Home| Contact Us| New Journals| Browse Journals| Journal Prices| For Authors|

Print ISSN: 0976-898X
Online ISSN:
0976-8998


  About JNT
  DLINE Portal Home
Home
Aims & Scope
Editorial Board
Current Issue
Next Issue
Previous Issue
Sample Issue
Upcoming Conferences
Self-archiving policy
Alert Services
Be a Reviewer
Publisher
Paper Submission
Subscription
Contact us
 
  How To Order
  Order Online
Price Information
Request for Complimentary
Print Copy
 
  For Authors
  Guidelines for Contributors
Online Submission
Call for Papers
Author Rights
 
 
RELATED JOURNALS
Journal of Digital Information Management (JDIM)
International Journal of Computational Linguistics Research (IJCL)
International Journal of Web Application (IJWA)

 

 
Journal of Networking Technology
 

Construction of Credit based Distributed Trust Management Model for P2P Network
Han Yingjun, Lian Hongjun
North China University of Science and Technology Hebei, 063009, China
Abstract: With the emerging of peer-to-peer (P2P) network in recent years, unsafety problems underlying becomes more obvious, such as dishonest recommendation, collusive cheat and complex strategic attack behavior. But the current trust model is able to process the above problems in a better way. Thus this study proposes a credit-based distributed trust management model for P2P, named RA Trust and applies it to quantify and evaluate credibility of peer. In construction of trust model, we use time interval to mark time property of experience and recommendation and describe the final trust level of peer using peer credibility, short-term trust and long-term trust as well as trust measurement of peer in a more accurate way by introducing trust deviation value and trust abuse value. Results suggest that, RA Trust has better dynamic adaptive ability and can effectively process strategic behavioral changes of dynamic malicious peer and attack of dishonest feedback on system.
Keywords: P2P, Trust Management Mode, Malicious Peer, RA Trust Construction of Credit based Distributed Trust Management Model for P2P Network
DOI:https://doi.org/10.6025/jnt/2019/10/3/71-78
Full_Text   PDF 214 KB   Download:   140  times
References:
[1] Li, J.T., Jing, Y.A., Xiao, Xi.C., WangC X.P., Zhang, G.D. (2007). A trust model based on similarity-weighted recommendation for P2P environments. Journal of Software, 18 (l) 158-166.
[2] Tian, C.Q., Zou, S.H., Wang, W.D., et al (2007). Building an attack resistant trust management model for distributed P2P systems. Journal of Beijing University of Posts and Telecommunications, 30 (3) 62-65.
[3] Tang, W., Chen, Z. (2003). Research of subjective trust management model based on the fuzzy set theory. Journal of Software, 14 (9) 1401-1408.
[4] Xie, Y.Y., Hu, X.G., Liu, J., et al. (209). Research overview of trust model in P2P network. Information Security and Communications Privacy, 30 (2) 38-42.
[5] Chang, J.S., Wang, H. M., Yin, G. (2006). DyTrust: A time-frame based dynamic trust model for P2P systems. Chinese Journal of Computers, 29 (8) 1301-1307.
[6] Xiong, L., Liu, L. (2004). Peer Trust: Supporting reputation-based trust in peer-to-peer communities. IEEE Trans on Data and Knowledge Engineering: Special Issue on Peer-to-Peer Based Data Management, 16 (7) 843-857.
[7] Shi, R.H., Xin, J. J. (2010). New P2P trust model based on group. Application Research of Computers, 27 (7) 2638-2640.
[8] Li, J.L., Gu, L.Z., Yang, Y.X. (2009). A new trust management model for P2P networks. Journal of Beijing University of Posts and Telecommunications, 4, 32 (2) 71-74.
[9] Kaelbling, L.P., Littman, M.L., Moore, A.W. (1996). Reinforcement learning: A survey. Journal of Artificial Intelligence Research, 4. 237-285.
[10] Dou, W., Wang, H.M., Jia, Y., et al. (2004). A recommendation-based peer-to-peer trust model. Journal of Software, 15 (4) 571- 583.
[11] Hu, J. L., Wu, Q.Y., Zhou, B., et al. (2009). Robust feedback credibility-based distributed P2P trust model. Journal of Software, 20 (10) 2886-2887.
[12] Tian, C.Q., Zou, S.H., Tian, H.R., et al. (2007). A new trust model based on reputation and risk evaluation for P2P networks. Journal of Electronics & Information Technology, 29 (7) 1628-1629.

Home | Aim & Scope | Editorial Board | Author Guidelines | Publisher | Subscription | Previous Issue | Contact Us |Upcoming Conferences|Sample Issues|Library Recommendation Form|

 

Copyright © 2011 dline.info