Immunizing online reputation reporting systems against unfair ratings and discriminatory behavior
Proceedings of the 2nd ACM conference on Electronic commerce
A vector space model for automatic indexing
Communications of the ACM
Peer-to-Peer: Harnessing the Power of Disruptive Technologies
Peer-to-Peer: Harnessing the Power of Disruptive Technologies
Valuation of Trust in Open Networks
ESORICS '94 Proceedings of the Third European Symposium on Research in Computer Security
The Eigentrust algorithm for reputation management in P2P networks
WWW '03 Proceedings of the 12th international conference on World Wide Web
A reputation-based trust model for peer-to-peer ecommerce communities [Extended Abstract]
Proceedings of the 4th ACM conference on Electronic commerce
Shilling recommender systems for fun and profit
Proceedings of the 13th international conference on World Wide Web
A survey of peer-to-peer content distribution technologies
ACM Computing Surveys (CSUR)
TrustGuard: countering vulnerabilities in reputation management for decentralized overlay networks
WWW '05 Proceedings of the 14th international conference on World Wide Web
Trust algorithms in P2P file sharing networks
International Journal of Internet Technology and Secured Transactions
A time-frame based trust model for p2p systems
ICISC'06 Proceedings of the 9th international conference on Information Security and Cryptology
Hi-index | 0.00 |
For the rationality and selfishness of peers, the traditional security schemes can hardly solve the fake services providing and free-ridings in P2P networks. The trust model based on reputation can restrain the malicious behaviors, and avoid malicious peers abusing of resources. However, it suffers much from dishonest feedbacks and strategically altering behaviors of malicious peers. Recurring to the trust model of society network, a trust model based on similarity measure of vectors and a distributed implementation scheme based on R-Chain are proposed. In this model, “time-sensitive factor” has improved the sensitiveness of detecting peers’ behaviors, “service-type factor” and recommendation trust based on similarity measure of vectors have prevented collusion and bad-mouthing among peers. Consequently, theoretic analysis and simulation show that this model is effective and has favorable feasibility of implementation.