Skip to main content
Log in

sureTrust: a super peer-aware trust model for 2-level P2P networks

  • Published:
Peer-to-Peer Networking and Applications Aims and scope Submit manuscript

Abstract

With the growth of P2P applications, more and more trust models have been proposed for curbing malicious behavior, most of which are suitable for pure P2P networks, including the structured P2P networks and the unstructured P2P networks. This paper presents a super peer-aware trust model, sureTrust, for 2-level P2P networks. The super peer of a subnet is responsible for calculating the peers’ trust in its subnet, and the super peer’s trust is correlated with the trust of the peers in its subnet. To discourage peers from behaving maliciously, we allow a peer to establish transactions only with the peers whose trust is similar to that of the peer. Also, a super peer could separate the connections of a peer in its subnet to the outside subnets as the punishment on the peer’s behavior. The simulation results show that the sureTrust model could improve normal peers’ successful download rate and resist different types of attacks.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7

Similar content being viewed by others

References

  1. Sepandar DK, Mario TS, Hector GM (2003) The EigenTrust algorithm for reputation management in P2P networks. In: proc. of the 12th Int’l Conf. On world wide web. Budapest, ACM press, pp 640–651

  2. A. Das, MM. Islam (2011) SecuredTrust: a dynamic trust computation model for secured communication in multiagent systems. IEEE Trans. Dependable and Secure Computing, vol. 2, pp 261–274

  3. Xiong L, Liu L (2004) PeerTrust: supporting reputation-based trust in peer-to-peer communities. IEEE Trans. Data and knowledge engineering. Special Issue on Peer-to-Peer Based Data Management 7:843–857

    Google Scholar 

  4. Su X, Zhang MJ, Mu Y (2010) PBTrust: a priority-based trust model for service selection in general service-oriented environments. In: Proc. of IEEE/IFIP International Conference on Embedded and Ubiquitous Computing

  5. Meng XF, Ding YL, Gong Y (2012) @trust: a trust model based on feedback-arbitration in structured P2P network. Comput Commun 16:2044–2053

    Article  Google Scholar 

  6. Tian CQ, Yang BJ, Zhong JD, Liu XJ (2014) Trust-based incentive mechanism to motivate cooperation in hybrid P2P networks. Comput Netw 73(11):244–255

    Article  Google Scholar 

  7. Lian Q, Zhang Z, Yang M, et al (2007) An empirical study of collusion behavior in the maze P2P file-sharing system. ICDCS 27th International Conference on distributed computing systems, IEEE, Toronto, pp 1–10

  8. Liang J, Kumar R, Ross KW (2006) The fast-track overlay: a measurement study. Comput Netw 50(6):842–858

    Article  Google Scholar 

  9. Tian CQ, Yang BJ (2011) R2Trust, a reputation and risk based trust management framework for large-scale, fully decentralized overlay networks. Future Gener Comput Syst (Elsevier) 27(8):1135–1143

    Article  Google Scholar 

  10. Wang Y, Vassileva J (2003) Trust and reputation model in peer-to-peer networks. In: proceedings of International Conference on peer-to-peer computing (P2P’03), Washington, pp 150–157

  11. Schmidt S, Steele R, Dillon TS, Chang E (2007) Fuzzy trust evaluation and credibility development in multi-agent systems. Appl Soft Comp J 2:492–505

    Article  Google Scholar 

  12. Lin HQ, Li ZT, Huang QF (2011) Multifactor hierarchical fuzzy trust evaluation on peer-to-peer networks. Peer-to-Peer Network Appl 4:376–390

    Article  Google Scholar 

  13. eBay International. http://www.ebay.com/. Accessed 20 Jan 2017

  14. Resnick P, Zeckhauser R (2002) Trust among strangers in internet transactions: empirical analysis of eBay’s reputation system. Econ Internet E-Commerce Advan Appl Microecon 11:127–157

    Article  Google Scholar 

  15. Xue WL, Liu YQ, Li KQ et al (2012) DHTrust: a robust and distributed reputation system for trusted peer-to-peer networks. Concurrency and computation: practice and experience. Special Issue on Advances in Network and System Security 10:1037–1051

    Google Scholar 

  16. Li XY, Zhou F, Yang XD (2011) A multi-dimensional trust evaluation model for large-scale P2P computing. J Parall Distribut Comp 6:837–847

    Article  MATH  Google Scholar 

  17. Jia C, Xie L, Gan XC, Liu WH, Han ZG (2012) A trust and reputation model considering overall peer consulting distribution. IEEE Trans. Systems man and cybernetics part a. Sys Human 1:164–177

    Article  Google Scholar 

  18. Fan X, Li M, Ma J et al (2012) Behavior-based reputation management in P2P file-sharing networks. J Comput Syst Sci 78(6):1737–1750

    Article  MathSciNet  MATH  Google Scholar 

  19. Jia C, Xie L, Gan XC et al (2012) A trust and reputation model considering overall peer consulting distribution. IEEE Trans Sys Man Cyber: Part A-Systems Humans 42(1):164–177

    Article  Google Scholar 

  20. Zhao HY, Li XL (2013) VectorTrust: trust vector aggregation scheme for trust management in peer-to-peer networks. J Supercomput 64(3):805–829

    Article  Google Scholar 

  21. Ren YZ, Li MC, Sakurai K (2011) FineTrust: a fine-grained trust model for peer-to-peer networks. Sec Commun Network 4:61–69

    Article  Google Scholar 

  22. Li X, Zhou F, Yang X (2012) Scalable feedback aggregating (SFA) overlay for large-scale P2P trust management. IEEE Trans Parallel Distribut Sys 23(10):1944–1957

    Article  Google Scholar 

  23. Can AB, Bhargava B (2013) SORT: a self-organizing trust model for peer-to-peer systems. IEEE Trans Depend Secure Comp 10(1):14–27

    Article  Google Scholar 

  24. Lu K, Wang JL, Li MC (2016) An Eigentrust dynamic evolutionary model in P2P file-sharing systems. Peer-to-peer Network Appl 9:599–612

    Article  Google Scholar 

  25. Tutschku K (2004) A measurement-based traffic profile of the eDonkey file sharing service, 5th International workshop. Springer, France, pp 12–21

    Google Scholar 

  26. Huang D, Zhang A, Huang J, Li J (2008) Research on Peer-to-peer network Gnutella 0.6 architecture. Comp Appl Software 25(6):208–210

    Google Scholar 

  27. Jin Y, Liu Y, Zhao HW (2010) Trust-based supernode selection in peer-to-peer systems. ICFCC Future Computer and communication 2010 2nd International Conference on, IEEE, Wuhan, V1-285-V1-289

  28. Luo HF, Deng L (2013) Research on a P2P supper node selection mechanism based on trust model. ICCSE the 8th International Conference on Computer Science & Education, IEEE, Colombo, pp 851–854

  29. Han J, Park D (2003) A lightweight personal grid using a super node network. P2P’03 proceedings of the third International Conference on peer-to-peer computing, IEEE, pp 168–175

  30. Mark J, Alberto M, Gian P, et al. http://peersim.sourceforge.net/. Accessed 16 Jan 2017

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Xianfu Meng.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Meng, X. sureTrust: a super peer-aware trust model for 2-level P2P networks. Peer-to-Peer Netw. Appl. 11, 619–631 (2018). https://doi.org/10.1007/s12083-017-0577-1

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12083-017-0577-1

Keywords

Navigation