A Novel Iterative and Dynamic Trust Computing Model for Large Scaled P2P Networks

Trust management has been emerging as an essential complementary part to security mechanisms of P2P systems, and trustworthiness is one of the most important concepts driving decision making and establishing reliable relationships. Collusion attack is a main challenge to distributed P2P trust model....

Full description

Bibliographic Details
Main Authors: Zhenhua Tan, Xingwei Wang, Xueyi Wang
Format: Article
Language:English
Published: Hindawi Limited 2016-01-01
Series:Mobile Information Systems
Online Access:http://dx.doi.org/10.1155/2016/3610157
id doaj-642cadb1f50f40cb839016bc26821c46
record_format Article
spelling doaj-642cadb1f50f40cb839016bc26821c462021-07-02T09:33:21ZengHindawi LimitedMobile Information Systems1574-017X1875-905X2016-01-01201610.1155/2016/36101573610157A Novel Iterative and Dynamic Trust Computing Model for Large Scaled P2P NetworksZhenhua Tan0Xingwei Wang1Xueyi Wang2Software College, Northeastern University, Shenyang 110819, ChinaSoftware College, Northeastern University, Shenyang 110819, ChinaSoftware College, Northeastern University, Shenyang 110819, ChinaTrust management has been emerging as an essential complementary part to security mechanisms of P2P systems, and trustworthiness is one of the most important concepts driving decision making and establishing reliable relationships. Collusion attack is a main challenge to distributed P2P trust model. Large scaled P2P systems have typical features, such as large scaled data with rapid speed, and this paper presented an iterative and dynamic trust computation model named IDTrust (Iterative and Dynamic Trust model) according to these properties. First of all, a three-layered distributed trust communication architecture was presented in IDTrust so as to separate evidence collector and trust decision from P2P service. Then an iterative and dynamic trust computation method was presented to improve efficiency, where only latest evidences were enrolled during one iterative computation. On the basis of these, direct trust model, indirect trust model, and global trust model were presented with both explicit and implicit evidences. We consider multifactors in IDTrust model according to different malicious behaviors, such as similarity, successful transaction rate, and time decay factors. Simulations and analysis proved the rightness and efficiency of IDTrust against attacks with quick respond and sensitiveness during trust decision.http://dx.doi.org/10.1155/2016/3610157
collection DOAJ
language English
format Article
sources DOAJ
author Zhenhua Tan
Xingwei Wang
Xueyi Wang
spellingShingle Zhenhua Tan
Xingwei Wang
Xueyi Wang
A Novel Iterative and Dynamic Trust Computing Model for Large Scaled P2P Networks
Mobile Information Systems
author_facet Zhenhua Tan
Xingwei Wang
Xueyi Wang
author_sort Zhenhua Tan
title A Novel Iterative and Dynamic Trust Computing Model for Large Scaled P2P Networks
title_short A Novel Iterative and Dynamic Trust Computing Model for Large Scaled P2P Networks
title_full A Novel Iterative and Dynamic Trust Computing Model for Large Scaled P2P Networks
title_fullStr A Novel Iterative and Dynamic Trust Computing Model for Large Scaled P2P Networks
title_full_unstemmed A Novel Iterative and Dynamic Trust Computing Model for Large Scaled P2P Networks
title_sort novel iterative and dynamic trust computing model for large scaled p2p networks
publisher Hindawi Limited
series Mobile Information Systems
issn 1574-017X
1875-905X
publishDate 2016-01-01
description Trust management has been emerging as an essential complementary part to security mechanisms of P2P systems, and trustworthiness is one of the most important concepts driving decision making and establishing reliable relationships. Collusion attack is a main challenge to distributed P2P trust model. Large scaled P2P systems have typical features, such as large scaled data with rapid speed, and this paper presented an iterative and dynamic trust computation model named IDTrust (Iterative and Dynamic Trust model) according to these properties. First of all, a three-layered distributed trust communication architecture was presented in IDTrust so as to separate evidence collector and trust decision from P2P service. Then an iterative and dynamic trust computation method was presented to improve efficiency, where only latest evidences were enrolled during one iterative computation. On the basis of these, direct trust model, indirect trust model, and global trust model were presented with both explicit and implicit evidences. We consider multifactors in IDTrust model according to different malicious behaviors, such as similarity, successful transaction rate, and time decay factors. Simulations and analysis proved the rightness and efficiency of IDTrust against attacks with quick respond and sensitiveness during trust decision.
url http://dx.doi.org/10.1155/2016/3610157
work_keys_str_mv AT zhenhuatan anoveliterativeanddynamictrustcomputingmodelforlargescaledp2pnetworks
AT xingweiwang anoveliterativeanddynamictrustcomputingmodelforlargescaledp2pnetworks
AT xueyiwang anoveliterativeanddynamictrustcomputingmodelforlargescaledp2pnetworks
AT zhenhuatan noveliterativeanddynamictrustcomputingmodelforlargescaledp2pnetworks
AT xingweiwang noveliterativeanddynamictrustcomputingmodelforlargescaledp2pnetworks
AT xueyiwang noveliterativeanddynamictrustcomputingmodelforlargescaledp2pnetworks
_version_ 1721332971149983744