Information Technology Reference
In-Depth Information
4
A New Trust and Reputation-Based
Chain Mod el in Peer-to-Peer Networks
Sinjae Lee and Wonjun Lee
CoNTENTS
4.1 Introduction ................................................................................................ 128
4.1.1 Reputation-Based Trust Model .................................................... 128
4.2 The Approach ............................................................................................. 129
4.3 The Resource Chain Model (RCM) ......................................................... 130
4.3.1 Assumptions................................................................................... 130
4.3.2 Working the RCM .......................................................................... 130
4.4 Simulation ................................................................................................... 131
4.4.1 Assumptions................................................................................... 131
4.4.2 Simulation Data Collection........................................................... 132
4.4.3 Simulation Data Analysis ............................................................. 132
4.4.3.1 Efficiency .......................................................................... 132
4.4.3.2 Quick Convergence......................................................... 134
4.4.3.3 High Stability................................................................... 134
4.4.4 Comparison with Complain-Only Model.................................. 134
4.4.5 Evaluation ....................................................................................... 135
4.5 Conclusion .................................................................................................. 135
References............................................................................................................. 136
Computer security has attracted significant attention in recent times. This
is reflected in the fact that numerous mechanisms, both existing and new,
such as encryption, sandboxing, digital rights management, reputation-
based systems, and firewalls have been employed to enhance the security
of peer-to-peer (P2P) networks. Among the abovementioned mechanisms,
a reputation-based mechanism that is an active self-organized mechanism
without a controlling entity, is particularly useful for automatically record-
ing, analyzing, and even adjusting the metrics of reputation, trust, and
credibility among peers; it enables a system to self-adjust according to the
changes in credibility. This kind of a self-adjusting system is suitable for
the anonymous, dynamic, and variable P2P environments. With the aid of
the resource chain model (RCM), which is a novel reputation-based trust
127
 
Search WWH ::




Custom Search