999精品在线视频,手机成人午夜在线视频,久久不卡国产精品无码,中日无码在线观看,成人av手机在线观看,日韩精品亚洲一区中文字幕,亚洲av无码人妻,四虎国产在线观看 ?

A Hierarchical Trust Model for Peer-to-Peer Networks

2019-05-10 05:59:10NehalAlOtaibyHebaKurdiandShiroqAlMegren
Computers Materials&Continua 2019年5期

Nehal Al-Otaiby,Heba Kurdi, and Shiroq Al-Megren

Abstract:Trust has become an increasingly important issue given society’s growing reliance on electronic transactions.Peer-to-peer (P2P) networks are among the main electronic transaction environments affected by trust issues due to the freedom and anonymity of peers (users) and the inherent openness of these networks.A malicious peer can easily join a P2P network and abuse its peers and resources,resulting in a large-scale failure that might shut down the entire network.Therefore,a plethora of researchers have proposed trust management systems to mitigate the impact of the problem.However,due to the problem’s scale and complexity,more research is necessary.The algorithm proposed here,HierarchTrust,attempts to create a more reliable environment in which the selection of a peer provider of a file or other resource is based on several trust values represented in hierarchical form.The values at the top of the hierarchical form are more trusted than those at the lower end of the hierarchy.Trust,in HierarchTrust,is generally calculated based on the standard deviation.Evaluation via simulation showed that HierarchTrust produced a better success rate than the well-established EigenTrust algorithm.

Keywords:Peer-to-peer network,trust management,reputation,malicious peers.

1 Introduction

Peer-to-peer (P2P) networks are comprised of a set of nodes that can directly communicate with each other without the need for a centralised server.Peers (users) in these networks are characterised by their anonymity,and anonymous peers can join or leave the network at any time.This makes P2P networks an ideal environment for malicious peers,who may provide harmful resources or act in a malicious manner.This,of course,puts the security of the network at risk and is considered to be one of the main challenges of P2P systems[Androutsellis-Theotokis and Spinellus (2004)].Therefore,the challenge of establishing trust relationships between peers to ensure reliable file/service sharing and safe etransactions is receiving increasing attention [Yang,Qin,Wang et al.(2010)].It is important to build trust relationships between peers to encourage sharing of resources[Bhise and Kamble (2016)].As a result of this increased interest,many researchers have focused on developing trust and reputation systems for various networks,e.g.[Kamvar,Schlosser and Garcia-Molina (2003); Kurdi (2015); Xiong and Liu (2017); Zhang,Zheng,Liu et al.(2011); Kurdi,Alshayban,Altoaimy et al.(2018); Bursell (2005); Mondal and Kitsuregawa (2006); Shala,Wacht,Trick et al.(2017); Zhao and Li (2013),Xie,Yuan,Zhou et al.(2018)].

EigenTrust is one of the most popular reputation algorithms used in P2P networks; this algorithm uses an eigenvector in its calculation of a trust value [Kamvar,Schlosser and Garcia-Molina (2003)].HonestPeer extends the original EigenTrust algorithm to overcome the issue of peers congregating around pre-trusted peers [Kurdi (2015)].HonestPeer selects the most reputable (i.e.,honest) peers dynamically based on the quality of the files each peer provides.Another trust-based algorithm,PeerTrust,calculates trust based on several factors such as feedback,number of transactions,credibility and community context factors[Xiong and Liu (2004)].Alternatively,algorithms such as GroupTrust organise peers into different groups based on their evaluation of the same or similar services [Zhang,Zheng,Liu et al.(2011)].In these instances,the evaluation of the trustworthiness of peers outside the group is based on their local and global reputations,which are aggregated from other peers.TrustFeer is another trust management system proposed for P2P federated clouds[Kurdi,Alshayban,Altoaimy et al.(2018)].The algorithm relies on subjective logic opinions that are based on the reputation of peers and on service level agreements (SLAs)when evaluating the trustworthiness of peers.

As shown above,the literature contains many trust models.However,none consider a trust hierarchy built from a peer’s direct experience,recommendations,reputation and feedback.This paper proposes HierarchTrust,a novel trust model that relies on the standard deviation in its trust calculations.HierarchTrust determines trust based on values assigned to various factors,including trust,reputation,feedback and recommendations,which are checked in order of their reliability as measures of trust.At the top of the trust hierarchy is direct experience,followed by recommendations and feedback,and finally reputation.There is more confidence in the elements at the top of the hierarchical form,and confidence in the trust ranking decreases as we move away from the top of the hierarchy.

The remainder of this paper is organised as follows.Section 2 describes the trust model in detail.Section 3 explains the methodology that has been followed in the experiments,while Section 4 provides the result and a discussion of the experiments.Finally,Section 5 presents the conclusions.

2 System design

In a P2P network,a file requester sends file requests to its neighbouring peers.After receiving the requested file,the peer gives a rating to the provider peer based on the authenticity of the file received.Trust value,reputation,feedback and recommendations are computationally derived from the positive and negative ratings given to each peer by their peers.The proposed model then determines the trustworthiness of the file providers in the P2P network.The model applies the standard deviation in its computation of trust in all the trust models used in HierarchTrust.Fig.1 illustrates the abstract architecture of the HierarchTrust algorithm.

Figure1:Abstract system model

The basic components of the proposed system include transactions,files and provider peers.The transactions component maintains all the transactions in the P2P network.The file component stores the files in the network and is utilised frequently by the transactions component and by peers.Each provider peer in the network houses the following components:

I.Trust manager:The trust manager is responsible for calculating trust after each transaction.It consists of two main components:good transactions and bad transactions,where the calculation of trust depends based on the file received.The trust manger receives trust ratings from the ratings database.

II.Ratings database:This database maintains a record of the ratings for each transaction.

III.Feedback manager:The feedback manager is comprised of two components:a rating matrix component,which records received ratings in a matrix,and a feedback calculation component,which calculates the level of trust in the feedback based on the ratings matrix.

HierarchTrust is based on four trust models,which increases the possibility of choosing a trusted peer from among all the peers in a P2P network.The trust computation model is comprised of the following elements:

I.A trust value computed based on a peer’s direct experience.

II.A trust value computed based on recommendations from a peer’s friends.

III.A trust value computed from the feedback ratings received from other peers who have transacted with the peer in the past about another peer in the network.

IV.A trust value computed based on the reputation ratings provided by each peer after each transaction.

The trust metric is computed as in Eq.(1):whereTVis the trust value,RECis the recommendation received from the peer’s friends,FBis the feedback rating andREPis the reputation of the provider.

The trust value (TV) is computed after each transaction using the standard deviation based on the positive and negative ratings received.After a good or a bad transaction,respectively,the trust value is calculated using Eq.(2) or Eq.(3):

or

whereNTis the new trust value,which is computed as NT=1-Standard deviation,andOTis the old trust value.

The recommendationRECis computed at each transaction when theTVis unavailable.TheRECis computed as follows:

whereR1is the first recommender andR2is the best friend of the first recommender if the first recommender does not have enough experience with the provider and so on.

The feedback (FB) is calculated for each transaction if neitherTVnorRECare available.FBrelies on the positive and negative ratings received for each transaction.Finally,ifTV,RECandFBare unavailable,the reputation (REP) is computed for each transaction.

3 Methodology

The proposed trust management system is used to assess the trustworthiness of peers in P2P networks.We hypothesise that utilising the proposed algorithm,HierarchTrust,will increase the success rate of good peers.To prove this hypothesis,the open source P2P trust simulator QTM was used to simulate a file-sharing P2P network [QTM].This is similar to the approach taken in previous studies [Kurdi,Alshayban,Altoaimy et al.(2018); Bursell (2005); Mondal and Kitsuregawa (2006); Shala,Wacht,Trick et al.(2017); Zhao and Li (2013); Lu,Wang,Xie et al.(2016)].The simulations were conducted on a system with an Intel Core i7 processor,1.80 GHz speed,and 8 GB RAM running Windows 10 Home (68 bit).Software tools include NetBeans IDE,Visual C++ 2010 Express and JGRASP version 1.8.8_23.

The performance of the proposed HierarchTrust algorithm is assessed comparatively against the well-established EigenTrust algorithm [Kamvar,Schlosser and Garcia-Molina(2003)].Success rate was utilised as a performance measure and was computed as follows:

The number of malicious peers was controlled in the evaluation to provide a representative sample of a P2P environment.The number of transactions was stabilised at 400 transactions,and the number of malicious peers was varied as 10,20,30,40,50,60 and 70 peers.Two models of attack were simulated:pure attacks and feedback-based attacks utilising both na? ve and collective strategies.The total number of peers was set at 300.The network also maintained a constant number of files,in this case,2000 files.

4 Results and discussion

The following results represent a practical application of the previously described methodology.The experimental setup considers two different types of attacks,pure attacks and feedback-based attacks,utilising na? ve and collective strategies,as shown in Figs.2,3,4,and 5,respectively.

Figure2:The success rate of good peers with a varying number of pure attacks from malicious peers and a na? ve strategy

Figs.2 and 3 illustrate the success rate of good peers under both the HierarchTrust algorithm and the EigenTrust algorithm as the number of malicious peers is increased from 10 to 70.The attacks shown in these figures are pure attacks that utilise either na? ve or collective strategies.HierarchTrust displays a better success rate than EigenTrust,even as the number of malicious peers is increased.Similar to EigenTrust,the success rate of good peers with HierarchTrust decreases as the number of malicious peers increases.

Figure3:The success rate of good peers with a varying number of pure attacks from malicious peers and a collective strategy

Figure4:The success rate of good peers with a varying number of feedback attacks from malicious peers and a na? ve strategy

Figure5:The success rate of good peers with a varying number of feedback attacks from malicious peers and a collective strategy

Figs.4 and 5 demonstrate the success rate of good peers under feedback-based attacks from a varying number of na? ve and collective malicious peers using the proposed algorithm and the EigenTrust algorithm.The figures clearly show the stability of HierarchTrust compared to the well-established EigenTrust approach.In fact,under the na? ve strategy (see Fig.4),the proposed algorithm outperforms EigenTrust for more than half of the malicious attacks shown.However,when a collective attack strategy was used,EigenTrust outperforms HierarchTrust (see Fig.5).

5 Conclusion

P2P networks are beneficial as a method for resource sharing,but the inherent openness of these systems makes them an ideal space in which malicious peers can prosper.Therefore,numerous trust and reputation models have been proposed to tackle this problem.This paper proposes HierarchTrust,a trust management system that computes trust based on standard deviation using various trust values (trust,reputation,feedback and recommendations),which are computationally derived from positive and negative ratings given to each peer by their peers.The performance of HierarchTrust was comparatively assessed in a simulated environment against EigenTrust to determine the success rate of good peers as the number of malicious peers was varied.The results show the superiority of the proposed algorithm under pure attacks in comparison to EigenTrust.HierarchTrust also proved stable under feedback-based attacks utilising na? ve strategies,but EigenTrust proved stronger against collective strategies.This limitation lends itself to future work.Several other types of threat will also be considered in the future.

主站蜘蛛池模板: 亚洲天堂网2014| 国产一区二区三区免费| 日本在线免费网站| 91无码网站| 国产伦精品一区二区三区视频优播| 91精品啪在线观看国产91| 国产国模一区二区三区四区| 亚洲最黄视频| 亚洲美女一区二区三区| 黄色在线网| 玩两个丰满老熟女久久网| 中文无码影院| 日本少妇又色又爽又高潮| 久久久噜噜噜| 91九色国产在线| 日韩国产综合精选| 国产美女在线观看| 亚洲精品你懂的| 免费毛片网站在线观看| 久久国产精品无码hdav| 欧美日韩午夜| 亚洲一区二区成人| 亚洲欧美一区二区三区图片| 九九九精品视频| 视频二区欧美| 亚洲视频免费播放| 999国产精品| 97久久超碰极品视觉盛宴| 亚洲美女操| 农村乱人伦一区二区| 国产精品第| 成人精品午夜福利在线播放| 成人福利在线视频免费观看| 无码精油按摩潮喷在线播放 | 国产高清无码第一十页在线观看| 久久精品国产精品国产一区| 国内熟女少妇一线天| 国产成人综合久久精品尤物| 国产爽妇精品| 色悠久久综合| 在线欧美a| 日日碰狠狠添天天爽| 一本一本大道香蕉久在线播放| 亚洲国产成人久久精品软件| 久久久久国产精品熟女影院| 午夜福利视频一区| 欧美伦理一区| 日韩av无码DVD| 国产产在线精品亚洲aavv| 亚洲成年人网| 日韩经典精品无码一区二区| 999国内精品久久免费视频| 九色91在线视频| 色网在线视频| 99国产精品免费观看视频| 99热最新网址| 97超爽成人免费视频在线播放| 国产无人区一区二区三区| 99激情网| 无码中文字幕精品推荐| 亚洲激情区| 午夜国产理论| 国产理论最新国产精品视频| 亚洲午夜福利在线| 欧美成人综合视频| 天天干伊人| 四虎亚洲精品| 国产激情无码一区二区APP| 在线亚洲小视频| 中文字幕乱码中文乱码51精品| 美女一级毛片无遮挡内谢| 免费人成又黄又爽的视频网站| 性欧美在线| 日韩一区精品视频一区二区| 国产成人综合久久精品下载| 国产精品黄色片| 欧美精品xx| 欧美不卡视频在线观看| 久久无码av三级| 欧美激情第一欧美在线| 亚洲成肉网| 久久久精品久久久久三级|