Skip to main content
Log in

Reputation and trust management in heterogeneous peer-to-peer networks

  • Published:
Telecommunication Systems Aims and scope Submit manuscript

Abstract

In a heterogeneous ubiquitous peer-to-peer network, different peers may provide different qualities of service, and hence it is very important and helpful to identify those peers that can provide better services than others. In this paper, we use a reputation value to represent the quality of service offered by a peer. We design a novel reputation model which enables any peer to calculate the reputation value of any other peer, so as to differentiate peers that provide good quality of service from peers that provide poor or even faulty service. In order to speed up the convergence of reputation calculation, a peer collects recommendations from its neighbor peers. On the other hand, in order to overcome the problem of malicious recommendations, we propose an auxiliary trust mechanism which calculates a trust value for each peer. Our experimental results show that the reputation model achieves a fast convergence speed, and it is robust against a large portion of malicious peers that provide fraud recommendations.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Huang, Y., Fu, T. Z., Chiu, Dr., Lui, J. C., & Huang, C. (2008). Challenges, design and analysis of a large-scale P2P-vod system. In Proceedings of the ACM SIGCOMM 2008 conference on data communication, Seattle, WA, USA, August 17–22, 2008 (pp. 375–388).

  2. Meeker, M., & Joseph, D. (2006). State of the Internet—Web 2.0. In Web 2.0 conference, San Francisco, USA.

  3. Jøsang, A., Ismail, R., & Boyd, C. (2007). A survey of trust and reputation systems for online service provision. Decision Support Systems, 43(2), 618–644.

    Article  Google Scholar 

  4. Kamvar, S. D., Schlosser, M. T., & Garcia-Molina, H. (2003). The EigenTrust algorithm for reputation management in P2P networks. In Proceedings of the twelfth international world wide web conference, Budapest, Hungary.

  5. Cornelli, F., Damiani, E., & De Capitani, S. (2002). Choosing reputable servents in a P2P network. In Proceedings of the 11th world wide web conference, Hawaii, USA.

  6. Walsh, K., & Sirer, E. G. (2005). Fighting peer-to-peer SPAM and decoys with object reputation. In Applications, technologies, architectures, and protocols for computer communication (pp. 138–143).

  7. Lee, S., & Sherwood, R. (2003). Cooperative peer groups in NICE. In Proceedings of IEEE Infocom 2003, San Francisco, USA.

  8. Xiong, L., & Liu, L. (2003). A reputation-based trust model for peer-to-peer ecommerce communities. In IEEE international conference on E-commerce (CEC’03), Newport Beach, CA, USA.

  9. Feng, Q., & Dai, Y. (2006). LIP: A lifetime and popularity based ranking approach to filter out fake files in P2P file sharing systems. Beijing: Peking University.

    Google Scholar 

  10. Aberer, K., & Despotovic, Z. (2001). Managing trust in a peer-2-peer information system. In The 10th international conference on information and knowledge management (CIKM), Atlanta, USA.

  11. Zhou, R., & Hwang, K. (2007). PowerTrust: A robust and scalable reputation system for trusted peer-to-peer computing. IEEE Transactions on Parallel and Distributed Systems, 18(4), 460–473.

    Article  Google Scholar 

  12. Adar, E. (2000). Free riding on Gnutella. http://www.hpl.hp.com/research/idl/papers/gnutella/gnutella.pdf. Accessed 28 Jun 2008.

  13. Feng, Q.-Y., & Dai, Y.-F. (2007). P2P network trust mechanism review. Communication of CCF, 3, 31–40.

    Google Scholar 

  14. Zhou, L., Zhang, L., McSherry, F., Immorlica, N., Costa, M., & Chien, S. (2005). A first look at peer-to-peer worms: Threats and defenses. In Proceedings of 4th international workshop on peer-to-peer systems, IPTPS 2005, Ithaca, NY, USA.

  15. Christin, N., Weigend, A. S., & Chuang, J. (2005). Content availability, pollution and poisoning in file sharing peer-to-peer networks. In Proceedings of the 6th ACM conference on electronic commerce (EC’05), Vancouver, Canada (pp. 68–77).

  16. Liang, J., Naoumov, N., & Ross, K. W. (2006). The index poisoning attack in P2P file-sharing systems. In Proceedings of IEEE Infocom 2006, Barcelona, Spain.

  17. Wilson, R. (1985). Reputation in games and markets. In A. Roth (Ed.), Game-theoretic models of bargaining (pp. 65–84). New York: Cambridge University Press.

    Google Scholar 

  18. Khambatti, M., Dasgupta, P., & Ryu, K. D. (2004). A role-based trust model for peer-to-peer communities and dynamic coalitions. In Information assurance workshop, 2004. Proceedings. Second IEEE international (pp. 141–154).

  19. Lamport, L., Shostak, R., & Pease, M. (1982). The byzantine generals problem. ACM Transactions on Programming Languages and Systems, 4(3), 382–401.

    Article  Google Scholar 

  20. Pease, M., Shostak, R., & Lamport, L. (1980). Reaching agreement in the presence of faults. Journal of the Association for Computing Machinery, 27, 228–234.

    Google Scholar 

  21. Wang, Y., & Varadharajan., V. (2005). Trust2: developing trust in peer-to-peer environments. In 2005 IEEE international conference on services computing (SCC’05) (Vol. 1, pp. 24–34).

  22. Peng, D., Lin, C., & Liu, W. (2008). A distributed trust mechanism directly evaluating reputation of nodes. Journal of Software, 19(4), 946–955.

    Article  Google Scholar 

  23. Nowak, A., & Sigmund, K. (1998). Evolution of indirect reciprocity by image scoring. Nature, 393, 573–577.

    Article  Google Scholar 

  24. Ge, Z., Figueiredo, D. R., Jaiswal, S., Kurose, J., & Towsley, D. (2003). Modeling peer-peer file sharing system. In Proceedings of the IEEE Infocom 2003 (pp. 2188–2198).

  25. Li, W., Xie, D., & Wu, Y. (2008). History and recommendation-based trust model in P2P environment. Application Research of Computers, 25(3), 915–919.

    Google Scholar 

  26. Dou, W., Wand, H., Jia, Y., & Zou, P. (2004). A recommendation-based peer-to-peer trust model. Journal of Software, 15(04), 571–583.

    Google Scholar 

  27. Guha, R., Kumar, R., Raghavan, P., & Tomkin, A. (2004). Propagation of trust and distrust. In Proceedings of the 13th international conference on world wide web (pp. 403–412). New York: ACM Press.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jiangchuan Liu.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Chu, X., Chen, X., Zhao, K. et al. Reputation and trust management in heterogeneous peer-to-peer networks. Telecommun Syst 44, 191–203 (2010). https://doi.org/10.1007/s11235-009-9259-5

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11235-009-9259-5

Keywords

Navigation