Trust²: Developing trust in peer-to-peer environments

Yan Wang*, Vijay Varadharajan

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionpeer-review

41 Citations (Scopus)
28 Downloads (Pure)

Abstract

In peer-to-peer (P2P) environments, a peer needs to interact with unknown peers for the services provided. This requires the trust evaluation prior to and posterior to interactions. This paper presents Trust2: a novel and dynamic peer trust evaluation model, which aims to measure the credibility of peers' recommendations, and thus to filter noise in responses and obtain more accurate and objective trust values. In our model, prior to any interaction, the trust value results from the evaluations given by other peers. Posterior to interactions, the trust values results from both other peers ' evaluations and the requesting peer's experience. In the aggregation of trust evaluations, the weight to the requesting peer becomes higher and higher. Meanwhile, during this process, the credibility of each responding peer's recommendation can be measured round by round. This leads to the filtering of low credibility peers and the improvement of trust evaluations.

Original languageEnglish
Title of host publicationProceedings - 2005 IEEE International Conference onServices Computing, SCC 2005
EditorsSandeep Purao, Hai Jin, Frank Leymann
Place of PublicationLos Alamitos, CA
PublisherInstitute of Electrical and Electronics Engineers (IEEE)
Pages24-31
Number of pages8
VolumeI
ISBN (Print)0769524087, 9780769524085
DOIs
Publication statusPublished - 2005
Event2005 IEEE International Conference on Services Computing, SCC - 2005 - Orlando, United States
Duration: 11 Jul 200515 Jul 2005

Other

Other2005 IEEE International Conference on Services Computing, SCC - 2005
Country/TerritoryUnited States
CityOrlando
Period11/07/0515/07/05

Bibliographical note

Copyright 2005 IEEE. Reprinted from Proceedings of the 2005 IEEE international conference on services computing. This material is posted here with permission of the IEEE. Such permission of the IEEE does not in any way imply IEEE endorsement of any of Macquarie University’s products or services. Internal or personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution must be obtained from the IEEE by writing to [email protected]. By choosing to view this document, you agree to all provisions of the copyright laws protecting it.

Fingerprint

Dive into the research topics of 'Trust²: Developing trust in peer-to-peer environments'. Together they form a unique fingerprint.

Cite this