Trust and reputation model in peer-to-peer networks
Summary (2 min read)
1. Introduction
- Peer-to-peer networks are networks in which peers cooperate to perform a critical function in a decentralized manner [6].
- All peers are both consumers and providers of resources and can access each other directly without intermediary peers.
- Since there is no centralized node to serve as an authority to monitor and punish the peers that behave badly, malicious peers have an incentive to provide poor quality services for their benefit because they can get away.
- The rest of this paper is organized as follows: section 2 discusses the definitions of trust and reputation and their characteristics.
- The experiment design and results are presented in Sections 4 and 5.
2. Trust and reputation
- Trust and reputation mechanisms have been proposed for large open environments in e-commerce, peer-to-peer computing, recommender systems [4, 13, 14, 17, 18, 19].
- The authors adopt the following working definitions: Trust and reputation both depend on some context.
- A customer might evaluate a restaurant from several aspects, for example, the quality of food, the price, and the service.
- For each aspect, she develops a kind of trust.
3.1 Trust and reputation mechanism
- The first one is the trust that peer A has in peer B’s capability in providing services.
- The other is the trust that peer A has in peer B’s reliability in providing recommendations about other peers.
- Each peer plays two roles, the role of file provider offering files to other peers and the role of user searching and downloading files provided by other peers.
- Others may be more cautious and rely on the reputation of the service provider.
- After each interaction, the peer updates its trust in the file provider according to its evaluation of the interaction.
3.2 Trust in a file provider’s capability
- In a peer-to-peer network, file providers’ capabilities are not uniform.
- Sometimes it may only be interested in the file provider’s capability in some particular aspect.
- A Bayesian network provides a flexible method to solve the problem.
- The node “FQ” denotes the set of file qualities.
- According to a Bayesian network, a peer can infer the trustworthiness of a file provider in different conditions, such as the trustworthiness of the file provider in providing music files, the trustworthiness of the file provider in providing files with high quality, the trustworthiness of the file provider in providing music files with high quality.
3.3 Evaluating interactions and updating trust in file providers
- After each interaction, peers make an evaluation of it.
- Peers might have different criteria to judge an interaction.
- Some peers more care about the download speed.
- Some may equally care about both of them.
- The update is implemented by adding the new experience into the peer’s corresponding Bayesian network.
3.4 Handling recommendations
- When a peer is not sure about the trustworthiness of a file provider, it can ask other peers for recommendations.
- If the peer is going to download a movie, it may care about the movie’s quality.
- The peer might receive several such recommendations at the same time from trustworthy, untrustworthy acquaintances, or strangers.
- Suppose peer 1 will compare its Bayesian network with the corresponding Bayesian network of peer 2.
4. Experiments
- For the sake of simplicity, each node in their system plays only one role at a time, either the role of file provider or the role of a peer.
- The other is the file provider list that records the known file providers and the corresponding Bayesian networks representing the peer’s trusts in these file providers.
- The total number of interactions is 1000.
- The authors compare the performance of a system consisting of peers with Bayesian network-based trust models and a system consisting of peers without Bayesian networks (BN) trust model.
- The goal of the second experiment is to see if exchanging recommendation values with other peers helps peers to achieve better performance defined as the percentage of successful interactions with file provider, which is the number of successful interactions over the total number of interactions.
7. Conclusions
- Enabling peers to develop trust and reputation among themselves is important in a peer-to-peer system where resources (either computational, or files) of different quality are offered.
- It will become increasingly important in systems for peer-to-peer computation, where trust and reputation mechanisms can provide a way for protection of unreliable, buggy, infected or malicious peers.
- The authors propose a Bayesian network-based trust model and a method for building reputation based on recommendations in peer-to-peer networks.
- Bayesian networks provide a flexible method to present the differentiated trust and combine different aspects of trust.
Did you find this useful? Give us your feedback
Citations
759 citations
307 citations
282 citations
Cites background from "Trust and reputation model in peer-..."
...Some research work has shown that rating nodes’ trust and reputation is an effective approach in distributed environments to improve security [2,13,27,33], to support decision-making [3,23,43], and to promote node collaboration [10,19,29,32]....
[...]
265 citations
Cites background from "Trust and reputation model in peer-..."
...IoT SH is and will be a high dynamic ecosystem with a high rate of replacement and new comers, so is worth to handle trust management dynamically by mimicking humans behavior so considering the history of interactions, the context, and the scope to derive trust levels for every request [74, 75]....
[...]
230 citations
Cites methods from "Trust and reputation model in peer-..."
...[30] Y. Wang, J. Vassileva, Trust-Based Community Formation in Peer-to-Peer File Sharing Networks, Proc. of IEEE/WIC/ACM International Conference on Web Intelligence (WI 2004),September 20-24, 2004, Beijing, China....
[...]
...Vassileva [30, 31] Trust and Reputation System...
[...]
...[31] Y. Wang, J. Vassileva, Trust and Reputation Model in Peer-to-Peer Networks....
[...]
...[32] Y. Wang, J. Vassileva (to appear) Toward Trust and Reputation Based Web Service Selection: A Survey....
[...]
...The decentralized methods proposed by Yu & Singh [35, 36] and Wang & Vassileva [31, 32] can be easily modified to apply to peer-to-peer based web service systems....
[...]
References
1,948 citations
Additional excerpts
...Resnick [11] empirically shows that 89....
[...]
1,584 citations
"Trust and reputation model in peer-..." refers background in this paper
...Trust and reputation mechanisms have been proposed for large open environments in e-commerce, peer-to-peer computing, recommender systems [4, 13, 14, 17, 18, 19]....
[...]
1,487 citations
819 citations
610 citations
"Trust and reputation model in peer-..." refers background in this paper
...Trust and reputation mechanisms have been proposed for large open environments in e-commerce, peer-to-peer computing, recommender systems [4, 13, 14, 17, 18, 19]....
[...]
Related Papers (5)
Frequently Asked Questions (8)
Q2. What future works have the authors mentioned in the paper "Trust and reputation model in peer-to-peer networks" ?
Future work includes adding more aspects in the Bayesian networks, trying to find the key parameters that influence the system performance, and testing the system under other performance measures, for example, how fast a peer can locate a trustworthy service provider and how fast the workload of file providers can be balanced. Applying this approach to peer-to-peer systems for computational services is particularly promising.
Q3. What is the purpose of the second experiment?
The goal of the second experiment is to see if exchanging recommendation values with other peers helps peers to achieve better performance defined as the percentage of successful interactions with file provider, which is the number of successful interactions over the total number of interactions.
Q4. What is the effect of the interaction on the peer’s trust?
If the interaction is satisfying, it will increase its trust in the file provider; if the interaction is not satisfying, it will decrease its trust in the file provider.
Q5. What is the importance of trust and reputation in peer-to-peer networks?
It will become increasingly important in systems for peer-to-peer computation, where trust and reputation mechanisms can provide a way for protection of unreliable, buggy, infected or malicious peers.
Q6. What is the degree of similarity between the two Bayesian networks?
Peer 1 gets the degree of similarity between the two Bayesian networks by computing the similarity of each pair of nodes (T, DS, FQ and FT), according to the similarity measure based on Clark’s distance [7], and then combining the similarity results of each pair of nodes with different weight in order to take into account peers’ preferences.
Q7. What is the reason why the reputation of a file provider is not affected by a few?
Since a file provider’s reputation is built on a collection of recommendations, even if a few peers lie, it will not influence the overall reputation of the file provider.
Q8. What is the value of the trust value of the peer?
If the peer interacts with the file provider, it will not only update its trust in the file provider, i.e. its corresponding Bayesian network, but also its trust in the referee-peers that provide recommendations by the following reinforcement learning formula:ααα etrtr o ij n ij *)1(* −+= (1)n ijtr denotes the new trust value that the thi peer has inthe thj referee after the update; oijtr denotes the old trust value.