–412). New York: ACM Press.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Chu, X., Chen, X., Zhao, K. et al. Reputation and trust management in heterogeneous peer-to-peer networks. Telecommun Syst 44, 191–203 (2010). https://doi.org/10.1007/s11235-009-9259-5
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11235-009-9259-5