Skip to main content
Erschienen in: The Journal of Supercomputing 3/2014

01.09.2014

An incentive compatible reputation mechanism for P2P systems

verfasst von: Junsheng Chang, Zhengbin Pang, Weixia Xu, Huaimin Wang, Gang Yin

Erschienen in: The Journal of Supercomputing | Ausgabe 3/2014

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

In peer-to-peer (P2P) systems, peers often must interact with unknown or unfamiliar peers without the benefit of trusted third parties or authorities to mediate the interactions. Trust management through reputation mechanism to facilitate such interactions is recognized as an important element of P2P systems. It is, however, faced by the problems of how to stimulate reputation information sharing and honest recommendation elicitation. This paper presents an incentive compatible reputation mechanism for P2P systems. It has two unique features: (1) a recommender’s trustworthiness and level of confidence about the recommendation is considered for a more accurate calculation of reputations and fair evaluation of recommendations. (2) Incentive for participation and honest recommendation is implemented through a fair differential service mechanism. It relies on peer’s level of participation and on the recommendation credibility. Theoretic analysis and simulation show that the reputation mechanism we propose can help peers effectively detect dishonest recommendations in a variety of scenarios where more complex malicious strategies are introduced. Moreover, it can also stimulate peers to send sufficiently honest recommendations. The latter is realized by ensuring that active and honest recommenders, compared to inactive or dishonest ones, can elicit the most honest (helpful) recommendations and thus suffer the least number of wrong trust decisions.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Fußnoten
1
\(D\) can have any pre-defined length of time, i.e., a day, a week or a month. In the sequel, we suppose that \(D\) is insensitive to clock drift.
 
Literatur
1.
Zurück zum Zitat Andy O (2001) Peer to peer: harnessing the power of disruptive technologies. ISBN: 0-596-00110-X Andy O (2001) Peer to peer: harnessing the power of disruptive technologies. ISBN: 0-596-00110-X
2.
Zurück zum Zitat Karl A, Zoran D (2001) Managing trust in a peer-to-peer information system. In: The Proceedings of Intl. Conf. on information and knowledge management Karl A, Zoran D (2001) Managing trust in a peer-to-peer information system. In: The Proceedings of Intl. Conf. on information and knowledge management
3.
Zurück zum Zitat Sepandar DK, Mario TS, Hector G-M (2003) The eigentrust algorithm for reputation management in P2P networks. In: The Proceedings of the twelfth international conference on World Wide Web, Budapest, Hungary Sepandar DK, Mario TS, Hector G-M (2003) The eigentrust algorithm for reputation management in P2P networks. In: The Proceedings of the twelfth international conference on World Wide Web, Budapest, Hungary
4.
Zurück zum Zitat Damiani E, De Capitani di Vimercati S, Paraboschi S, Samarati P (2003) Managing and sharing servents’ reputations in p2p systems. IEEE Trans Data Knowl Eng 15(4):840–854 Damiani E, De Capitani di Vimercati S, Paraboschi S, Samarati P (2003) Managing and sharing servents’ reputations in p2p systems. IEEE Trans Data Knowl Eng 15(4):840–854
5.
Zurück zum Zitat Xiong L, Liu L (July 2004) PeerTrust: supporting reputation-based trust in peer-to-peer communities. IEEE Trans Data Knowl Eng Special Issue Peer-to-Peer Based Data Manag 16(6):843–857 Xiong L, Liu L (July 2004) PeerTrust: supporting reputation-based trust in peer-to-peer communities. IEEE Trans Data Knowl Eng Special Issue Peer-to-Peer Based Data Manag 16(6):843–857
6.
Zurück zum Zitat Yu B, Singh MP, Sycara K (2004) Developing trust in large-scale peer-to-peer systems. In: Proceedings of First IEEE symposium on multi-agent security and survivability Yu B, Singh MP, Sycara K (2004) Developing trust in large-scale peer-to-peer systems. In: Proceedings of First IEEE symposium on multi-agent security and survivability
7.
Zurück zum Zitat Zhao H, Li X (2009) H-Trust: a group trust management system for peer-to-peer desktop grid. J Computer Sci Technol 24(5):833–843 Zhao H, Li X (2009) H-Trust: a group trust management system for peer-to-peer desktop grid. J Computer Sci Technol 24(5):833–843
8.
Zurück zum Zitat Anupam D, Mahfuzul IM (2012) SecuredTrust : a dynamic trust computation model for secured communication in multi-agent systems. IEEE Trans Dependable Secur Comput 9(2):1–15CrossRef Anupam D, Mahfuzul IM (2012) SecuredTrust : a dynamic trust computation model for secured communication in multi-agent systems. IEEE Trans Dependable Secur Comput 9(2):1–15CrossRef
9.
Zurück zum Zitat Swamynathan G, Zhao BY (2010) The design of a reliable reputation system. Electron Commer Res 10:239–270CrossRefMATH Swamynathan G, Zhao BY (2010) The design of a reliable reputation system. Electron Commer Res 10:239–270CrossRefMATH
10.
Zurück zum Zitat Wang X, Liu L, Su J (2010) RLM: a general model for trust representation and aggregation. IEEE Trans Services Comput 5(1):131–143 Wang X, Liu L, Su J (2010) RLM: a general model for trust representation and aggregation. IEEE Trans Services Comput 5(1):131–143
11.
Zurück zum Zitat Chang J, Wang H, Yin G (2006) A time-frame based trust model for P2P systems. In: Proceedings of 9th International Conference on information security cryptology, Seoul, Korea Chang J, Wang H, Yin G (2006) A time-frame based trust model for P2P systems. In: Proceedings of 9th International Conference on information security cryptology, Seoul, Korea
12.
Zurück zum Zitat Jurca R, Faltings B (2003) An incentive compatible reputation mechanism. In: Proceedings of the IEEE Conference on electronic commerce, Newport Beach, CA, USA Jurca R, Faltings B (2003) An incentive compatible reputation mechanism. In: Proceedings of the IEEE Conference on electronic commerce, Newport Beach, CA, USA
13.
Zurück zum Zitat Jurca R, Garcin F, Talwar A, Faltings B (2010) Reporting Incentives and biases in online review forums. ACM Trans Web (TWEB) 4(2):1–27 Jurca R, Garcin F, Talwar A, Faltings B (2010) Reporting Incentives and biases in online review forums. ACM Trans Web (TWEB) 4(2):1–27
14.
Zurück zum Zitat Lam SK, Riedl J (2004) Shilling recommender systems for fun and profit. In: Proceedings of the 13th World Wide Web Conference Lam SK, Riedl J (2004) Shilling recommender systems for fun and profit. In: Proceedings of the 13th World Wide Web Conference
15.
Zurück zum Zitat Srivatsa M, Li X, Liu L (2005) TrustGuard: countering vulnerabilities in reputation management for decentralized overlay networks. WWW 2005:422–431 Srivatsa M, Li X, Liu L (2005) TrustGuard: countering vulnerabilities in reputation management for decentralized overlay networks. WWW 2005:422–431
16.
Zurück zum Zitat Feng Q, Liu L, Dai Y (2012) Vulnerabilities and countermeasures in context-aware social rating services, special issue on context-aware web services for the future internet. ACM Trans Internet Technol (TOIT) 11(3):11:1–11:27 Feng Q, Liu L, Dai Y (2012) Vulnerabilities and countermeasures in context-aware social rating services, special issue on context-aware web services for the future internet. ACM Trans Internet Technol (TOIT) 11(3):11:1–11:27
17.
Zurück zum Zitat Mozhgan T, Kevin CA (2012) A taxonomy to express open challenges in trust and reputation systems. J Commun 7(6):538–551 Mozhgan T, Kevin CA (2012) A taxonomy to express open challenges in trust and reputation systems. J Commun 7(6):538–551
18.
Zurück zum Zitat Withby A, Jøsang A, Indulska J (2004) Filtering out unfair ratings in Bayesian reputation systems. In: Proceedings of the 7th Int. workshop on trust in agent societies (at AAMAS’04). ACM Withby A, Jøsang A, Indulska J (2004) Filtering out unfair ratings in Bayesian reputation systems. In: Proceedings of the 7th Int. workshop on trust in agent societies (at AAMAS’04). ACM
19.
Zurück zum Zitat Dellarocas C (2000) Immunizing online reputation reporting systems against unfair ratings and discriminatory behavior. In: ACM Conference on electronic commerce, pp 150–157 Dellarocas C (2000) Immunizing online reputation reporting systems against unfair ratings and discriminatory behavior. In: ACM Conference on electronic commerce, pp 150–157
20.
Zurück zum Zitat Chen M, Singh J (2001) Computing and using reputations for internet ratings. In: Proceedings of the Third ACM Conference on electronic commerce (EC’01). ACM Chen M, Singh J (2001) Computing and using reputations for internet ratings. In: Proceedings of the Third ACM Conference on electronic commerce (EC’01). ACM
21.
Zurück zum Zitat Li X (2005) Resilient reputation and trust management: models and techniques. PhD Thesis, Georgia Institute of Technology Li X (2005) Resilient reputation and trust management: models and techniques. PhD Thesis, Georgia Institute of Technology
22.
Zurück zum Zitat Despotovic Z, Aberer K (2004) Maximum likelihood estimation of peers’ performances in P2P networks. In: Proceedings of the 2nd workshop on the economics of peer-to-peer systems, Cambridge, MA, USA, pp 1–9 Despotovic Z, Aberer K (2004) Maximum likelihood estimation of peers’ performances in P2P networks. In: Proceedings of the 2nd workshop on the economics of peer-to-peer systems, Cambridge, MA, USA, pp 1–9
23.
Zurück zum Zitat Zhou R, Hwang K (2007 )Power-Trust: a robust and scalable reputation system for trusted peer-to-peer computing. IEEE Trans Parallel Distrib Syst 18(4):460–473 Zhou R, Hwang K (2007 )Power-Trust: a robust and scalable reputation system for trusted peer-to-peer computing. IEEE Trans Parallel Distrib Syst 18(4):460–473
24.
Zurück zum Zitat Zhou R, Hwang K, Cai M (2008) GossipTrust for fast reputation aggregation in peer-to-peer networks. IEEE Trans Knowl Data Eng 20(9):1282–1295CrossRef Zhou R, Hwang K, Cai M (2008) GossipTrust for fast reputation aggregation in peer-to-peer networks. IEEE Trans Knowl Data Eng 20(9):1282–1295CrossRef
25.
Zurück zum Zitat Liang Z, Shi W (2008) Analysis of ratings on trust inference in open environments. Perform Eval 65(2):99–128CrossRef Liang Z, Shi W (2008) Analysis of ratings on trust inference in open environments. Perform Eval 65(2):99–128CrossRef
26.
Zurück zum Zitat Fernandes A, Kotsovinos E, Ostring S, Dragovic B (2004) Pinocchio: incentives for honest participation in distributed trust management. In Proceedings of 2nd Intl Conf. on trust management (iTrust 2004) Fernandes A, Kotsovinos E, Ostring S, Dragovic B (2004) Pinocchio: incentives for honest participation in distributed trust management. In Proceedings of 2nd Intl Conf. on trust management (iTrust 2004)
27.
Zurück zum Zitat Feldman M, Lai K, Stoica I, Chuang J (2004) Robust. Incentive techniques for peer-to-peer networks. In: 4th ACM conference on electronic commerce(EC04). NewYork, NY, USA Feldman M, Lai K, Stoica I, Chuang J (2004) Robust. Incentive techniques for peer-to-peer networks. In: 4th ACM conference on electronic commerce(EC04). NewYork, NY, USA
28.
Zurück zum Zitat Miller N, Resnick P, Zeckhauser R (2005) Eliciting informative feedback: the peer-prediction method. Manag Sci 51(9):1359–1373CrossRef Miller N, Resnick P, Zeckhauser R (2005) Eliciting informative feedback: the peer-prediction method. Manag Sci 51(9):1359–1373CrossRef
29.
Zurück zum Zitat Zhao H, Yang X, Li X (2012) An incentive mechanism to reinforce truthful reports in reputation systems. J Netw Computer Appl 35:951–961CrossRef Zhao H, Yang X, Li X (2012) An incentive mechanism to reinforce truthful reports in reputation systems. J Netw Computer Appl 35:951–961CrossRef
30.
Zurück zum Zitat Pranata I, Skinner G, Athauda R (2013) Modeling decentralized reputation-based trust for initial transactions in digital environments. ACM Trans Internet Technol 12(3):8CrossRef Pranata I, Skinner G, Athauda R (2013) Modeling decentralized reputation-based trust for initial transactions in digital environments. ACM Trans Internet Technol 12(3):8CrossRef
31.
Zurück zum Zitat Papaioannou TG, Stamoulis GD (2005) An incentives’ mechanism promoting truthful feedback in peer-to-peer systems. In: Proceedings of the 5th IEEE/ACM International symposium in cluster computing and the grid, Cardi, UK Papaioannou TG, Stamoulis GD (2005) An incentives’ mechanism promoting truthful feedback in peer-to-peer systems. In: Proceedings of the 5th IEEE/ACM International symposium in cluster computing and the grid, Cardi, UK
32.
Zurück zum Zitat Papaioannou TG, Stamoulis GD (2010) A mechanism that provides incentives for truthful feedback in peer-to-peer systems. Electron Commer Res 10:331–362 Papaioannou TG, Stamoulis GD (2010) A mechanism that provides incentives for truthful feedback in peer-to-peer systems. Electron Commer Res 10:331–362
33.
Zurück zum Zitat Dellarocas C (2006) Reputation mechanisms. In: Hendershott T (ed) Handbook on information systems and economics. Elsevier Publishing, Amsterdam Dellarocas C (2006) Reputation mechanisms. In: Hendershott T (ed) Handbook on information systems and economics. Elsevier Publishing, Amsterdam
34.
Zurück zum Zitat Beth T, Borcherding M, Klein B (1994) Valuation of trust in open networks. In: Proceedings of 3rd European symposium on research in computer security—ESORICS ’94 Beth T, Borcherding M, Klein B (1994) Valuation of trust in open networks. In: Proceedings of 3rd European symposium on research in computer security—ESORICS ’94
35.
Zurück zum Zitat Murata T, Saito K (2006) Extracting user interests from web log data. In; Proceedings of the 2006 IEEE/WIC/ACM International Conference on Web, Intelligence, pp 343–346 Murata T, Saito K (2006) Extracting user interests from web log data. In; Proceedings of the 2006 IEEE/WIC/ACM International Conference on Web, Intelligence, pp 343–346
36.
Zurück zum Zitat Shaun HH, Yanis V (2004) Game theory: a critical text. Routledge. ISBN: 0-415-25094-3, p 191 Shaun HH, Yanis V (2004) Game theory: a critical text. Routledge. ISBN: 0-415-25094-3, p 191
37.
Zurück zum Zitat Liu J, Issarny V (2006) An incentive compatible reputation mechanism for ubiquitous computing environments. In: PST 2006. International Conference on privacy, security and trust, Toronto, Canada Liu J, Issarny V (2006) An incentive compatible reputation mechanism for ubiquitous computing environments. In: PST 2006. International Conference on privacy, security and trust, Toronto, Canada
38.
Zurück zum Zitat Yu B, Venkatraman M, Singh MP (2003) An adaptive social network for information access: theoretical and experimental results. J Appl Artif Intell 17(1):21–38CrossRef Yu B, Venkatraman M, Singh MP (2003) An adaptive social network for information access: theoretical and experimental results. J Appl Artif Intell 17(1):21–38CrossRef
Metadaten
Titel
An incentive compatible reputation mechanism for P2P systems
verfasst von
Junsheng Chang
Zhengbin Pang
Weixia Xu
Huaimin Wang
Gang Yin
Publikationsdatum
01.09.2014
Verlag
Springer US
Erschienen in
The Journal of Supercomputing / Ausgabe 3/2014
Print ISSN: 0920-8542
Elektronische ISSN: 1573-0484
DOI
https://doi.org/10.1007/s11227-014-1204-z

Weitere Artikel der Ausgabe 3/2014

The Journal of Supercomputing 3/2014 Zur Ausgabe