• DocumentCode
    518705
  • Title

    Developing P2P trust computing mechanism based on Risk evaluation properties

  • Author

    Xiao-Yong, Li ; Feng, Zhou

  • Author_Institution
    Beijing Key Lab. of Intell. Telecommun. Software & Multimedia, Beijing Univ. of Posts & Telecommun., Beijing, China
  • Volume
    3
  • fYear
    2010
  • fDate
    27-29 March 2010
  • Firstpage
    409
  • Lastpage
    413
  • Abstract
    Risk is associated with almost every activity that is done in trust computing. Analyzing the Risk involved in a trust computing is important to decide whether to proceed with the transaction or not. In this paper, SMT, a trust computing mechanism is proposed for large-scale P2P systems based on risk evaluating properties. SMT incorporates two risk evaluating properties to reflect the dynamic trust relationship between peers. Meanwhile, in order to get quick computational convergence, SMT uses simple but effective mathematical formulas to establish trustworthiness aggregation algorithm. Third, SMT uses a integrated global reputation mechanism which has good scalability for large-scale P2P systems. Simulation´s results show that, compared to the existing trust mechanisms, the new mechanism has remarkable enhancements in the trust decision-making accuracy and has a better dynamic adaptation capability.
  • Keywords
    decision making; peer-to-peer computing; risk analysis; security of data; P2P trust computing mechanism; computational convergence; dynamic adaptation capability; dynamic trust relationship; integrated global reputation mechanism; large-scale P2P system; risk evaluation property; trust decision making accuracy; trustworthiness aggregation algorithm; Computational modeling; Convergence; Data structures; Decision making; Large scale integration; Large-scale systems; Mechanical factors; Scalability; Surface-mount technology; Technology management; P2P computing; trust management; trust risk property;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Advanced Computer Control (ICACC), 2010 2nd International Conference on
  • Conference_Location
    Shenyang
  • Print_ISBN
    978-1-4244-5845-5
  • Type

    conf

  • DOI
    10.1109/ICACC.2010.5486829
  • Filename
    5486829