Table of Contents Author Guidelines Submit a Manuscript
Journal of Electrical and Computer Engineering
Volume 2016, Article ID 4361719, 10 pages
http://dx.doi.org/10.1155/2016/4361719
Research Article

The Comparison of Distributed P2P Trust Models Based on Quantitative Parameters in the File Downloading Scenarios

Information Security Research Center, China CEPREI Laboratory, Guangzhou 510610, China

Received 26 December 2015; Revised 29 April 2016; Accepted 9 June 2016

Academic Editor: Arash Habibi Lashkari

Copyright © 2016 Jingpei Wang and Jie Liu. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. Y. Zhong, B. Bhargava, Y. Lu, and P. Angin, “A computational dynamic trust model for user authorization,” IEEE Transactions on Dependable and Secure Computing, vol. 12, no. 1, pp. 1–15, 2015. View at Publisher · View at Google Scholar · View at Scopus
  2. I.-R. Chen, J. Guo, and F. Bao, “Trust management for service composition in SOA-based IoT systems,” in Proceedings of the IEEE Wireless Communications and Networking Conference (WCNC '14), pp. 3444–3449, Istanbul, Turkey, April 2014. View at Publisher · View at Google Scholar · View at Scopus
  3. E. Damiani, S. De Capitani di Vimercati, S. Paraboschi, and P. Samarati, “Managing and sharing servants' reputations in P2P systems,” IEEE Transactions on Knowledge and Data Engineering, vol. 15, no. 4, pp. 840–854, 2003. View at Publisher · View at Google Scholar · View at Scopus
  4. L. Mekouar, Y. Iraqi, and R. Boutaba, “Detecting malicious peers in a reputation-based peer-to-peer system,” in Proceedings of the 2nd IEEE Consumer Communications and Networking Conference (CCNC '05), pp. 37–42, IEEE, Las Vegas, Nev, USA, January 2005. View at Scopus
  5. M. Rodriguez-Perez, O. Esparza, and J. L. Muñoz, “Surework: a super-peer reputation framework for p2p networks,” in Proceedings of the 23rd Annual ACM Symposium on Applied Computing (SAC '08), pp. 2019–2023, Fortaleza, Brazil, March 2008. View at Publisher · View at Google Scholar · View at Scopus
  6. S. D. Kamvar, M. T. Schlosser, and H. Garcia-Molina, “The eigentrust algorithm for reputation management in P2P networks,” in Proceedings of the 12th International Conference on World Wide Web (WWW '03), pp. 640–651, ACM, Budapest, Hungary, May 2003. View at Publisher · View at Google Scholar · View at Scopus
  7. L. Xiong and L. Liu, “A reputation-based trust model for peer-to-peer eCommerce communities,” in Proceedings of the ACM Conference on Electronic Commerce (EC '03), pp. 275–284, San Diego, Calif, USA, June 2003.
  8. M. Harish, N. Anandavelu, N. Anbalagan, G. S. Mahalakshmi, and T. V. Geetha, “Design and analysis of a game theoretic model for P2P trust management,” in Distributed Computing and Internet Technology: 4th International Conference, ICDCIT 2007, Bangalore, India, December 17–20. Proceedings, vol. 4882 of Lecture Notes in Computer Science, pp. 110–115, Springer, Berlin, Germany, 2007. View at Publisher · View at Google Scholar
  9. X. Li, F. Zhou, and X. Yang, “A multi-dimensional trust evaluation model for large-scale P2P computing,” Journal of Parallel and Distributed Computing, vol. 71, no. 6, pp. 837–847, 2011. View at Publisher · View at Google Scholar · View at Scopus
  10. L. Srour, A. Kayssi, and A. Chehab, “Reputation-based algorithm for managing trust in file sharing networks,” in Proceedings of the Securecomm and Workshops, pp. 1–10, IEEE, Baltimore, Md, USA, September 2006. View at Publisher · View at Google Scholar · View at Scopus
  11. Y. Wang and J. Vassileva, “Bayesian network-based trust model in peer-to-peer networks,” in Proceedings of IEEE/WIC International Conference on Web Intelligence, pp. 372–378, Halifax, Canada, 2003.
  12. Y. Wang, R. Wang, and Z. Han, “Dynamical trust construction schema with fuzzy decision in P2P systems,” Chinese Journal of Electronics, vol. 18, no. 3, pp. 417–421, 2009. View at Google Scholar · View at Scopus
  13. S. Song, K. Hwang, R. Zhou, and Y.-K. Kwok, “Trusted P2P transactions with fuzzy reputation aggregation,” IEEE Internet Computing, vol. 9, no. 6, pp. 24–34, 2005. View at Publisher · View at Google Scholar · View at Scopus
  14. C. Tian and B. Yang, “A D-S evidence theory based fuzzy trust model in file-sharing P2P networks,” Peer-to-Peer Networking and Applications, vol. 7, no. 4, pp. 332–345, 2014. View at Publisher · View at Google Scholar · View at Scopus
  15. M. Wojcik, H. S. Venter, and J. H. P. Eloff, “Trust model evaluation criteria: a detailed analysis of trust representation,” in Proceedings of the South African Telecommunications Networks and Applications Conference (SATNAC '06), Western Cape, South Africa, September 2006.
  16. M. Rodriguez-Perez, O. Esparza, and J. L. Muñoz, “Analysis of peer-to-peer distributed reputation schemes,” in Proceedings of the IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom '05), pp. 1811–1817, San Jose, Calif, USA, December 2005. View at Scopus
  17. F. G. Mármol and G. M. Pérez, “Trust and reputation models comparison,” Internet Research, vol. 21, no. 2, pp. 138–153, 2011. View at Publisher · View at Google Scholar · View at Scopus
  18. C. He and M. Wu, “Comparison and analysis of different reputation systems for peer-to-peer networks,” in Proceedings of the 3rd International Conference on Advanced Computer Theory and Engineering (ICACTE '10), vol. 3, pp. V3-20–V3-23, IEEE, Chengdu, China, August 2010. View at Publisher · View at Google Scholar · View at Scopus
  19. F. Azzedin, “Taxonomy of reputation assessment in peer-to-peer systems and analysis of their data retrieval,” Knowledge Engineering Review, vol. 29, no. 4, pp. 463–483, 2014. View at Publisher · View at Google Scholar · View at Scopus
  20. A. Schlosser, M. Voss, and L. Brückner, “Comparing and evaluating metrics for reputation systems by simulation,” in Proceedings of the IAT Workshop on Reputation in Agent Societies, 2004.
  21. M. Yang, L. Wang, and Y. Lei, “Research on evaluation of trust model,” in Proceedings of the International Conference on Computational Intelligence and Security (CIS '08), vol. 1, pp. 345–349, Suzhou, China, December 2008. View at Publisher · View at Google Scholar · View at Scopus
  22. H. Su and C. Zhu, “Application of entropy weight coefficient method in evaluation of soil fertility,” in Recent Advances in Computer Science and Information Engineering, vol. 126 of Lecture Notes in Electrical Engineering, pp. 697–703, Springer, Berlin, Germany, 2012. View at Publisher · View at Google Scholar