Affiliation:
1. Software College, Northeastern University, Shenyang 110819, China
2. College of Information Science and Engineering, Northeastern University, Shenyang 110819, China
Abstract
Trust management has been emerging as an essential complementary part to security mechanisms of P2P systems, and trustworthiness is one of the most important concepts driving decision making and establishing reliable relationships. Collusion attack is a main challenge to distributed P2P trust model. Large scaled P2P systems have typical features, such as large scaled data with rapid speed, and this paper presented an iterative and dynamic trust computation model named IDTrust (Iterative and Dynamic Trust model) according to these properties. First of all, a three-layered distributed trust communication architecture was presented in IDTrust so as to separate evidence collector and trust decision from P2P service. Then an iterative and dynamic trust computation method was presented to improve efficiency, where only latest evidences were enrolled during one iterative computation. On the basis of these, direct trust model, indirect trust model, and global trust model were presented with both explicit and implicit evidences. We consider multifactors in IDTrust model according to different malicious behaviors, such as similarity, successful transaction rate, and time decay factors. Simulations and analysis proved the rightness and efficiency of IDTrust against attacks with quick respond and sensitiveness during trust decision.
Funder
National Natural Science Foundation of China
Subject
Computer Networks and Communications,Computer Science Applications
Cited by
7 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. A Trust Model for Context-Aware E-Health Services;Lecture Notes in Electrical Engineering;2021
2. Defining Trust in Computation;2020 International Conference on Information Technology Systems and Innovation (ICITSI);2020-10-19
3. The operative profit margin and interest cost in retail food;Ekonomika poljoprivrede;2019
4. A Balanced Trust-Based Method to Counter Sybil and Spartacus Attacks in Chord;Security and Communication Networks;2018-11-12
5. Improve Predictive Accuracy by Identifying Collusions in P2P Recommender Systems;Advances in Multimedia Information Processing – PCM 2018;2018