• Articles • Previous Articles     Next Articles

Characterizing Economic and Social Properties of Trust and Reputation Systems in P2P Environment

Yu-Feng Wang1, Yoshiaki Hori2, and Kouichi Sakurai2   

  1. 1College of Telecommunications and Information Engineering, Nanjing University of Posts and Telecommunications, Nanjing 210000, China 2Department of Computer Science and Communication Engineering, Kyushu University, Fukuoka 812-0053, Japan
  • Received:2007-07-07 Revised:2007-10-18 Online:2008-01-15 Published:2008-01-10

Considering the fact that P2P (Peer-to-Peer) systems are self-organized and autonomous, social-control mechanism (like trust and reputation) is essential to evaluate the trustworthiness of participating peers and to combat the selfish, dishonest and malicious peer behaviors. So, naturally, we advocate that P2P systems that gradually act as an important information infrastructure should be multi-disciplinary research topic, and reflect certain features of our society. So, from economic and social perspective, this paper designs the incentive-compatible reputation feedback scheme based on well-known economic model, and characterizes the social features of trust network in terms of efficiency and cost. Specifically, our framework has two distinctive purposes: first, from high-level perspective, we argue trust system is a special kind of social network, and an accurate characterization of the structural properties of the network can be of fundamental importance to understand the dynamics of the system. Thus, inspired by the concept of weighted small-world, this paper proposes new measurements to characterize the social properties of trust system, that is, high global and local efficiency, and low cost; then, from relative low-level perspective, we argue that reputation feedback is a special kind of information, and it is not free. So, based on economic model, VCG (Vickrey-Clarke-Grove)-like reputation remuneration mechanism is proposed to stimulate rational peers not only to provide reputation feedback, but truthfully offer feedback. Furthermore, considering that trust and reputation is subjective, we classify the trust into functional trust and referral trust, and extend the referral trust to include two factors: similarity and truthfulness, which can efficiently reduce the trust inference error. The preliminary simulation results show the benefits of our proposal and the emergence of certain social properties in trust network.

Key words: radiosity; incremental radiosity; progressive refinement; object Coherence;

[1] Sergio M, Hector G M. Limited reputation sharing in P2P systems. In -\it Proc. the 5th ACM Conference on Electronic Commerce $($EC$)$}, New York, USA, 2004, pp.91--101.

[2] Sonja Buchegger, Jean-Yves Le Boudec. A robust reputation system for P2P and mobile Ad-hoc networks. In -\it Proc. the Second Workshop on the Economics of Peer-to-Peer Systems $($P2PEcon$)$}, Harvard University, Cambridge, MA, June 2004.

[3] Minaxi Gupta, Paul Judge, Mostafa Ammar. A reputation system for Peer-to-Peer networks. In -\it Proc. the ACM Int. Workshop on Network and Operating Systems Support for Design Audio and Video $($NOSSDAV$)$}, Monterey, CA, USA, 2003, pp.144--152.

[4] Rohit Gupta, Arun K. Somani. Reputation management framework and its use as currency in large-scale Peer-to-Peer networks. In -\it Proc. the 4th International Conference on Peer-to-Peer Computing$($P2P$)$}, Zurich, Switzerland, 2004, pp.124--132.

[5] Prashant Dewan, Partha Dasgupta. Securing P2P networks using peer reputations: Is there a silver bullet In -\it Proc. IEEE Consumer Communications and Networking Conference$($CCNC$)$}, Las Vegas, US, 2005, pp.30--36.

[6] Jianhua Ma -\it et al}. Ubisafe Computing: Vision and Challenges (I). In -\it Proc. the 3rd International Conference on Autonomic and Trusted Computing $($ATC$)$}, Wuhan and Three gorges, China, -\it LNCS} 4158, 2006, pp.386--397.

[7] Ken'ichi Takahashi, Zhaoyu Liu, Kouichi Sakurai, Makoto Amamiya. An approach of trusted program generation for user-responsible privacy. In -\it Proc. the 4th International Conference on Ubiquitous Intelligence and Computing $($UIC$)$}, Hongkong, China, July 2007, pp.1159--1170.

[8] Zhang Y, Fujise M. Security management in the next generation wireless networks. -\it International Journal of Network Security $($IJNS$)$}, 2006, 3(1): 1--7.

[9] Chuang Lin, Xue-Hai Peng. Research on network architecture with trustworthiness and controllability. -\it Journal of Computer Science and Technology}, 2005, 21(5): 732--739.

[10] Adar E, Huberman B. Free riding on Gnutella. -\it FirstMonday}, 2000, 5(10).

[11] Miller N H, Resnick P, Zeckhauser R J. Eliciting honest feedback in electronic markets. KSG Working Paper Series, RWP02-039, 2002.

[12] Radu Jurca, Boi Faltings. An incentive-compatible reputation mechanism. In -\it Proc. IEEE Conference on E-Commerce $($CEC$)$}, California, USA, 2003, pp.285--292.

[13] J\o sang A, Hayward R, Pope S. Trust network analysis with subjective logic. In -\it Proc. the 29th Australasian Computer Science Conference}, 2006, pp.85--94.

[14] J\o sang A, Ismail R, Boyd C. A survey of trust and reputation systems for online service provision. -\it Decision Support Systems}, 2007, 43(2): 618--644.

[15] Wang Y, Vassileva J. Trust-based community formation in peer-to-peer file sharing networks. In -\it Proc. the IEEE/WIC/ACM Int. Conf. Web Intelligence $($WI$)$}, Beijing, China, 2004, pp.341--348.

[16] Zhou R, Hwang K. PowerTrust: A robust and scalable reputation system for trusted P2P computing. -\it IEEE Trans. Parallel and Distributed Systems}, 2007, 18(4): 460--473.

[17] Sergio Marti, Prasanna Ganesan, Hector Garcia-Molina. SPROUT: P2P routing with social networks. In -\it Proc. the International Workshop on Peer-to-Peer Computing $\&$ DataBases $($P2P$\&$DB$)$}, 2004, Heraklion, Crete, Greece, pp.425--435.

[18] Lee S, Sherwood R, Bhattacharjee B. Cooperative peer groups in NICE, In -\it Proc. IEEE Conf. Computer Comm. $($INFOCOM$)$}, San Francisco, USA, 2003, pp.1272--1282.

[19] Tim Moreton, Andrew Twigg. Enforcing collaboration in Peer-to-Peer routing services. In -\it Proc. the First International Conference on Trust Management}, Heraklion, Crete, Greece, 2003, pp.255--270.

[20] Gayatri S, Zhao B Y, Almeroth K. Decoupling service and feedback trust in a Peer-to-Peer reputation system. In -\it Proc. the 1st International Workshop on Applications and Economics of Peer-to-Peer Systems $($AEPP$)$}, Nanjing, China, 2005, pp.82--90.

[21] Wang Y, Vassileva J. Trust and reputation model in Peer-to-Peer networks. In -\it Proc. the 3rd Int. Conf. Peer-to-Peer Computing}, Linkoping, Sweden, 2003, pp.372--378.

[22] Papaioannou T G, Stamoulis G D. An incentives' mechanism promoting truthful feedback in Peer-to-Peer systems. In -\it Proc. the 5th IEEE/ACM International Symposium in Cluster Computing and the Grid}, Cardiff, Wales, UK, 2005, pp.275--283.

[23] Noam Nisan, Amir Ronen. Algorithmic mechanism design. -\it Games and Economic Behavior}, 2001, 35: 166--196.

[24] Joan Feigenbaum, Scott Shenker. Distributed algorithmic mechanism design: Recent results and future directions. In -\it Proc. the 6th International Workshop on Discrete Algorithms and Methods for Mobile Computing and Communications}, Atlanta, Georgia, USA, 2002, pp.1--13.

[25] Latora V, Marchiori M. Economic small-world behavior in weighted networks. -\it The European Physical Journal B}, 2003, 32: 249--263.

[26] Dave Levin. Punishment in selfish wireless networks: A game theoretic analysis. In -\it Proc. the First Workshop on the Economics of Networked Systems $($NetEcon$)$}, Ann Arbor, Michigan, USA, 2006, pp.9--14.

[27] Datta A, Hauswirth M, Aberer K. Beyond `web of trust': Enabling P2P e-commerce. In -\it Proc. the IEEE International Conference on E-Commerce $($CEC$)$}, Newport Beach, CA, USA, 2003, pp.303--312.

[28] Jsang A, Ismail R. The Beta Reputation system. In -\it Proc. the 15th Bled Electronic Commence Conference}, June 2002.

[29] Saurabh Ganeriwal, Mani B. Srivastava. Reputation-based framework for high integrity sensor networks. In -\it Proc. the 2nd ACM Workshop on Security of Ad Hoc and Sensor Networks $($SASN$)$}, Washington, USA, 2004, pp.66--77.

[30] Yufeng Wang, Yoshiaki Hori, Kouichi SAKURAI. Economic-inspired truthful reputation feedback mechanism in P2P networks. In -\it Proc. The IEEE 11th International Workshop on Future Trends of Distributed Computing Systems $($FTDCS$)$}, Sedona, AZ, USA, 2007, pp.80--88.

[31] Watts D J, Strogatz S. Collective dynamics of `small-world' networks. -\it Nature}, 1998, 393: 440--442.

[32] Li Xiong, Ling Liu. PeerTrust: Supporting reputation-based trust for Peer-to-Peer electronic communities. -\it IEEE Trans. Knowledge and Date Engineering}, 2004, 16(7): 843--857.

[33] Dongyu Qiu, Srikant R. Modeling and performance analysis of BitTorrent-like Peer-to-Peer networks. In -\it Proc. the 2004 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications}, Portland, Oregon, USA, 2004, pp.367--378.

[34] Nikitas Liogkas, Robert Nelson, Eddie Kohler, Lixia Zhang. Exploiting BitTorrent for fun (but not profit). In -\it Proc. the 5th International Workshop on Peer-to-Peer System $($IPTPS$)$}, Santa Barbara, CA, USA, 2006.

[35] Sepandar D. Kamvar, Mario T. Schlosser, Hector Garcia-Molina. The EigenTrust algorithm for reputation management in P2P networks. In -\it Proc. the Twelfth International World Wide Web Conference $($WWW$)$}, Budapest, Hungary, 2003, pp.640--651.

[36] Shanshan Song, Kai Hwang, Runfang Zhou, Yu-Kwong Kwok. Trusted P2P Transactions with Fuzzy Reputation Aggregation. -\it IEEE Internet Computing}, 2005, 9(6): 24--34.

[37] Newman M. The structure and function of complex networks. -\it SIAM Review}, 2003, 45: 167--256.

[38] Jackson Matthew O, Rogers Brian W. The economics of small worlds. -\it Journal of the European Economic Association}, 2005, 3(2/3): 617--627.
[1] WU Enhua(吴恩华)and WANG Wenping(王文平). Interleaving Radiosity [J]. , 2002, 17(1): 0-0.
[2] XING Changyu; SUN Jizhou;. An Accelerated Incremental Radiosity Algorithm [J]. , 2000, 15(1): 47-55.
[3] Sun Jizhou; Richard L;. A Radiosity Solution for Curved Surface Environments [J]. , 1997, 12(5): 414-424.
Full text



[1] XI Haifeng; LUO Yupin; YANG Shiyuan;. An Approach to Active Learning for Classifier Systems[J]. , 1999, 14(4): 372 -378 .
[2] HUANG Hao; CHEN Guihai; XIE Li; SUN Zhongxiu;. Multicast Protocol for Uni-Directional Networks[J]. , 2000, 15(2): 158 -168 .
[3] Min Liu, Zhong-Cheng Li, and Xiao-Bing Guo. An Efficient Handoff Decision Algorithm for Vertical Handoff Between WWAN and WLAN[J]. , 2007, 22(1): 114 -120 .
[4] Xue Zhang, Jue Hong, Sang-Lu Lu, Li Xie, and Jian-Nong Cao. Scoped Bellman-Ford Geographic Routing for Large Dynamic Wireless Sensor Networks[J]. , 2008, 23(6 ): 944 -956 .
[5] Wei-Feng Pan (潘伟丰), Member, CCF, Bing Li (李兵), Senior Member, CCF, Yu-Tao Ma (马于涛), Member, CCF, ACM, Ye-Yi Qin (覃叶宜) and Xiao-Yan Zhou (周晓燕). Measuring Structural Quality of Object-Oriented Softwares via Bug Propagation Analysis on Weighted Software Networks[J]. , 2010, 25(6): 1202 -1213 .
[6] Zhi-Xiong Chen (陈智雄), Member, CCF, Xiao-Ni Du (杜小妮), and Chen-Huang Wu (吴晨煌), Member, CCF. Pseudo-Randomness of Certain Sequences of k Symbols with Length pq[J]. , 2011, 26(2): 276 -282 .
[7] Xiang-Ke Liao, Can-Qun Yang, Tao Tang Hui-Zhan Yi, Feng Wang, Qiang Wu, and Jingling Xue. OpenMC:Towards Simplifying Programming for TianHe Supercomputers[J]. , 2014, 29(3): 532 -546 .
[8] Tao Xie. Preface[J]. , 2016, 31(5): 849 -850 .
[9] Jin-Zhao Yuan, Hui Chen, Bin Zhao, Yanyan Xu. Estimation of Vehicle Pose and Position with Monocular Camera at Urban Road Intersections[J]. , 2017, 32(6): 1150 -1161 .
[10] Xue-Yan Wang, Qiang Zhou, Yi-Ci Cai, Gang Qu. Spear and Shield: Evolution of Integrated Circuit Camouflaging[J]. , 2018, 33(1): 42 -57 .

ISSN 1000-9000(Print)

CN 11-2296/TP

Editorial Board
Author Guidelines
Journal of Computer Science and Technology
Institute of Computing Technology, Chinese Academy of Sciences
P.O. Box 2704, Beijing 100190 P.R. China
E-mail: jcst@ict.ac.cn
  Copyright ©2015 JCST, All Rights Reserved