Skip to main content
Log in

A D-S evidence theory based fuzzy trust model in file-sharing P2P networks

  • Published:
Peer-to-Peer Networking and Applications Aims and scope Submit manuscript

Abstract

In this paper we propose an advanced Dempster-Shafer (D-S) Evidence Theory based Fuzzy Trust model (ETFT) for Peer-to-Peer (P2P) networks. The primary goal of ETFT is to be able to address trust information uncertainty and fuzzy trust inference to deal with inconsistent or conflicting recommendation problems in a reputation based P2P environment. The D-S theory is therefore introduced to our trust model. To make the D-S theory fit into P2P systems, we creatively revise the combination rules and achieve greatly improved results. To further improve the accuracy and performance, ETFT filters out noisy referrals before combining the evidences. From the theoretical analyses and experimental results, it is evident that the proposed ETFT has a clear advantage in modeling dynamic trust relationship and aggregating recommendation information. Results also demonstrate that ETFT is more robust and can generate higher successful transaction rate than most existing frameworks.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8

Similar content being viewed by others

References

  1. Liu Y (2008) A two-hop solution to solving topology mismatch. IEEE Transactions on Parallel and Distributed Systems 19(11):1591–1600

    Article  Google Scholar 

  2. Song S, Hwang K, Kwok YK (2006) Risk-resilient heuristics and genetic algorithms for security-assured grid job scheduling. IEEE Trans. on Computers 55(6):703–719

    Google Scholar 

  3. Terpstra W, Kangasharju J, Leng C, Buchmann A (2007) BubbleStorm: resilient, probabilistic, and exhaustive peer-to-peer search. Proceedings of ACM SIGCOMM

  4. Zhou R, Hwang K (2007) PowerTrust: a robust and scalable reputation system for trusted P2P computing. IEEE Transaction on Parallel and Distributed Systems, pp 460–473, April 2007

  5. Damiani E, Vimercati DC, Paraboschi S, Samarati P (2002) A reputation-based approach for choosing reliable resources in peer-to-peer networks. Proceedings of the 9th ACM conference on Computer and communications security, ACM Press, pp 207–216

  6. Cornelli F, Damiani E, Vimercati DC (2002) Choosing reputable servents in a P2P network. Proceedings of the 11th International Conference on World Wide Web (WWW’02), Hawaii, USA, 441~449

  7. Kamvar S, Schlosser M (2003) The EigenTrust Algorithm for Reputation Management in P2P Networks. Proceedings of the 12th International Conference on World Wide Web (WWW’03), Budapest, Hungary, pp 123–134

  8. Song SS, Hwang K, Zhou RF (2005) Trusted P2P transactions with fuzzy reputation aggregation. IEEE Internet Computing 9(6):18–28

    Google Scholar 

  9. Xiong L, Liu L (2004) PeerTrust: supporting reputation-based trust for peer-to-peer electronic communities. IEEE Transactions on Knowledge and Data Engineering 16(7):843–857

    Article  Google Scholar 

  10. Yu B, Singh MP (2003) Detecting deception in reputation management. Proceedings of ACM International Conference Autonomous Agents and Multi-Agent Systems (AAMAS’02), pages 73–80

  11. Yu B, Singh MP, Sycara K (2004) Developing trust in large-scale peer-to-peer systems. IEEE International Conference

  12. Tian C-Q, Zou S-H, Chu L-W, Cheng S-D (2008) A new trust framework based on reputation for unstructured P2P networks. Proceedings of International Performance Computing and Communications Conference (IPCCC2008). IEEE Computer Society, Texas

    Google Scholar 

  13. Zhang YC, Chen SS, Yang G (2009) SFTrust: a double trust metric based trust model in unstructured P2P system. in: Proceedings of the 23rd IEEE International Parallel & Distributed Processing Symposium. IPDPS, Rome

    Google Scholar 

  14. Tian C-Q, Zou S-H, Cheng S-D, Wang W-D (2006) An advanced D-S evidence theory based security mechanism for P2P networks. IEEE International Conference on Formal Aspects on Security and Trust, LNCS 4691. Springer Press, Canada, pp 270–284

    Google Scholar 

  15. Wang Y, Vassileva J (2003) Trust and reputation model in peer-to-peer networks. Proceedings of the 3th International Conference on Peer-to-Peer Computing (P2P'03), Washington, DC, USA, pp 150–157

  16. Walsh K, Sirer E (2006) Experience with an object reputation system for peer-to-peer file-sharing. NSDI’ Symposium on Networked Systems Design & Implementation, San Jose, May 8–10, 2006

  17. Zhang Y, Fang Y (2007) A fine-grained reputation system for reliable service selection in peer-to-peer networks. IEEE Transactions on Parallel and Distributed Systems 18(8):1134–1145

    Article  Google Scholar 

  18. Wang YF, Nakao A (2010) Poisonedwater: an improved approach for accurate reputation ranking in P2P networks. Future Generation Computer System 26(8)

  19. Wang M, Tao F, Zhang Y, Li G (2010) An adaptive and robust reputation mechanism for P2P network. in: Proceedings of the IEEE International Conference on Communications, Cape Town, South Africa

  20. Buchegger S, Boudec JY (2004) Robust reputation system for P2P and mobile ad-hoc networks. In Second Workshop on Economics of Peer-to-Peer Systems, June 2004

  21. Jamali M, Ester M (2009) Trustwalker: a random walk model for combining trust based and item-based recommendation, in: Proceedings of the 15th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, New York, USA

  22. Dempster AP (1967) Upper and lower probabilities induced by a multi—valued mapping[J]. Ann Mathematical Statistics

  23. Shafer G (1976) A mathematical theory of evidence. Princeton University Press, Princeton, pp 10–28

    MATH  Google Scholar 

  24. Yager RR (1989) On the Dempster-Shafer framework and new combination rules. Inf Sci 41(2):93–137

    Article  MathSciNet  Google Scholar 

  25. Sun Q, Ye XQ, Gu WK (2000) A new composition method for evidence theory. Chin J Electron 28(8):117–119

    Google Scholar 

  26. http://p2p.stanford.edu/www/demos.htm

  27. Schlosser M, Condie T, Kamvar S (2003) Simulating a file-sharing P2P network. Proceedings of the First Workshop on Semantics in P2P and Grid Computing, California, USA, pp 113~121

Download references

Acknowledgment

The authors wish to thank Shihong Zou, Shiduan Cheng. This work was supported in part by a grant from the National Natural Science Foundation of China (grant No.60903194), Open Foundation of Key Laboratory of Networking and Switching Technology (BUPT).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Chunqi Tian.

Additional information

This work was supported in part by a grant from the National Natural Science Foundation of China (grant No.60903194), Open Foundation of Key Laboratory of Networking and Switching Technology (BUPT).

Rights and permissions

Reprints and permissions

About this article

Cite this article

Tian, C., Yang, B. A D-S evidence theory based fuzzy trust model in file-sharing P2P networks. Peer-to-Peer Netw. Appl. 7, 332–345 (2014). https://doi.org/10.1007/s12083-012-0153-7

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12083-012-0153-7

Keywords

Navigation