A Fuzzy Trust Management Based on Outlier Identification for P2P

Article Preview

Abstract:

In an open P2P network environment, it’s full of various malicious actions ,dishonesty, deceit, selfish and so on. So it’s necessary to build a robust trust manage system to keep the community run healthily. There are mainly two kinds of trust system, one is based on Global Trust. the system maintains a Global Trust value for every peer. The other one is based on peer itself, it rates the object peer trust according to historical transactions between them or recommendation from the other peers. Because the second trust manage system mainly bases on Fuzzy algorithm, we call it Fuzzy Trust system. The paper will focus on Fuzzy Trust system, we will introduce the related algorithms and involve Outlier Identification algorithm to alleviate the risk from malicious action.

You might also be interested in these eBooks

Info:

Periodical:

Advanced Materials Research (Volumes 204-210)

Pages:

678-682

Citation:

Online since:

February 2011

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2011 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] N. Christin, A.S. Weigend and J. Chuang, Content Availability, Pollution and Poisoning in File Sharing Peerto-Peer Networks, Proceedings of the 6th ACM Conference on Electronic Commerce.

DOI: 10.1145/1064009.1064017

Google Scholar

[2] Zhang Chunrui, Xu Ke, Wang Kaiyun, Jiang Jianguo, Trust Vector-based P2P Trust Management Model, Tsinghua Univ (Sci &Tech), 2007, vol. 47, No. 7.

Google Scholar

[3] Singh A, Liu Ling. TrustMe: Anonymous Management of Trust Relationships in Decentralized P2P Systems[C], Proc. of P2P'03. Washington D.C., IEEE Computer SocietyPress, 2003: 142-149.

DOI: 10.1109/ptp.2003.1231514

Google Scholar

[4] Jing Xi, Pengpeng, NieJiande Lu. A P2P Trust Model Based on Dynamic Fuzzy Theory – BGTR. 2008 International Symposiums on Information Processing.

DOI: 10.1109/isip.2008.62

Google Scholar

[5] D. M. Hawkins, Identification of Outliers,. Chapman and Hall, London, (1980).

Google Scholar

[6] Knorr, E.M., Ng, R.T., Finding Intentional Knowledge of Distance-Based Outliers, Proceedings of the 25thInternational Conference on Very Large Data Bases, Edinburgh, Scotland.

Google Scholar

[7] S. Ramaswamy, R. Rastogi, and K. Shim, Efficient Algorithms for Mining Outliers from Large Data Sets, " Proc. Int, l Conf. Management.

DOI: 10.1145/342009.335437

Google Scholar

[8] A. Arning, R. Agrawal, and P. Raghavan, A Linear Method for Deviation Detection in Large Databases, " Proc. Int, l Conf. Knowledge Discovery and Data Mining, 1996, pp.164-169.

Google Scholar