The Community for Technology Leaders
RSS Icon
Subscribe
Issue No.10 - Oct. (2012 vol.23)
pp: 1944-1957
Xiaoyong Li , Beijing University of Posts and Telecommunications, Beijing
Feng Zhou , Beijing University of Posts and Telecommunications, Beijing
Xudong Yang , Beijing University of Posts and Telecommunications, Beijing
ABSTRACT
In Peer-to-Peer (P2P) trust management, feedback provides an efficient and effective way to build a reputation-based trust relationship among peers. There is no doubt that the scalability of a feedback aggregating overlay is the most fundamental requirement for large-scale P2P computing. However, most previous works either paid little attention to the scalability of feedback aggregating overlay or relied on the flooding-based strategy to collect feedback, which greatly affects the system scalability. In this paper, we proposed a scalable feedback aggregating (SFA) overlay for large-scale P2P trust evaluation. First, the local trust rating method is defined based on the time attenuation function, which can satisfy the two dynamic properties of trust. The SFA overlay is then proposed from a scalable perspective. Not only can the SFA overlay strengthen the scalability of the feedback aggregation mechanism for large-scale P2P applications, but it can also reduce networking risk and improve system efficiency. More importantly, based on the SFA overlay, an adaptive trustworthiness computing method can be defined. This method surpasses the limitations of traditional weighting methods for trust factors, in which weights are assigned subjectively. Finally, the authors design the key techniques and security mechanism to be simple in implementation for the easy incorporation of the mechanism into the existing P2P overlay network. Through theoretical and experimental analysis, the SFA-based trust model shows remarkable enhancement in scalability for large-scale P2P computing, as well as has greater adaptability and accuracy in handling various dynamic behaviors of peers.
INDEX TERMS
Peer to peer computing, Nickel, Scalability, Attenuation, Adaptation models, Computational modeling, Probabilistic logic, adaptability, Large-scale P2P computing, trust management, feedback aggregating overlay, scalability
CITATION
Xiaoyong Li, Feng Zhou, Xudong Yang, "Scalable Feedback Aggregating (SFA) Overlay for Large-Scale P2P Trust Management", IEEE Transactions on Parallel & Distributed Systems, vol.23, no. 10, pp. 1944-1957, Oct. 2012, doi:10.1109/TPDS.2012.26
REFERENCES
[1] H. Li and M. Singhal, "Trust Management in Distributed Systems," Computer, vol. 40, no. 2, pp. 45-53, 2007.
[2] X. Li and X. Gui, "Research on Dynamic Trust Model in Large-Scale Distributed Environment," J. Software, vol. 18, no. 6, pp. 1510-1521, 2007.
[3] F. Cornelli, E. Damiani, S.D.C. di Vimercati, S. Paraboschi, and P. Samarati, "Choosing Reputable Servents in a P2P Network," Proc. 11th Int'l World Wide Web Conf., pp. 376-386, 2002.
[4] E. Damiani, S.D.C. di Vimercati, S. Paraboschi, and P. Samarati, "Managing and Sharing Servants' Reputations in P2P Systems," IEEE Trans. Knowledge and Data Eng., vol. 15, no. 4, pp. 840-854, July/Aug. 2003.
[5] E. Damiani, S.D.C. di Vimercati, S. Paraboschi, P. Samarati, and F. Violante, "A Reputation-Based Approach for Choosing Reliable Resources in Peer-to-Peer Networks," Proc. Ninth ACM Conf. Computer and Comm. Security, pp. 207-216, 2002.
[6] R. Aringhieri, E. Damiani, S.D.C. di Vimercati, S. Paraboschi, and P. Samarati, "Fuzzy Techniques for Trust and Reputation Management in Anonymous Peer-to-Peer Systems," J. Am. Soc. for Information Science and Technology, vol. 57, no. 4, pp. 528-537, 2006.
[7] E. Damiani, S.D.C. di Vimercati, P. Samarati, and M. Viviani, "A WOWA-Based Aggregation Technique on Trust Values Connected to Metadata," Electronic Notes in Theoretical Computer Science, vol. 157, no. 3, pp. 131-142, 2006.
[8] L. Xiong and L. Liu, "Peer-Trust: Supporting Reputation-Based Trust in Peer-to-Peer Communities," IEEE Trans Data and Knowledge Eng., vol. 16, no. 7, pp. 843-857, July 2004.
[9] Z. Liang and W. Shi, "TRECON: A Trust-Based Economic Framework for Efficient Internet Routing," IEEE Trans. Systems, Man, and Cybernetics, Part A: Systems and Humans, vol. 40, no. 1, pp. 52-67, Jan. 2010.
[10] Z. Liang and W. Shi, "Enforcing Cooperative Resource Sharing in Untrusted Peer-to-Peer Environments," J. Mobile Networks and Applications, vol. 10, no. 6, pp. 771-783, 2005.
[11] B. Yu, M.P. Singh, and K. Sycara, "Developing Trust in Large-Scale Peer-to-Peer Systems," Proc. IEEE First Symp. Multi-Peer Security and Survivability, pp. 1-10, 2004.
[12] A.A. Selcuk, E. Uzun, and M.R. Pariente, "A Reputation-Based Trust Management System for P2P Networks," Int'l J. Network Security, vol. 6, no. 2, pp. 227-237, 2008.
[13] P. Dewan and P. Dasgupta, "P2P Reputation Management Using Distributed Identities and Decentralized Recommendation Chains," IEEE Trans. Knowledge and Data Eng., vol. 22, no. 7, pp. 1000-1013, July 2010.
[14] R. Zhou and K. Hwang, "Power-Trust: A Robust and Scalable Reputation System for Trusted Peer-to-Peer Computing," IEEE Trans. Parallel and Distributed Systems, vol. 18, no. 5, pp. 460-473, Apr. 2007.
[15] R. Zhou, K. Hwang, and M. Cai, "GossipTrust for Fast Reputation Aggregation in Peer-to-Peer Networks," IEEE Trans. Knowledge and Data Eng., vol. 20, no. 9, pp.1282-1295, Sept. 2008.
[16] M. Ripeanu, I. oster, and A. Iamnitchi, "Mapping the Gnutell Network: Properties of Large-Scale P2P Systems and Implications for System Design," IEEE Internet Computing, vol. 6, no. 1, pp. 50-57, Sept. 2002.
[17] S. Saroiu, K.P. Gummadi, R.J. Dunn, S.D. Gribble, and H.M. Levy, "An Analysis of Internet Content Delivery Systems," Proc. Fifth Symp. Operating Systems Design and Implementation (OSDI '02), pp. 86-90, 2002.
[18] L. Liu and W. Shi, "Trust and Reputation Management," IEEE Internet Computing, vol. 14, no. 5, pp. 10-13, Sept./Oct. 2010.
[19] S. Song, K. Hwang, R. Zhou, and Y.K. Kwok, "Trusted P2P Transactions with Fuzzy Reputation Aggregation," IEEE Internet Computing, vol. 9, no. 6, pp. 24-34, Nov./Dec. 2005.
[20] X. Li, F. Zhou, and X. Yang, "Developing Dynamic P2P Trust Model Using Theory of Entropy-Based Multi-Source Information Fusion," Int'l J. Innovative Computing, Information and Control, vol. 7, no. 2, pp. 777-790, 2011.
[21] X. Li, F. Zhou, and X. Yang, "A Multi-Dimensional Trust Evaluating Model for Large-Scale P2P Computing," J. Parallel and Distributed Computing, vol. 71, no. 6, pp. 837-847, 2011.
[22] X. Li and X. Gui, "A Comprehensive and Adaptive Trust Model for Large-Scale P2P Networks," J. Computer Science and Technology, vol. 24, no. 5, pp.868-882, 2009.
[23] The Gnutella Protocol v0.4 (Revision1.2), http://www.clip2.comGnutellaProtocol04.pdf , 2001.
[24] W. Keller, Statistics for Management and Economics, eight ed. South-Western College Pub, 2008.
[25] F. Liu, Y. Chen, K. Dai, Z. Wang, and Z. Cai, "Research on Risk Probability Estimating Using Fuzzy Clustering for Dynamic Security Assessment," Proc. 10th Int'l Conf. Rough Sets, Fuzzy Sets, Data Mining, and Granular Computing, vol. 3642/2005, pp. 539-547, 2005.
[26] H. Osman and H. Taylor, "Identity Support in a Security and Trust Service for Ad Hoc M-Commerce Trading Systems," Proc. Int'l Conf. Advanced Information Networking and Applications, pp. 285-290, 2011.
[27] J. Callas et al., OpenPGP Specification, IETF RFC 4880, 2007.
[28] Z. Liang and W. Shi, "Analysis of Recommendations on Trust Inference in Open Environment," Performance Evaluation, vol. 65, no. 2, pp. 99-128, 2008.
[29] S. Tisue, NetLogo, http:/ccl.northwestern.edu, 2012.
[30] F.D. Rango, "Trust-Based SAODV Protocol with Intrusion Detection, Trust Management and Incentive Cooperation in MANETs," Int'l J. Interdisciplinary Telecomm. and Networking, vol. 1, no. 4, pp. 54-70, 2009.
25 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool