Information Technology Reference
In-Depth Information
t i = (C T ) n c i and it can be shown that [Kamvar et al., 2003] t i will converge
to the same vector for all i. Specifically, t i will converge to the left principal
eigenvector of C.
Kamvar et al. suggested a probabilistic interpretation of EigenTrust: if an
agent searches for reputable peers, it can crawl to peer j with probability c ij .
After crawling for a while in this manner, the agent is more likely to be at
reputable peers than unreputable peers.
In a practical P2P system, there are always a set of enthusiastic peers (i.e.,
the peers that initiate the system) that warrant unconditional a priori trust.
To incorporate this feature in the EigenTrust model, Kamvar et al. modeled
such a set P of pre-trusted peers by a vector p i , where each element p ik = 1/|P|
if k∈P and p ik = 0 otherwise. Thus, each peer i can use this vector to
bootstrap the initial trust aggregation: t i (0)
= C T p i and t i (k+1)
= C T t i (k)
for
all k≥0.
To combat collusion where a set of malicious peers give each other high
reputation values, Kamvar et al. suggested a weighted approach:
t (k+1)
= (1−a)C T t (k) + ap
(6.5)
where a is some constant less than 1. Kamvar et al. offered a probabilistic
justification for this approach: when a peer is crawling the network, it is less
likely to get stuck crawling a malicious member of a collusion because there is
a non-zero probability that it ends up at a pre-trusted peer. Another merit of
this weighted approach is that the matrix C becomes irreducible and aperiodic,
thereby forcing the computation to converge.
Simulation results indicated that using EigenTrust to guide files download-
ing in a Gnutella-like network can reduce the number of bogus files downloaded
under a wide variety of threat scenarios.
However, as shown by Abrams et al. [Abrams et al., 2005], the EigenTrust
algorithm can also potentially facilitate a selfish peer to lie about its recom-
mendation to gain a higher trust value. Specifically, to maximize its trust, a
peer must always recommend a peer that recommended it. Consider the down-
load graph of Figure 6.3(a), and assume a uniform distribution for pre-trusted
peers over all n peers: if the middle peer reports a download from the right
peer, it will have trust (2−ǫ)ǫ
n . If, on the other hand, it reports a download
from the left peer, it will only have a trust value of 1/n.
Abrams et al. [Abrams et al., 2005] suggested a modified EigenTrust algo-
rithm which works by first creating a query topology and then making each
peer's trust independent of his/her reporting of downloads. Specifically, the
EigenTrust algorithm is modified as follows:
Initialization At the initialization of the modified algorithm, peers are
partitioned into groups evenly (depicted by different colors), where
C ={c 1 , c 2 , . . . , c m }is the set of partitions. Each color has either⌊ m
or⌈ m ⌉peers. The colors are arranged into a directed cycle chosen uni-
formly at random. Then,∀c∈C, let pred(c) be the color which is the
Search WWH ::




Custom Search