Understanding and Measuring Trust Evolution Effectiveness in Peer-to-Peer Computing Systems

In any trust model, the two information sources that a peer relies on to predict trustworthiness of another peer are direct experience as well as reputation. These two vital components evolve over time. Trust evolution is an important issue, where the objective is to observe a sequence of past values of a trust parameter and determine the future estimates. Unfortunately, trust evolution algorithms received little attention and the proposed algorithms in the literature do not comply with the conditions and the nature of trust. This paper contributes to this important problem in the following ways: (a) presents an algorithm that manages and models trust evolution in a P2P environment, (b) devises new mechanisms for effectively maintaining trust values based on the conditions that influence trust evolution , and (c) introduces a new methodology for incorporating trust-nurture incentives into the trust evolution algorithm. Simulation experiments are carried out to evaluate our trust evolution algorithm.




References:
[1] D. P. Anderson, J. Cobb, E. Korpela, M. Lebofsky, and D. Werthimer,
"SETI@home: An experiment in public-resource computing," Communications
of the ACM, Vol. 45, No. 11, Nov. 2002, pp. 56-61.
[2] R. Arienghieri, E. Damiani, S. Vimercati, S. Paraboschi, and P. Samarati,
"Fuzzy techniques for trust and reputation management in anonymous
peer-to-peer systems," JASIST, Vol. 57, No. 4, 2006, pp. 528-537.
[3] F. Azzedin and M. Maheswaran, "A trust brokering system and its
application to resource management in public-resource grids," 2004
International Parallel and Distributed Processing Symposium (IPDPS
2004), Apr. 2004.
[4] F. Azzedin, M. Maheswaran, and A. Mitra, "Trust brokering and its use
for resource matchmaking in public-resource grids," Journal of Grid
Computing, Vol. 4, No. 3, 2006, pp. 247-263.
[5] R. Brayanrd, D. Kosic, A. Rodriguez, J. Chase, and A. Vahdat, "Opus:
An overlay peer utility service," 15th International Conference on Open
Architectures and Network Programming (OPENARCH), June 2002.
[6] J. S. Chase, D. C. Anderson, P. N. Thakar, and A. M. Vahdat, "Managing
energy and server resources in hosting centers," 18th Symposium
Operating Systems Principles (SOSP), Oct. 2001.
[7] C. Corritore, B. Kracher, and S. Wiedenbeck, "On-line trust: concepts,
evolving themes, a model," International Journal of Human Computer
Studies, Vol. 58, No. 6, June 2003, pp. 737-758.
[8] B. Dragovic, S. Hand, T. Harris, E. Kotsovinos, and A. Twigg, "Managing
trust and reputation in the XenoServer open platform," 1st International
Conference on Trust Management (iTrust 2003), May 2003,
pp. 59-74.
[9] I. Foster and A. Iamnitchi, "On death, taxes, and the convergence of
peer-to-peer and Grid computing," 2nd International Workshop on Peerto-
Peer Systems (IPTPS03), Feb. 2003.
[10] T. Grandison, Trust Management for Internet Applications, PhD thesis,
Dept. of Computing, University of London, July 2003.
[11] M. Kim and B. Noble, "Mobile networks estimation," 7th Annual
Conference Mobile Computing and Networking, July 2001.
[12] J. Lewis and A. Weigert, "Trust as a social reality," Social Forces,
Vol. 63, No. 4, Jun. 1985, pp. 967-985.
[13] N. Luhmann, "Familiarity, confidence, trust: Problems and alternatives,"
in Trust: Making and Breaking Cooperative Relations, D. Gambetta, ed.,
Basil Blackwell, New York, 1988, pp. 94-107.
[14] B. Misztal, "Trust in modern societies," Polity Press, Cambridge MA,
1996.
[15] H. Nissenbaum, "Will security enhance trust online, or supplant it?,"
in Trust and Distrust Within Organizations: Emerging Perspectives,
Enduring Questions, R. Kramer and K. Cook, eds., Russell Sage
Publications, New York, NY, 2004, pp. 155-188.
[16] A. Oram, ed., Peer-to-Peer: Harnessing the Power of Disruptive Technologies,
O-Reilly and Associates, Sebastopol, CA, 2001.
[17] M. A. Patton and A. Josang, "Technologies for trust in electronic
commerce," Electronic Commerce Research, Vol. 4, No. 1, Jan. 2004.
[18] D. Quercia, S. Hailes, and L. Capra, "B-trust: Bayesian trust framework
for pervasive computing," 4th International Conference on Trust
Management (iTrust), May 2006.
[19] B. Urgaonkar, P. Shenoy, and T. Roscoe, "Resource overbooking and
application profiling in shared hosting platforms," 5th Symposium on
Operating Systems Design and Implementation (OSDI 2002), Dec. 2002.
[20] B. Yang and H. Garcia-Molina, "Designing a super-peer network,"
19th International Conference on Data Engineering (ICDE), (Banbalore,
India), Mar. 2003.