Table of Contents Author Guidelines Submit a Manuscript
Mathematical Problems in Engineering
Volume 2014 (2014), Article ID 189213, 11 pages
http://dx.doi.org/10.1155/2014/189213
Research Article

Prevention and Trust Evaluation Scheme Based on Interpersonal Relationships for Large-Scale Peer-To-Peer Networks

1Institute of Network Coding, The Chinese University of Hong Kong, Shatin, NT, Hong Kong
2Information Security Center, State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, P.O. Box 145, Beijing 100876, China
3Shenzhen Research Institute, The Chinese University of Hong Kong, Shenzhen 518057, China
4Shenzhen Key Laboratory of Network Coding Key Technology and Application, Shenzhen 518057, China
5Potsdam Institute for Climate Impact Research, 14473 Potsdam, Germany

Received 21 July 2014; Accepted 24 August 2014; Published 29 September 2014

Academic Editor: Haipeng Peng

Copyright © 2014 Lixiang Li et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. S. D. Kamvar, M. T. Schlosser, and H. Garcia-Molina, “The eigentrust algorithm for reputation management in p2p networks,” in Proceedings of the 12th International Conference on World Wide Web (WWW '03), pp. 640–651, May 2003. View at Publisher · View at Google Scholar · View at Scopus
  2. L. Xiong and L. Liu, “PeerTrust: Supporting reputation-based trust for peer-to-peer electronic communities,” IEEE Transactions on Knowledge and Data Engineering, vol. 16, no. 7, pp. 843–857, 2004. View at Publisher · View at Google Scholar · View at Scopus
  3. Z. Liang and W. Shi, “PET: a personalized trust model with reputation and risk evaluation for P2P resource sharing,” in Proceedings of the 38th Annual Hawaii International Conference on System Sciences, January 2005. View at Scopus
  4. A. Jøsang, R. Ismail, and C. Boyd, “A survey of trust and reputation systems for online service provision,” Decision Support Systems, vol. 43, no. 2, pp. 618–644, 2007. View at Publisher · View at Google Scholar · View at Scopus
  5. R. Zhou and K. Hwang, “PowerTrust: a robust and scalable reputation system for trusted peer-to-peer computing,” IEEE Transactions on Parallel and Distributed Systems, vol. 18, no. 4, pp. 460–473, 2007. View at Publisher · View at Google Scholar · View at Scopus
  6. K. Watanabe, Y. Nakajima, T. Enokido, and M. Takizawa, “Ranking factors in peer-to-peer overlay networks,” ACM Transactions on Autonomous and Adaptive Systems, vol. 2, no. 3, article no. 11, 2007. View at Publisher · View at Google Scholar · View at Scopus
  7. F. Sato, “Estimation of trustworthiness for P2P systems in a collusive attack,” International Journal of Web and Grid Services, vol. 4, no. 1, pp. 24–34, 2008. View at Publisher · View at Google Scholar · View at Scopus
  8. K. Chen, K. Hwang, and G. Chen, “Heuristic discovery of role-based trust chains in peer-to-peer networks,” IEEE Transactions on Parallel and Distributed Systems, vol. 20, no. 1, pp. 83–96, 2009. View at Publisher · View at Google Scholar · View at Scopus
  9. M. Jamali and M. Ester, “TrustWalker: a random walk model for combining trust-based and item-based recommendation,” in Proceedings of the 15th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD '09), pp. 397–405, July 2009. View at Publisher · View at Google Scholar · View at Scopus
  10. C. Tian and B. Yang, “R 2Trust, a reputation and risk based trust management framework for large-scale, fully decentralized overlay networks,” Future Generation Computer Systems, vol. 27, no. 8, pp. 1135–1141, 2011. View at Publisher · View at Google Scholar · View at Scopus
  11. X. Li, F. Zhou, and X. Yang, “A multi-dimensional trust evaluation model for large-scale P2P computing,” Journal of Parallel and Distributed Computing, vol. 71, no. 6, pp. 837–847, 2011. View at Publisher · View at Google Scholar · View at Zentralblatt MATH · View at Scopus
  12. G. Ciccarelli and R. Lo Cigno, “Collusion in peer-to-peer systems,” Computer Networks, vol. 55, no. 15, pp. 3517–3532, 2011. View at Publisher · View at Google Scholar · View at Scopus
  13. Z. Despotovic and K. Aberer, “P2P reputation management: probabilistic estimation vs. Social networks,” Computer Networks, vol. 50, no. 4, pp. 485–500, 2006. View at Publisher · View at Google Scholar · View at Scopus
  14. P. Dewan and P. Dasgupta, “P2P reputation management using distributed identities and decentralized recommendation chains,” IEEE Transactions on Knowledge and Data Engineering, vol. 22, no. 7, pp. 1000–1013, 2010. View at Publisher · View at Google Scholar · View at Scopus
  15. A. Satsiou and L. Tassiulas, “Reputation-based resource allocation in P2P systems of rational users,” IEEE Transactions on Parallel and Distributed Systems, vol. 21, no. 4, pp. 466–479, 2010. View at Publisher · View at Google Scholar · View at Scopus
  16. Y. Wang and A. Nakao, “Poisonedwater: an improved approach for accurate reputation ranking in P2P networks,” Future Generation Computer Systems, vol. 26, no. 8, pp. 1317–1326, 2010. View at Publisher · View at Google Scholar · View at Scopus
  17. A. Cheng and E. Friedman, “Sybilproof reputation mechanisms,” in Proceedings of the ACM SIGCOMM 3rd Workshop on the Economics of Peer-to-Peer Systems (P2PECON '05), pp. 128–132, August 2005. View at Publisher · View at Google Scholar · View at Scopus
  18. H. Yu, M. Kaminsky, P. B. Gibbons, and A. Flaxman, “Sybilguard: defending against sybil attacks via social networks,” in Proceedings of the 6th ACM SIGCOMM Conference on Internet Measurement, 2006.
  19. D. Quercia and S. Hailes, “Sybil attacks against mobile users: friends and foes to the rescue,” in Proceedings of the INFOCOM, 2010.
  20. A. Iamnitchi, M. Ripeanu, and I. Foster, “Small-world file-sharing communities,” in Proceedings of the 23rd Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM '04), vol. 2, pp. 952–963, March 2004. View at Publisher · View at Google Scholar
  21. E. Meshkova, J. Riihijärvi, M. Petrova, and P. Mähönen, “A survey on resource discovery mechanisms, peer-to-peer and service discovery frameworks,” Computer Networks, vol. 52, no. 11, pp. 2097–2128, 2008. View at Publisher · View at Google Scholar · View at Scopus
  22. M. Yang and Z. Fei, “A novel approach to improving search efficiency in unstructured peer-to-peer networks,” Journal of Parallel and Distributed Computing, vol. 69, no. 11, pp. 877–884, 2009. View at Publisher · View at Google Scholar · View at Scopus
  23. J. Liu, R. Sun, and K. Kwak, “Fair exchange signature schemes,” Science China Information Sciences, vol. 53, no. 5, pp. 945–953, 2010. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  24. T. Gamer, “Collaborative anomaly-based detection of large-scale internet attacks,” Computer Networks, vol. 56, no. 1, pp. 169–185, 2012. View at Publisher · View at Google Scholar · View at Scopus
  25. S. Marti and H. Garcia-Molina, “Taxonomy of trust: categorizing P2P reputation systems,” Computer Networks, vol. 50, no. 4, pp. 472–484, 2006. View at Publisher · View at Google Scholar · View at Scopus
  26. L. Mekouar, Y. Iraqi, and R. Boutaba, “Peer-to-peer's most wanted: malicious peers,” Computer Networks, vol. 50, no. 4, pp. 545–562, 2006. View at Publisher · View at Google Scholar · View at Scopus
  27. E. J. Anderson and T. D. H. Cau, “Implicit collusion and individual market power in electricity markets,” European Journal of Operational Research, vol. 211, no. 2, pp. 403–414, 2011. View at Publisher · View at Google Scholar · View at Scopus
  28. Y. Chen, W. S. Lin, and K. J. R. Liu, “Risk-distortion analysis for video collusion attacks: a mouse-and-cat game,” IEEE Transactions on Image Processing, vol. 19, no. 7, pp. 1798–1807, 2010. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  29. J. H. Park and D. H. Lee, “Fully collusion-resistant traitor tracing scheme with shorter ciphertexts,” Designs, Codes and Cryptography, vol. 60, no. 3, pp. 255–276, 2011. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  30. Y. Zhu, L. Huang, W. Yang, and X. Yuan, “Efficient collusion-resisting secure sum protocol,” Chinese Journal of Electronics, vol. 20, no. 3, pp. 407–413, 2011. View at Google Scholar · View at Scopus