Professional Documents
Culture Documents
net/publication/4019865
CITATIONS READS
393 1,055
2 authors:
Some of the authors of this publication are also working on these related projects:
All content following this page was uploaded by Li Xiong on 23 May 2014.
ties [7, 19] The total number of files a peer shares can be
vice provided by . The trust model should consider poten-
seen as a type of community context and be taken into ac-
tial threats. For example, a peer may make false statements
count when evaluating the trustworthiness of a peer. With
about another peer’s service due to jealousy or other types
such a community context factor, a peer that shares a large
of malicious motives. Consequently a trustworthy peer may
number of files with the rest of the peers in the community
end up getting a large number of false statements. With-
will have a higher trust value than the free riders and allevi-
out a credibility factor built in, this peer will be evaluated
ate the free riding problem.
incorrectly because of false statements even though it pro-
vides satisfactory service in every transaction. Therefore,
the feedback from those with better credibility should be 3.3 General Trust Metric
weighted more heavily in the trust metric. Intuitively incor-
porating credibility factor for feedbacks represents the need We have discussed the importance of each trust parame-
to differentiate the credible amounts of satisfaction from the ter we identified. In this section we formalize these param-
less credible ones in computing the reputation of peers. If eters and present a general trust metric that combines them
we consider reputation-based trust as an important mech- in a coherent manner.
Let denote the total number of transactions per- bound to each transaction. The system solicits feedback
formed by peer during the given period,
denote the after each transaction and the two participating peers give
other participating peer in peer ’s th transaction,
feedback about each other based on the current transaction.
denote the normalized amount of satisfaction peer re- Feedback systems differ with each other in their feedback
ceives from
in its th transaction,
de- format. They can use a positive format,
a negative format,
note the credibility of the feedback submitted by , a numeric rating or a mixed format.
is a normalized
denote the adaptive transaction
context factor for amount of satisfaction between 0 and 1 that can be com-
peer ’s th transaction, and denote the adaptive puted based on the feedback.
community context factor for peer during the given pe-
riod. The trust value of peer during the period, denoted
Both the feedbacks and the number of transactions are
by , is defined as:
quantitative measures and can be collected automatically.
2436578":9;< =>243?5768"@AB243657 Different from these two basic parameters, the third trust
!#"#$&-%(.'*),/1+ 0 "H9GAB
CD EGF (1) parameter credibility of feedback is a qualitative mea-
sure and needs to be computed based on past behavior of
peers who file feedbacks. Different approaches can be used
The metric consists of two parts. The first part is the
to determine the credibility factor and compute the credi-
average amount of credible satisfaction a peer receives for
ble amount of satisfaction. One way is to solicit separate
each transaction. It may take into account transaction con-
feedbacks for feedbacks themselves. This makes the prob-
text factor to capture the transaction-dependent characteris-
lem of reputation-based trust management more complex.
tics. This history-based evaluation can be seen as a predic-
A simpler approach is to infer or compute the credibility
tion for peer ’s likelihood of a successful transaction in the
value of a peer implicitly. For example, one may use a
future. A confidence value can be computed and associated
function of the trust value of a peer as its credibility factor
with the trust metric that may reflect the number of trans-
so feedbacks from trustworthy peers are considered more
actions, the standard deviation of the ratings depending on
credible and thus weighted more than those from untrust-
different communities.
worthy peers. This solution is based on two assumptions.
The second part of the metric adjusts the first part by an
First, untrustworthy peers are more likely to submit false or
increase or decrease of the trust value based on community-
misleading feedbacks in order to hide their own malicious
specific characteristics and situations. I and J denote the
behavior. Second, trustworthy peers are more likely to be
normalized weight factors for the two parts.
honest on the feedbacks they provide.
This general trust metric may have different appearances
depending on which of the parameters are turned on and
how the parameters and weight factors are set. The design It is widely recognized that the first assumption is gen-
choices depend on characteristics of communities. We ar- erally true but the second assumption may not be true at all
gue that the first three parameters the feedback, the num- time. For example, it is possible (though not common) that
ber of transactions, and the credibility of feedback source a peer may maintain a good reputation by performing high
are the important basic trust parameters that should be con- quality services but send malicious feedbacks to its com-
sidered in computation of a peer’s trustworthiness in any petitors. In this extreme case, using a function of trust to
P2P eCommerce communities. approximate the credibility of feedbacks will generate er-
rors. This is because the reputation-based trust in PeerTrust
3.4 The Basic Metric model is established in terms of the quality of service pro-
vided by peers, rather than the quality of the feedbacks filed
We first consider the basic form of the general metric by by peers. Therefore it cannot handle the situation of incon-
K
turning off the transaction context factor (
MLON ) sistent behavior, such as peers offering good services but
and the community context factor (IPLQN and JRLTS ): providing false feedbacks to jeopardize its competitors.
2436578":9;< =>2436576
2# $ -%(.'*),/ + 0
CU (2) We believe that the study of what determines the preci-
sion of credibility of feedbacks is by itself an interesting and
This metric computes the trust value of a peer by an av- hard research problem that deserves attention of its own.
erage of the credible amount of satisfaction peer receives Given that one of the design goals of the PeerTrust model
for each transaction performed during the given period. is to emphasize on the roles of different trust parameters in
The feedbacks in terms of amount of satisfaction are computing trustworthiness of peers, in the rest of the pa-
collected by a feedback system. PeerTrust model uses a per we will use a function of trustworthiness of a peer to
transaction-based feedback system, where the feedback is approximate the credibility of feedbacks filed by this peer.
3.5 Adapting the Metric Using Context Factors
243657" 9;, => 3?576
!" $ -2% .' )</1+ 0 " AB
We have discussed the motivations and scenarios for in-
CD2 E F DC (5)
!"#%$&'
Providing Incentives to Rate where K is the threshold trust value for peer
The incentive problem of reputation systems can be ad- to trust another peer. ( !"#%$&'
dressed by building incentives into the metric through com- The factors that determine the threshold K
munity context factor. This can be accomplished by provid- include how much peer is willing to trust others. A more
ing a small increase in reputation whenever a peer provides tolerant peer may have a lower threshold. It is a manifest of
feedback to others. The community context factor can be what is called dispositional trust [18], the extent to which
defined as a ratio of total number of feedbacks peer
give an entity has a consistent tendency to trust across a broad
others during the given time period, denoted as , over spectrum of situations and entities. Other factors include
the total number of transactions peer has. The weight fac- the context of the potential transaction. For example, a more
tors can be tuned to control the amount of reputation that expensive transaction may require a higher threshold.
can be gained by rating others. If we turn off the transaction More complex decision rules can be applied and are not
context factor, we have the adapted metric: our focus in this paper. Interested readers may refer to [17]
for a number of models that derive a trust relationship from value vector on the right side of the equation to a default
different parameters in an eCommerce environment. value, say 1. As we collect more transaction histories for
A second usage is to compare the trustworthiness of a each peer, we repeatedly compute the trust vector until it
list of peers. For example, in a file sharing community converges.
like Gnutella, a peer who issues a file download request can We can easily see that this computation is very expen-
compare the trustworthiness of the peers that respond to its sive in a distributed environment where there is no central
request based on their trust value and choose the peer with database to manage the trust data and the trust data are dis-
the highest trust value to download the file. tributed and dynamically maintained over the peer network.
Furthermore, the trust values of peers can be used to Every time when a peer is interested in evaluating the trust-
compute the aggregate trust values of a peer group in or- worthiness of another peer or a small subset of peers, it has
der to derive a trust relationship for a task that requires a to retrieve the trust data of all peers in the community. To
group of peers. address this high communication cost, we propose an ap-
proximate computation by maintaining a trust cache at each
4 AN EXAMPLE TRUST METRIC peer to provide a more cost-effective computation.
Each peer maintains a trust cache that keeps the trust val-
We have presented a general trust metric for evaluating ues it has computed for other peers in the past and uses the
the trustworthiness of peers in a P2P eCommerce commu- available cached trust values as the credibility factors when
nity. In this section we present a concrete metric with its computing this concrete trust metric. It thus eliminates the
computation to illustrate our trust model. The metric is also recursive computation. The trust value of peer is com-
used to conduct experiments and study the feasibility, effec- puted at peer as follows:
9 2 43,>"@!" H 3<
tiveness, and benefits of our trust model. 2# $
.
This metric uses a complaint based feedback system and ) DC 8 (10)
assumes peers are rational in a game theoretic sense, i.e. #%$&#%"<
trustworthy peers do not file fake complaints and untrust- where > is the trust value of peer in peer
worthy peers file fake complaints when they misbehave dur- ’s cache or a default trust value if it is not available in the
ing a transaction. With a complaint system, if a peer re- cache.
ceives a complaint from another peer during its th trans-
action, it simply means the peer receives 0 amount of sat- 5 EXPERIMENTAL EVALUATION
isfaction for this transaction and is set to 0, other-
wise the peer is considered to have a satisfactory perfor-
We performed three sets of initial experiments to eval-
mance and
is set to 1. The trust value of a peer uate PeerTrust approach and show its feasibility, effective-
is used as the credibility factor to weight the complaints ness, and benefits. The first set of experiments evaluates
the peer files against other peers. Thus, the total credible PeerTrust in terms of its accuracy. The second set of exper-
amount of satisfaction peer receives can be measured as
iments demonstrates the benefit of PeerTrust model when it
4 4 where > is the total number
trustworthy peers to interact with untrustworthy peers and Trust Evaluation Accuracy
1
0.5
Trust Evaluation Accuracy
1
0.4
0 1 2 3 4 5 6 7 8 9 10
Transaction Skew Factor (Sk)
0.95
Trust Evaluation Accuracy
0.9
Figure 2. Trust Evaluation Accuracy with
Transaction Skew ( ' L N , L S2N ,
"
0.85 , L N<S S )
0.8
0.86