Managing trust in a peer-2-peer information system
Proceedings of the tenth international conference on Information and knowledge management
An evidential model of distributed reputation management
Proceedings of the first international joint conference on Autonomous agents and multiagent systems: part 1
The Eigentrust algorithm for reputation management in P2P networks
WWW '03 Proceedings of the 12th international conference on World Wide Web
Supporting Trust in Virtual Communities
HICSS '00 Proceedings of the 33rd Hawaii International Conference on System Sciences-Volume 6 - Volume 6
Establishing trust in pure ad-hoc networks
ACSC '04 Proceedings of the 27th Australasian conference on Computer science - Volume 26
Spreading Activation Models for Trust Propagation
EEE '04 Proceedings of the 2004 IEEE International Conference on e-Technology, e-Commerce and e-Service (EEE'04)
A trust model of p2p system based on confirmation theory
ACM SIGOPS Operating Systems Review
An information-based model for trust
Proceedings of the fourth international joint conference on Autonomous agents and multiagent systems
A non-manipulable trust system based on EigenTrust
ACM SIGecom Exchanges
Trust model based on similarity measure of vectors in p2p networks
GCC'05 Proceedings of the 4th international conference on Grid and Cooperative Computing
iTrust'05 Proceedings of the Third international conference on Trust Management
Bayesian network trust model in peer-to-peer networks
AP2PC'03 Proceedings of the Second international conference on Agents and Peer-to-Peer Computing
Hi-index | 0.00 |
Many peer to peer (P2P) networks are used to share different types of files between users who are usually anonymous. To prevent the distribution of files that have been intentionally damaged, filled with false content or infected with malware, users need to be able to distinguish between trustworthy and malicious peers. One way to help a user in separating the good peers from the bad peers, is to provide him/her with a sophisticated trust algorithm that calculates the trustworthiness of any peer involved in a file sharing transaction. In this paper the results of a comparative study are presented as a first contribution. This study is based on taxonomy of 17 trust algorithms as found in literature. The evaluation is done by means of both a literature study and a series of simulation tests. By using the evaluation results, the advantages of each of the current algorithms are singled out, and next combined to develop and implement a new and better trust algorithm for file sharing in P2P networks. This is the second contribution.