Professional Documents
Culture Documents
Unit V-Trust and Reputation
Unit V-Trust and Reputation
Introduction
• P2P computing systems are widely used in distributed file sharing,
messaging, online chatting, video streaming, and social networking.
• Unlike a traditional distributed system, P2P networks are
autonomous and self-organized with free participation from the peers
or clients.
• In a P2P network, peers share computing and data resources with
others.
• All peers offer a mixture of online services on a voluntary basis.
• There are economical advantages as well as legal problems in today’s
P2P networks and their open applications.
Distinction between Client/Server and P2P Architectures
• The traditional client/server architecture is formed with many client hosts surrounding a
server node; see Figure 8.2(a).
• A P2P computing system is formed with peer hosts that are fully distributed without using a
centralized server; see Figure 8.2(b).
• In other words, the client/server architecture is server-oriented.
• The server splits a task into many parts and dispatches the parts to the clients.
• The clients complete the task assigned to them independently and seldom communicate
with one another.
• The clients require resources from the server and the server delivers the required
resources to the clients.
• On the contrary, in a P2P network, participating clients (peers) all play equal roles.
• They exchange resources with one another directly.
• Peers are autonomous, self-organizing, and thus less structured, less secure, and less
controllable than those of client/server systems.
Trust, Reputation & Security
Management in P2P Systems
Introduction
• The anonymous and dynamic nature of peer activities makes P2P networks very vulnerable
to abuses by selfish and malicious peers.
• For example, most P2P file-sharing networks (e.g., Gnutella) consist of autonomous peers
with special self-interests.
• There is no efficient way to prevent malicious peers from joining open networks.
• To encourage resource sharing among peers and combat malicious peer behavior, trust
and reputation management becomes critical to maintain the normal operation of P2P
networks.
• Without trust, peers will have little incentive to contribute their resources to other peers.
• The peers may hesitate to interact with unknown peers due to the concern of receiving
corrupted or poisoned files or being exploited by malware.
• Identifying trustworthy peers demands reputation systems in commercial P2P applications,
such as for online shopping, auctioning, content delivery, pay-per-transaction, etc.
Trust & Reputation
• Trust - refers to the belief of one peer on another, based on his direct
experiences with the peer
• Reputation - a collective opinion on a peer by other peers based on
recommendations
• A fair reputation system is thus needed to establish the trust or
distrust among peers, based on recorded historical behaviors of the
peers.
• The purpose is to distinguish good peers from bad ones has to be
done through a scientific screening process
Trust Matrix for Computing Reputations
• Consider an overlay network for global
reputation aggregation in a P2P system
over five peers, denoted by nodes N1,
N2,…, N5 of a directed graph shown in
Figure 8.23.
• The trust relationships among the peers
are represented by a square trust
matrix M(t) = [mij (t)], where mij (t) is
the local score issued by node i in
evaluating node j at time t.
• All trust scores are fractions in the
range (0, 1) with 0 meaning no trust
(or no contact) and 1 for 100 percent
trust.
Trust Matrix for Computing Reputations