On the modeling of honest players in reputation systems
Journal of Computer Science and Technology - Special section on trust and reputation management in future computing systmes and applications
H-trust: a group trust management system for pee-to-peer desktop grid
Journal of Computer Science and Technology - Special section on trust and reputation management in future computing systmes and applications
Dishonest behaviors in online rating systems: cyber competition, attack models, and attack generator
Journal of Computer Science and Technology - Special section on trust and reputation management in future computing systmes and applications
A formal credit-based incentive model for sharing computer resources
EuroPar'10 Proceedings of the 16th international Euro-Par conference on Parallel processing: Part I
A distributed reputation and trust management scheme for mobile peer-to-peer networks
Computer Communications
An incentive mechanism to reinforce truthful reports in reputation systems
Journal of Network and Computer Applications
VectorTrust: trust vector aggregation scheme for trust management in peer-to-peer networks
The Journal of Supercomputing
Hi-index | 0.00 |
We propose a robust and lightweight group reputation system, called H-Trust, inspired by the h-index aggregation technique. Leveraging the robustness of the h-index algorithm under incomplete and uncertain circumstances, H-Trust offers a robust reputation evaluation mechanism for both individual and group trusts with minimal communication and computation overheads. The five phases of H-Trust scheme are presented in detail, including trust recording, local trust evaluation, trust query phase, spatial-temporal update phase, and group reputation evaluation phases. The rationale for its design, the analysis of the algorithm complexity and security level are further elaborated. To validate the performance of H-Trust scheme, we conduct multi-agent based simulations. Simulation results demonstrate that H-Trust is robust and can aggregate cooperative groups in systems even when the majority of users are malicious.