The features of autonomy, anonymity and distribution make the P2P system vulnerable to malicious attack and abuse. A feasible resolution in such an open environment is to exploit a community-based trust model to build trust relationship between peers. However, the existing model ignores the dynamic feature, the scope of activity and the influence of peers. After analyzing the P2P user model, a topological potential based recommendation trust model is proposed to integrate the influences, transactions, and reputations of nodes. In this model, the trust metrics are divided into intra- and inter-community computing mechanism. Moreover, the algorithm of selecting super node is presented. Simulation results show that the proposed trust model is effective and robust.
Feldman M, Padimitriou C, Chuang J, et al.. Free-riding and whitewashing in peer-to-peer systems[J]. IEEE Selected Areas in Communications, 2006, 24(5): 1010-1019.
[2]
Saroiu S, Gummadi P K, and Gribble S D. A measurement study of peer-to-peer file sharing systems[C]. SPIE International Conference on Multimedia Computing and Networking, San Jose, USA, 2002: 156-170.
[3]
Huang Kun and Wang Lu. Research of trust model based on peer-to-peer network security[C]. IEEE International Conference on Information Technology and Applications, Chengdu, China, 2013: 126-129.
[4]
Ahmet C and Bharat B. SORT: a self-organizing trust model for peer-to-peer systems[J]. IEEE Transactions on Dependable and Secure Computing, 2013, 10(1): 14-27.
[5]
Kamvar D and Schlosser T. EigenRep: reputation management in P2P networks[C]. The 12th ACM International World Wide Web Conference, Budapest, Hungary, 2003: 123-134.
Dou Wen, Wang Huai-min, Jia Yan, et al.. A recommendation-based peer-to-peer trust model[J]. Journal of Software, 2004, 15(4): 571-583.
[7]
Han Qi-yi, Wen Hong, Ren Meng-yin, et al.. A topological potential weighted community-based recommendation trust model for P2P networks[OL]. http://link.springer.com/ article/10.1007/s12083-014-0288-9. 2014.6.
[8]
Zhou Run-fang, Hwang Kai, and Cai Min. GossipsTrust for fast reputation aggregation in peer-to-peer networks[J]. IEEE Transactions on Knowledge and Data Engineering, 2008, 20(9): 1282-1295.
[9]
Xu Hai-mei, Liu Yu-lin, Qi Shou-qing, et al.. A novel trust model based on probability and statistics for peer to peer networks[C]. IEEE International Conference on Quality, Reliability, Risk, Maintenance, and Safety Engineering, Chengdu, China, 2013: 2047-2050.
[10]
Wang Guo-jun, Felix M, Guo Song, et al.. Neighbor similarity trust against sybil attack in P2P e-commerce[J]. IEEE Transactions on Parallel and Distributed Systems, DOI: 10.1109/TPDS.2014.2312932.
[11]
Li Xiong and Ling Liu. PeerTrust: supporting reputation- based trust for peer-to-peer electronic communities[J]. IEEE Transactions on Knowledge and Data Engineering, 2004, 16(7): 843-857.
Tian Chun-qi, Jiang Jian-hui, Hu Zhi-guo, et al.. A novel super peer based trust model for peer to peer networks[J]. Chinese Journal of Computers, 2010, 33(2): 345-355.
[13]
Adele J, Rameez R, Tamas V, et al.. Systemic risk and user-level performance in private P2P communities[J]. IEEE Transactions on Parallel and Distributed Systems, 2013, 24(12): 2503-2512.
[14]
Niu Chang-yong, Luo Heng, Fan Ming, et al.. On feedback similarity measurement in web of trust[C]. IEEE Global Congress on Intelligent Systems, Xiamen, China, 2009, 3: 33-37.
[15]
Wang Jun-she, Li Xiao-long, and Zhang Yun. Research of P2P network trust model[C]. IEEE International Conference on Intelligent Human-Machine Systems and Cybernetics, Hangzhou, China, 2013: 70-73.
Zhang Jian-pei, Li Hong-bo, Yang Jing, et al.. An importance-sorting algorithm of network community nodes based on topological potential[J]. Journal of Harbin Engineering University, 2012, 33(6): 745-752.
Gan Wen-yan, He Nan, Li De-yi, et al.. Community discovery method in networks based on topological potential[J]. Journal of Software, 2009, 20(8): 2241-2254.
Wang Zi-hou, Han Yan-ni, Lin Tao, et al.. Resource allocation algorithms in the reconfigurable network based on network centrality and topology potential[J]. Journal on Communications, 2012, 33(8): 10-20.