A Novel Iterative and Dynamic Trust Computing Model for Large Scaled P2P Networks
Trust management has been emerging as an essential complementary part to security mechanisms of P2P systems, and trustworthiness is one of the most important concepts driving decision making and establishing reliable relationships. Collusion attack is a main challenge to distributed P2P trust model....
Main Authors: | , , |
---|---|
Format: | Article |
Language: | English |
Published: |
Hindawi Limited
2016-01-01
|
Series: | Mobile Information Systems |
Online Access: | http://dx.doi.org/10.1155/2016/3610157 |
id |
doaj-642cadb1f50f40cb839016bc26821c46 |
---|---|
record_format |
Article |
spelling |
doaj-642cadb1f50f40cb839016bc26821c462021-07-02T09:33:21ZengHindawi LimitedMobile Information Systems1574-017X1875-905X2016-01-01201610.1155/2016/36101573610157A Novel Iterative and Dynamic Trust Computing Model for Large Scaled P2P NetworksZhenhua Tan0Xingwei Wang1Xueyi Wang2Software College, Northeastern University, Shenyang 110819, ChinaSoftware College, Northeastern University, Shenyang 110819, ChinaSoftware College, Northeastern University, Shenyang 110819, ChinaTrust management has been emerging as an essential complementary part to security mechanisms of P2P systems, and trustworthiness is one of the most important concepts driving decision making and establishing reliable relationships. Collusion attack is a main challenge to distributed P2P trust model. Large scaled P2P systems have typical features, such as large scaled data with rapid speed, and this paper presented an iterative and dynamic trust computation model named IDTrust (Iterative and Dynamic Trust model) according to these properties. First of all, a three-layered distributed trust communication architecture was presented in IDTrust so as to separate evidence collector and trust decision from P2P service. Then an iterative and dynamic trust computation method was presented to improve efficiency, where only latest evidences were enrolled during one iterative computation. On the basis of these, direct trust model, indirect trust model, and global trust model were presented with both explicit and implicit evidences. We consider multifactors in IDTrust model according to different malicious behaviors, such as similarity, successful transaction rate, and time decay factors. Simulations and analysis proved the rightness and efficiency of IDTrust against attacks with quick respond and sensitiveness during trust decision.http://dx.doi.org/10.1155/2016/3610157 |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Zhenhua Tan Xingwei Wang Xueyi Wang |
spellingShingle |
Zhenhua Tan Xingwei Wang Xueyi Wang A Novel Iterative and Dynamic Trust Computing Model for Large Scaled P2P Networks Mobile Information Systems |
author_facet |
Zhenhua Tan Xingwei Wang Xueyi Wang |
author_sort |
Zhenhua Tan |
title |
A Novel Iterative and Dynamic Trust Computing Model for Large Scaled P2P Networks |
title_short |
A Novel Iterative and Dynamic Trust Computing Model for Large Scaled P2P Networks |
title_full |
A Novel Iterative and Dynamic Trust Computing Model for Large Scaled P2P Networks |
title_fullStr |
A Novel Iterative and Dynamic Trust Computing Model for Large Scaled P2P Networks |
title_full_unstemmed |
A Novel Iterative and Dynamic Trust Computing Model for Large Scaled P2P Networks |
title_sort |
novel iterative and dynamic trust computing model for large scaled p2p networks |
publisher |
Hindawi Limited |
series |
Mobile Information Systems |
issn |
1574-017X 1875-905X |
publishDate |
2016-01-01 |
description |
Trust management has been emerging as an essential complementary part to security mechanisms of P2P systems, and trustworthiness is one of the most important concepts driving decision making and establishing reliable relationships. Collusion attack is a main challenge to distributed P2P trust model. Large scaled P2P systems have typical features, such as large scaled data with rapid speed, and this paper presented an iterative and dynamic trust computation model named IDTrust (Iterative and Dynamic Trust model) according to these properties. First of all, a three-layered distributed trust communication architecture was presented in IDTrust so as to separate evidence collector and trust decision from P2P service. Then an iterative and dynamic trust computation method was presented to improve efficiency, where only latest evidences were enrolled during one iterative computation. On the basis of these, direct trust model, indirect trust model, and global trust model were presented with both explicit and implicit evidences. We consider multifactors in IDTrust model according to different malicious behaviors, such as similarity, successful transaction rate, and time decay factors. Simulations and analysis proved the rightness and efficiency of IDTrust against attacks with quick respond and sensitiveness during trust decision. |
url |
http://dx.doi.org/10.1155/2016/3610157 |
work_keys_str_mv |
AT zhenhuatan anoveliterativeanddynamictrustcomputingmodelforlargescaledp2pnetworks AT xingweiwang anoveliterativeanddynamictrustcomputingmodelforlargescaledp2pnetworks AT xueyiwang anoveliterativeanddynamictrustcomputingmodelforlargescaledp2pnetworks AT zhenhuatan noveliterativeanddynamictrustcomputingmodelforlargescaledp2pnetworks AT xingweiwang noveliterativeanddynamictrustcomputingmodelforlargescaledp2pnetworks AT xueyiwang noveliterativeanddynamictrustcomputingmodelforlargescaledp2pnetworks |
_version_ |
1721332971149983744 |