Hostname: page-component-cd9895bd7-jkksz Total loading time: 0 Render date: 2024-12-26T20:02:05.566Z Has data issue: false hasContentIssue false

Taxonomy of reputation assessment in peer-to-peer systems and analysis of their data retrieval

Published online by Cambridge University Press:  03 October 2014

Farag Azzedin*
Affiliation:
Information & Computer Science Department, King Fahd University of Petroleum and Minerals, Saudi Arabia e-mail: [email protected]

Abstract

The need for reputation assessment is particularly strong in peer-to-peer (P2P) systems because the peers’ personal site autonomy is amplified by the inherent technological decentralization of the environment. However, the decentralization notion makes the problem of designing a P2P-based reputation assessment substantially harder in P2P networks than in centralized settings. Existing reputation systems tackle the reputation assessment process in an ad hoc manner. There is no systematic and coherent way to derive measures and analyze the current reputation systems. In this paper, we propose a reputation assessment process and use it to classify the existing reputation systems. Simulation experiments are conducted and focused on the different methods in selecting the recommendation sources and collecting the recommendations. These two phases can contribute significantly to the overall performance owing to precision, recall, and communication cost.

Type
Articles
Copyright
© Cambridge University Press 2014 

Access options

Get access to the full version of this content by using one of the access options below. (Log in options will check for institutional or personal access. Content may require purchase if you do not have access.)

References

Aberer, K., Cudré-Mauroux, P., Datta, A., Despotovic, Z., Hauswirth, M., Punceva, M. & Schmidt, R. 2003. P-Grid: a self-organizing structured P2P system. ACM SIGMOD Record 32(3): 2933.CrossRefGoogle Scholar
Aberer, K. & Despotovic, Z. 2001. Managing trust in a peer-2-peer information system. In 10th Int’l Conf. Information and Knowledge Management (CIKM’01), November, 310–317.Google Scholar
Aberer, K. & Despotovic, Z. 2004. Possibilities for Managing Trust in P2P Networks. EPFL Technical Report IC/2004/84.Google Scholar
Aringhieri, R., Damiani, E., Vimercati, S. D. C. D., Paraboschi, S. & Samarati, P. 2006. Fuzzy techniques for trust and reputation management in anonymous peer-to-peer systems. Journal of the Association for Information Science and Technology 57(4):528537.Google Scholar
Azzedin, F. & Maheswaran, M. 2003. Trust modeling for peer-to-peer based computing systems. In International Parallel and Distributed Processing Symposium (IPDPS’03), April.Google Scholar
Azzedin, F., Maheswaran, M. & Mitra, A. 2006. Trust brokering and its use for resource matchmaking in public-resource grids. Journal of Grid Computing 4(3):247263.CrossRefGoogle Scholar
Azzedin, F., Ridha, A. & Rizvi, A. 2007. Fuzzy trust for peer-to-peer systems. In 21st International Conference on Computer, Electrical, and Systems Science, and Engineering, CESSE 2007, WASET, May, 123–127.Google Scholar
Baeza-Yates, R. & Ribeiro-Neto, B. 1999. Modern Information Retrieval, Addison-Wesley.Google Scholar
Bhargava, B., Lilien, L., Rosenthal, A., Winslett, M., Sloman, M., Dillon, T., Chang, E., Hussain, F., Nejdl, W., Olmedilla, D. & Kashyap, V. 2004. The pudding of trust. Intelligent Systems 19(5):7488.Google Scholar
Ciraci, S., Korpeoglu, I. & Ulusoy, Ö. 2005. Characterizing Gnutella network properties for peer-to-peer network simulation. In Computer and Information Sciences – ISCIS 2005, Lecture Notes in Computer Science 3733, 274–283. Springer.Google Scholar
Gupta, M., Ammar, M. H. & Ahamad, M. 2006. Trade-offs between reliability and overheads in peer-to-peer reputation tracking. Computer Networks 50(4):501522.CrossRefGoogle Scholar
Hou, M., Lu, X., Zhou, X. & Zhan, C. 2005. A trust model of P2P system based on confirmation theory. ACM SIGOPS Operating Systems Review 39(1):5662.Google Scholar
Hughes, D., Coulson, G. & Walkerdine, J. 2006. Free riding on Gnutella revisited. IEEE Distributed Systems Online 6(6):118.CrossRefGoogle Scholar
Jin, Y., Gu, Z. & Ban, Z. 2007. Restraining false feedbacks in peer-to-peer reputation systems. In International Conference on Semantic Computing, 2007. ICSC 2007, 17–19 September, 304–312.Google Scholar
Jøsang, A. & Ismail, R. 2002. The beta reputation system. In Proceedings of the 15th Bled Electronic Commerce Conference, June.Google Scholar
Jsang, A., Ismail, R. & Boyd, C. 2006. A survey of trust and reputation systems for online service provision, Decision Support Systems.CrossRefGoogle Scholar
Kamvar, S., Schlosser, M. & Garcia-Molina, H. 2003. The EigenTrust algorithm for reputation management in P2P networks. In 12th International World Wide Web Conference, 640–651.Google Scholar
Liang, J., Kumar, R., Xi, Y. & Ross, K. 2005. Pollution in P2P file sharing systems. In INFOCOM 2005, 24th Annual Joint Conference of the IEEE Computer and Communications Societies, 2, March, 1174–1185.Google Scholar
Lua, E. K., Crowcroft, J., Pias, M., Sharma, R. & Lim, S. 2005. A survey and comparison of peer-to-peer overlay network schemes. IEEE Communications Surveys & Tutorials 7(2):7293.Google Scholar
Mekouar, L., Iraqi, Y. & Boutaba, R. 2006. Peer-to-peer’s most wanted: malicious peers. Computer Networks 50(4):545562.CrossRefGoogle Scholar
Mengshu, H., Xianliang, L., Xu, Z. & Chuan, Z. 2005. A trust model of P2P system based on confirmation theory. SIGOPS Operating Systems Review 39(1):5662.CrossRefGoogle Scholar
Patel, J., Teacy, W., Jennings, N. & Luck, M. 2005. A probabilistic trust model for handling inaccurate reputation sources. In 3rd Int’l Conference on Trust Management, 193–209.Google Scholar
Qiao, Y. & Bustamante, F. 2005. Elders know best-handling churn in less structured P2P systems. In Fifth IEEE International Conference on Peerto-Peer Computing, 2005. P2P 2005, 31 August to 2 September, 77–86.Google Scholar
Quercia, D. 2009. Trust Models for Mobile Content-Sharing Applications. PhD thesis, University College London.Google Scholar
Ripeanu, M., Iamnitchi, A. & Foster, I. 2002. Mapping the Gnutella network. IEEE Internet Computing 6(1):5057.Google Scholar
Rodriguez, P., Tan, S. & Gkantsidis, C. 2006. On the feasibility of commercial, legal P2P content distribution. ACM SIGCOMM Computer Communication Review 36(1):7578.CrossRefGoogle Scholar
Sabater, J. & Sierra, C. 2002. Reputation and social network analysis in multi-agent systems. In 1st Int’l Joint Conf. Autonomous Agents and Multiagent Systems, 475–482.Google Scholar
Schollmeier, R. 2005. Signaling and Networking in Unstructured Peer-to-Peer Networks. PhD thesis, Technische Universität München.Google Scholar
Selçuk, A., Uzun, E. & Pariente, M. 2008. A reputation-based trust management system for P2P networks. International Journal of Network Security 6(3):235245.Google Scholar
Sen, S. & Sajja, N. 2002. Robustness of reputation-based trust: Boolean case. In 1st Int’l Joint Conf. Autonomous Agents and Multi-Agent Systems (AAMAS-02), July, 288–293.Google Scholar
Song, S., Hwang, K., Zhou, R. & Kwok, Y.-K. 2005. Trusted P2P transactions with fuzzy reputation aggregation. IEEE Internet Computing 9(6):2434.CrossRefGoogle Scholar
Wang, H., Zhu, Y. & Hu, Y. 2005. To unify structured and unstructured P2P systems. In 19th IEEE International Parallel and Distributed Processing Symposium, April.Google Scholar
West, A. G., Lee, I., Kannan, S. & Sokolsky, O. 2010. An evaluation framework for reputation management systems. In Trust Modeling and Management in Digital Environments: From Social Concept to System Development. Z. Yan (ed.), IGI Global, 282308.CrossRefGoogle Scholar
Whitby, A., Jøsang, A. & Indulska, J. 2005. Filtering out unfair ratings in Bayesian reputation systems. The Icfain Journal of Management Research 4(2):4864.Google Scholar
Xiong, L. & Liu, L. 2004. PeerTrust: supporting reputation-based trust for peer-to-peer electronic communities. IEEE Transactions on Knowledge and Data Engineering 16(7):843857.CrossRefGoogle Scholar
Yan, Z. & Prehofer, C. 2010. Autonomic trust management for a component based software system. IEEE Transactions on Dependable and Secure Computing, April.CrossRefGoogle Scholar