Skip to main content
Erschienen in: Peer-to-Peer Networking and Applications 4/2014

01.12.2014

A D-S evidence theory based fuzzy trust model in file-sharing P2P networks

verfasst von: Chunqi Tian, Baijian Yang

Erschienen in: Peer-to-Peer Networking and Applications | Ausgabe 4/2014

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

In this paper we propose an advanced Dempster-Shafer (D-S) Evidence Theory based Fuzzy Trust model (ETFT) for Peer-to-Peer (P2P) networks. The primary goal of ETFT is to be able to address trust information uncertainty and fuzzy trust inference to deal with inconsistent or conflicting recommendation problems in a reputation based P2P environment. The D-S theory is therefore introduced to our trust model. To make the D-S theory fit into P2P systems, we creatively revise the combination rules and achieve greatly improved results. To further improve the accuracy and performance, ETFT filters out noisy referrals before combining the evidences. From the theoretical analyses and experimental results, it is evident that the proposed ETFT has a clear advantage in modeling dynamic trust relationship and aggregating recommendation information. Results also demonstrate that ETFT is more robust and can generate higher successful transaction rate than most existing frameworks.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Liu Y (2008) A two-hop solution to solving topology mismatch. IEEE Transactions on Parallel and Distributed Systems 19(11):1591–1600CrossRef Liu Y (2008) A two-hop solution to solving topology mismatch. IEEE Transactions on Parallel and Distributed Systems 19(11):1591–1600CrossRef
2.
Zurück zum Zitat Song S, Hwang K, Kwok YK (2006) Risk-resilient heuristics and genetic algorithms for security-assured grid job scheduling. IEEE Trans. on Computers 55(6):703–719 Song S, Hwang K, Kwok YK (2006) Risk-resilient heuristics and genetic algorithms for security-assured grid job scheduling. IEEE Trans. on Computers 55(6):703–719
3.
Zurück zum Zitat Terpstra W, Kangasharju J, Leng C, Buchmann A (2007) BubbleStorm: resilient, probabilistic, and exhaustive peer-to-peer search. Proceedings of ACM SIGCOMM Terpstra W, Kangasharju J, Leng C, Buchmann A (2007) BubbleStorm: resilient, probabilistic, and exhaustive peer-to-peer search. Proceedings of ACM SIGCOMM
4.
Zurück zum Zitat Zhou R, Hwang K (2007) PowerTrust: a robust and scalable reputation system for trusted P2P computing. IEEE Transaction on Parallel and Distributed Systems, pp 460–473, April 2007 Zhou R, Hwang K (2007) PowerTrust: a robust and scalable reputation system for trusted P2P computing. IEEE Transaction on Parallel and Distributed Systems, pp 460–473, April 2007
5.
Zurück zum Zitat Damiani E, Vimercati DC, Paraboschi S, Samarati P (2002) A reputation-based approach for choosing reliable resources in peer-to-peer networks. Proceedings of the 9th ACM conference on Computer and communications security, ACM Press, pp 207–216 Damiani E, Vimercati DC, Paraboschi S, Samarati P (2002) A reputation-based approach for choosing reliable resources in peer-to-peer networks. Proceedings of the 9th ACM conference on Computer and communications security, ACM Press, pp 207–216
6.
Zurück zum Zitat Cornelli F, Damiani E, Vimercati DC (2002) Choosing reputable servents in a P2P network. Proceedings of the 11th International Conference on World Wide Web (WWW’02), Hawaii, USA, 441~449 Cornelli F, Damiani E, Vimercati DC (2002) Choosing reputable servents in a P2P network. Proceedings of the 11th International Conference on World Wide Web (WWW’02), Hawaii, USA, 441~449
7.
Zurück zum Zitat Kamvar S, Schlosser M (2003) The EigenTrust Algorithm for Reputation Management in P2P Networks. Proceedings of the 12th International Conference on World Wide Web (WWW’03), Budapest, Hungary, pp 123–134 Kamvar S, Schlosser M (2003) The EigenTrust Algorithm for Reputation Management in P2P Networks. Proceedings of the 12th International Conference on World Wide Web (WWW’03), Budapest, Hungary, pp 123–134
8.
Zurück zum Zitat Song SS, Hwang K, Zhou RF (2005) Trusted P2P transactions with fuzzy reputation aggregation. IEEE Internet Computing 9(6):18–28 Song SS, Hwang K, Zhou RF (2005) Trusted P2P transactions with fuzzy reputation aggregation. IEEE Internet Computing 9(6):18–28
9.
Zurück zum Zitat Xiong L, Liu L (2004) PeerTrust: supporting reputation-based trust for peer-to-peer electronic communities. IEEE Transactions on Knowledge and Data Engineering 16(7):843–857CrossRef Xiong L, Liu L (2004) PeerTrust: supporting reputation-based trust for peer-to-peer electronic communities. IEEE Transactions on Knowledge and Data Engineering 16(7):843–857CrossRef
10.
Zurück zum Zitat Yu B, Singh MP (2003) Detecting deception in reputation management. Proceedings of ACM International Conference Autonomous Agents and Multi-Agent Systems (AAMAS’02), pages 73–80 Yu B, Singh MP (2003) Detecting deception in reputation management. Proceedings of ACM International Conference Autonomous Agents and Multi-Agent Systems (AAMAS’02), pages 73–80
11.
Zurück zum Zitat Yu B, Singh MP, Sycara K (2004) Developing trust in large-scale peer-to-peer systems. IEEE International Conference Yu B, Singh MP, Sycara K (2004) Developing trust in large-scale peer-to-peer systems. IEEE International Conference
12.
Zurück zum Zitat Tian C-Q, Zou S-H, Chu L-W, Cheng S-D (2008) A new trust framework based on reputation for unstructured P2P networks. Proceedings of International Performance Computing and Communications Conference (IPCCC2008). IEEE Computer Society, Texas Tian C-Q, Zou S-H, Chu L-W, Cheng S-D (2008) A new trust framework based on reputation for unstructured P2P networks. Proceedings of International Performance Computing and Communications Conference (IPCCC2008). IEEE Computer Society, Texas
13.
Zurück zum Zitat Zhang YC, Chen SS, Yang G (2009) SFTrust: a double trust metric based trust model in unstructured P2P system. in: Proceedings of the 23rd IEEE International Parallel & Distributed Processing Symposium. IPDPS, Rome Zhang YC, Chen SS, Yang G (2009) SFTrust: a double trust metric based trust model in unstructured P2P system. in: Proceedings of the 23rd IEEE International Parallel & Distributed Processing Symposium. IPDPS, Rome
14.
Zurück zum Zitat Tian C-Q, Zou S-H, Cheng S-D, Wang W-D (2006) An advanced D-S evidence theory based security mechanism for P2P networks. IEEE International Conference on Formal Aspects on Security and Trust, LNCS 4691. Springer Press, Canada, pp 270–284 Tian C-Q, Zou S-H, Cheng S-D, Wang W-D (2006) An advanced D-S evidence theory based security mechanism for P2P networks. IEEE International Conference on Formal Aspects on Security and Trust, LNCS 4691. Springer Press, Canada, pp 270–284
15.
Zurück zum Zitat Wang Y, Vassileva J (2003) Trust and reputation model in peer-to-peer networks. Proceedings of the 3th International Conference on Peer-to-Peer Computing (P2P'03), Washington, DC, USA, pp 150–157 Wang Y, Vassileva J (2003) Trust and reputation model in peer-to-peer networks. Proceedings of the 3th International Conference on Peer-to-Peer Computing (P2P'03), Washington, DC, USA, pp 150–157
16.
Zurück zum Zitat Walsh K, Sirer E (2006) Experience with an object reputation system for peer-to-peer file-sharing. NSDI’ Symposium on Networked Systems Design & Implementation, San Jose, May 8–10, 2006 Walsh K, Sirer E (2006) Experience with an object reputation system for peer-to-peer file-sharing. NSDI’ Symposium on Networked Systems Design & Implementation, San Jose, May 8–10, 2006
17.
Zurück zum Zitat Zhang Y, Fang Y (2007) A fine-grained reputation system for reliable service selection in peer-to-peer networks. IEEE Transactions on Parallel and Distributed Systems 18(8):1134–1145CrossRef Zhang Y, Fang Y (2007) A fine-grained reputation system for reliable service selection in peer-to-peer networks. IEEE Transactions on Parallel and Distributed Systems 18(8):1134–1145CrossRef
18.
Zurück zum Zitat Wang YF, Nakao A (2010) Poisonedwater: an improved approach for accurate reputation ranking in P2P networks. Future Generation Computer System 26(8) Wang YF, Nakao A (2010) Poisonedwater: an improved approach for accurate reputation ranking in P2P networks. Future Generation Computer System 26(8)
19.
Zurück zum Zitat Wang M, Tao F, Zhang Y, Li G (2010) An adaptive and robust reputation mechanism for P2P network. in: Proceedings of the IEEE International Conference on Communications, Cape Town, South Africa Wang M, Tao F, Zhang Y, Li G (2010) An adaptive and robust reputation mechanism for P2P network. in: Proceedings of the IEEE International Conference on Communications, Cape Town, South Africa
20.
Zurück zum Zitat Buchegger S, Boudec JY (2004) Robust reputation system for P2P and mobile ad-hoc networks. In Second Workshop on Economics of Peer-to-Peer Systems, June 2004 Buchegger S, Boudec JY (2004) Robust reputation system for P2P and mobile ad-hoc networks. In Second Workshop on Economics of Peer-to-Peer Systems, June 2004
21.
Zurück zum Zitat Jamali M, Ester M (2009) Trustwalker: a random walk model for combining trust based and item-based recommendation, in: Proceedings of the 15th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, New York, USA Jamali M, Ester M (2009) Trustwalker: a random walk model for combining trust based and item-based recommendation, in: Proceedings of the 15th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, New York, USA
22.
Zurück zum Zitat Dempster AP (1967) Upper and lower probabilities induced by a multi—valued mapping[J]. Ann Mathematical Statistics Dempster AP (1967) Upper and lower probabilities induced by a multi—valued mapping[J]. Ann Mathematical Statistics
23.
Zurück zum Zitat Shafer G (1976) A mathematical theory of evidence. Princeton University Press, Princeton, pp 10–28MATH Shafer G (1976) A mathematical theory of evidence. Princeton University Press, Princeton, pp 10–28MATH
24.
25.
Zurück zum Zitat Sun Q, Ye XQ, Gu WK (2000) A new composition method for evidence theory. Chin J Electron 28(8):117–119 Sun Q, Ye XQ, Gu WK (2000) A new composition method for evidence theory. Chin J Electron 28(8):117–119
27.
Zurück zum Zitat Schlosser M, Condie T, Kamvar S (2003) Simulating a file-sharing P2P network. Proceedings of the First Workshop on Semantics in P2P and Grid Computing, California, USA, pp 113~121 Schlosser M, Condie T, Kamvar S (2003) Simulating a file-sharing P2P network. Proceedings of the First Workshop on Semantics in P2P and Grid Computing, California, USA, pp 113~121
Metadaten
Titel
A D-S evidence theory based fuzzy trust model in file-sharing P2P networks
verfasst von
Chunqi Tian
Baijian Yang
Publikationsdatum
01.12.2014
Verlag
Springer US
Erschienen in
Peer-to-Peer Networking and Applications / Ausgabe 4/2014
Print ISSN: 1936-6442
Elektronische ISSN: 1936-6450
DOI
https://doi.org/10.1007/s12083-012-0153-7

Weitere Artikel der Ausgabe 4/2014

Peer-to-Peer Networking and Applications 4/2014 Zur Ausgabe

Premium Partner