Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 33122
Understanding and Measuring Trust Evolution Effectiveness in Peer-to-Peer Computing Systems
Authors: Farag Azzedin, Ali Rizvi
Abstract:
In any trust model, the two information sources that a peer relies on to predict trustworthiness of another peer are direct experience as well as reputation. These two vital components evolve over time. Trust evolution is an important issue, where the objective is to observe a sequence of past values of a trust parameter and determine the future estimates. Unfortunately, trust evolution algorithms received little attention and the proposed algorithms in the literature do not comply with the conditions and the nature of trust. This paper contributes to this important problem in the following ways: (a) presents an algorithm that manages and models trust evolution in a P2P environment, (b) devises new mechanisms for effectively maintaining trust values based on the conditions that influence trust evolution , and (c) introduces a new methodology for incorporating trust-nurture incentives into the trust evolution algorithm. Simulation experiments are carried out to evaluate our trust evolution algorithm.Keywords: P2P, Trust, Reputation, Incentives.
Digital Object Identifier (DOI): doi.org/10.5281/zenodo.1084888
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1271References:
[1] D. P. Anderson, J. Cobb, E. Korpela, M. Lebofsky, and D. Werthimer, "SETI@home: An experiment in public-resource computing," Communications of the ACM, Vol. 45, No. 11, Nov. 2002, pp. 56-61.
[2] R. Arienghieri, E. Damiani, S. Vimercati, S. Paraboschi, and P. Samarati, "Fuzzy techniques for trust and reputation management in anonymous peer-to-peer systems," JASIST, Vol. 57, No. 4, 2006, pp. 528-537.
[3] F. Azzedin and M. Maheswaran, "A trust brokering system and its application to resource management in public-resource grids," 2004 International Parallel and Distributed Processing Symposium (IPDPS 2004), Apr. 2004.
[4] F. Azzedin, M. Maheswaran, and A. Mitra, "Trust brokering and its use for resource matchmaking in public-resource grids," Journal of Grid Computing, Vol. 4, No. 3, 2006, pp. 247-263.
[5] R. Brayanrd, D. Kosic, A. Rodriguez, J. Chase, and A. Vahdat, "Opus: An overlay peer utility service," 15th International Conference on Open Architectures and Network Programming (OPENARCH), June 2002.
[6] J. S. Chase, D. C. Anderson, P. N. Thakar, and A. M. Vahdat, "Managing energy and server resources in hosting centers," 18th Symposium Operating Systems Principles (SOSP), Oct. 2001.
[7] C. Corritore, B. Kracher, and S. Wiedenbeck, "On-line trust: concepts, evolving themes, a model," International Journal of Human Computer Studies, Vol. 58, No. 6, June 2003, pp. 737-758.
[8] B. Dragovic, S. Hand, T. Harris, E. Kotsovinos, and A. Twigg, "Managing trust and reputation in the XenoServer open platform," 1st International Conference on Trust Management (iTrust 2003), May 2003, pp. 59-74.
[9] I. Foster and A. Iamnitchi, "On death, taxes, and the convergence of peer-to-peer and Grid computing," 2nd International Workshop on Peerto- Peer Systems (IPTPS03), Feb. 2003.
[10] T. Grandison, Trust Management for Internet Applications, PhD thesis, Dept. of Computing, University of London, July 2003.
[11] M. Kim and B. Noble, "Mobile networks estimation," 7th Annual Conference Mobile Computing and Networking, July 2001.
[12] J. Lewis and A. Weigert, "Trust as a social reality," Social Forces, Vol. 63, No. 4, Jun. 1985, pp. 967-985.
[13] N. Luhmann, "Familiarity, confidence, trust: Problems and alternatives," in Trust: Making and Breaking Cooperative Relations, D. Gambetta, ed., Basil Blackwell, New York, 1988, pp. 94-107.
[14] B. Misztal, "Trust in modern societies," Polity Press, Cambridge MA, 1996.
[15] H. Nissenbaum, "Will security enhance trust online, or supplant it?," in Trust and Distrust Within Organizations: Emerging Perspectives, Enduring Questions, R. Kramer and K. Cook, eds., Russell Sage Publications, New York, NY, 2004, pp. 155-188.
[16] A. Oram, ed., Peer-to-Peer: Harnessing the Power of Disruptive Technologies, O-Reilly and Associates, Sebastopol, CA, 2001.
[17] M. A. Patton and A. Josang, "Technologies for trust in electronic commerce," Electronic Commerce Research, Vol. 4, No. 1, Jan. 2004.
[18] D. Quercia, S. Hailes, and L. Capra, "B-trust: Bayesian trust framework for pervasive computing," 4th International Conference on Trust Management (iTrust), May 2006.
[19] B. Urgaonkar, P. Shenoy, and T. Roscoe, "Resource overbooking and application profiling in shared hosting platforms," 5th Symposium on Operating Systems Design and Implementation (OSDI 2002), Dec. 2002.
[20] B. Yang and H. Garcia-Molina, "Designing a super-peer network," 19th International Conference on Data Engineering (ICDE), (Banbalore, India), Mar. 2003.