Abstract
With the growth of P2P applications, more and more trust models have been proposed for curbing malicious behavior, most of which are suitable for pure P2P networks, including the structured P2P networks and the unstructured P2P networks. This paper presents a super peer-aware trust model, sureTrust, for 2-level P2P networks. The super peer of a subnet is responsible for calculating the peers’ trust in its subnet, and the super peer’s trust is correlated with the trust of the peers in its subnet. To discourage peers from behaving maliciously, we allow a peer to establish transactions only with the peers whose trust is similar to that of the peer. Also, a super peer could separate the connections of a peer in its subnet to the outside subnets as the punishment on the peer’s behavior. The simulation results show that the sureTrust model could improve normal peers’ successful download rate and resist different types of attacks.
Similar content being viewed by others
References
Sepandar DK, Mario TS, Hector GM (2003) The EigenTrust algorithm for reputation management in P2P networks. In: proc. of the 12th Int’l Conf. On world wide web. Budapest, ACM press, pp 640–651
A. Das, MM. Islam (2011) SecuredTrust: a dynamic trust computation model for secured communication in multiagent systems. IEEE Trans. Dependable and Secure Computing, vol. 2, pp 261–274
Xiong L, Liu L (2004) PeerTrust: supporting reputation-based trust in peer-to-peer communities. IEEE Trans. Data and knowledge engineering. Special Issue on Peer-to-Peer Based Data Management 7:843–857
Su X, Zhang MJ, Mu Y (2010) PBTrust: a priority-based trust model for service selection in general service-oriented environments. In: Proc. of IEEE/IFIP International Conference on Embedded and Ubiquitous Computing
Meng XF, Ding YL, Gong Y (2012) @trust: a trust model based on feedback-arbitration in structured P2P network. Comput Commun 16:2044–2053
Tian CQ, Yang BJ, Zhong JD, Liu XJ (2014) Trust-based incentive mechanism to motivate cooperation in hybrid P2P networks. Comput Netw 73(11):244–255
Lian Q, Zhang Z, Yang M, et al (2007) An empirical study of collusion behavior in the maze P2P file-sharing system. ICDCS 27th International Conference on distributed computing systems, IEEE, Toronto, pp 1–10
Liang J, Kumar R, Ross KW (2006) The fast-track overlay: a measurement study. Comput Netw 50(6):842–858
Tian CQ, Yang BJ (2011) R2Trust, a reputation and risk based trust management framework for large-scale, fully decentralized overlay networks. Future Gener Comput Syst (Elsevier) 27(8):1135–1143
Wang Y, Vassileva J (2003) Trust and reputation model in peer-to-peer networks. In: proceedings of International Conference on peer-to-peer computing (P2P’03), Washington, pp 150–157
Schmidt S, Steele R, Dillon TS, Chang E (2007) Fuzzy trust evaluation and credibility development in multi-agent systems. Appl Soft Comp J 2:492–505
Lin HQ, Li ZT, Huang QF (2011) Multifactor hierarchical fuzzy trust evaluation on peer-to-peer networks. Peer-to-Peer Network Appl 4:376–390
eBay International. http://www.ebay.com/. Accessed 20 Jan 2017
Resnick P, Zeckhauser R (2002) Trust among strangers in internet transactions: empirical analysis of eBay’s reputation system. Econ Internet E-Commerce Advan Appl Microecon 11:127–157
Xue WL, Liu YQ, Li KQ et al (2012) DHTrust: a robust and distributed reputation system for trusted peer-to-peer networks. Concurrency and computation: practice and experience. Special Issue on Advances in Network and System Security 10:1037–1051
Li XY, Zhou F, Yang XD (2011) A multi-dimensional trust evaluation model for large-scale P2P computing. J Parall Distribut Comp 6:837–847
Jia C, Xie L, Gan XC, Liu WH, Han ZG (2012) A trust and reputation model considering overall peer consulting distribution. IEEE Trans. Systems man and cybernetics part a. Sys Human 1:164–177
Fan X, Li M, Ma J et al (2012) Behavior-based reputation management in P2P file-sharing networks. J Comput Syst Sci 78(6):1737–1750
Jia C, Xie L, Gan XC et al (2012) A trust and reputation model considering overall peer consulting distribution. IEEE Trans Sys Man Cyber: Part A-Systems Humans 42(1):164–177
Zhao HY, Li XL (2013) VectorTrust: trust vector aggregation scheme for trust management in peer-to-peer networks. J Supercomput 64(3):805–829
Ren YZ, Li MC, Sakurai K (2011) FineTrust: a fine-grained trust model for peer-to-peer networks. Sec Commun Network 4:61–69
Li X, Zhou F, Yang X (2012) Scalable feedback aggregating (SFA) overlay for large-scale P2P trust management. IEEE Trans Parallel Distribut Sys 23(10):1944–1957
Can AB, Bhargava B (2013) SORT: a self-organizing trust model for peer-to-peer systems. IEEE Trans Depend Secure Comp 10(1):14–27
Lu K, Wang JL, Li MC (2016) An Eigentrust dynamic evolutionary model in P2P file-sharing systems. Peer-to-peer Network Appl 9:599–612
Tutschku K (2004) A measurement-based traffic profile of the eDonkey file sharing service, 5th International workshop. Springer, France, pp 12–21
Huang D, Zhang A, Huang J, Li J (2008) Research on Peer-to-peer network Gnutella 0.6 architecture. Comp Appl Software 25(6):208–210
Jin Y, Liu Y, Zhao HW (2010) Trust-based supernode selection in peer-to-peer systems. ICFCC Future Computer and communication 2010 2nd International Conference on, IEEE, Wuhan, V1-285-V1-289
Luo HF, Deng L (2013) Research on a P2P supper node selection mechanism based on trust model. ICCSE the 8th International Conference on Computer Science & Education, IEEE, Colombo, pp 851–854
Han J, Park D (2003) A lightweight personal grid using a super node network. P2P’03 proceedings of the third International Conference on peer-to-peer computing, IEEE, pp 168–175
Mark J, Alberto M, Gian P, et al. http://peersim.sourceforge.net/. Accessed 16 Jan 2017
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Meng, X. sureTrust: a super peer-aware trust model for 2-level P2P networks. Peer-to-Peer Netw. Appl. 11, 619–631 (2018). https://doi.org/10.1007/s12083-017-0577-1
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s12083-017-0577-1