Issue No. 01 - Jan.-Feb. (2013 vol. 10)
DOI Bookmark: http://doi.ieeecomputersociety.org/10.1109/TDSC.2012.74
Ahmet Burak Can , Hacettepe University, Ankara
Bharat Bhargava , Purdue University, West Lafayette
Open nature of peer-to-peer systems exposes them to malicious activity. Building trust relationships among peers can mitigate attacks of malicious peers. This paper presents distributed algorithms that enable a peer to reason about trustworthiness of other peers based on past interactions and recommendations. Peers create their own trust network in their proximity by using local information available and do not try to learn global trust information. Two contexts of trust, service, and recommendation contexts, are defined to measure trustworthiness in providing services and giving recommendations. Interactions and recommendations are evaluated based on importance, recentness, and peer satisfaction parameters. Additionally, recommender's trustworthiness and confidence about a recommendation are considered while evaluating recommendations. Simulation experiments on a file sharing application show that the proposed model can mitigate attacks on 16 different malicious behavior models. In the experiments, good peers were able to form trust relationships in their proximity and isolate malicious peers.
Measurement, Peer to peer computing, Context, History, Computational modeling, Fading, Buildings, security, Peer-to-peer systems, trust management, reputation
A. B. Can and B. Bhargava, "SORT: A Self-ORganizing Trust Model for Peer-to-Peer Systems," in IEEE Transactions on Dependable and Secure Computing, vol. 10, no. , pp. 14-27, 2013.