吉林大学学报(工学版) ›› 2015, Vol. 45 ›› Issue (5): 1581-1585.doi: 10.13229/j.cnki.jdxbgxb201505029

Previous Articles     Next Articles

Model of reputation-based trust management in BT network

LIU Yan-heng, TANG Bo-hao, LI Song-jiang, WANG Ai-min   

  1. College of Computer Science and Technology, Jilin University, Changchun 130012, China
  • Received:2014-07-22 Online:2015-09-01 Published:2015-09-01

Abstract: To solve the problem of file-sharing rate reduction and waste of upstream bandwidth caused by free-riding behavior in BitTorrent (BT) network, a new model of reputation-based trust management is proposed. This model iterated "Upload Trust" and "Evaluation Trust" to estimate the performance of each code, which combined the behaviors of upload and download together. It avoids the nodes cheating in one estimate standard and uses more parameters to identify dishonest nodes. So the nodes with free-riding behavior have an only a poor chance to get the resource. Through experiments over PeerSim, the results show that this model can effectively prevent the free-riding behavior and improve the file-sharing rate in BT network. It also has positive effect on dealing with Sybil attack and Collusion attack.

Key words: computer application, BitTorrent, reputation, trust

CLC Number: 

  • TP39
[1] Fan X, Li M, Ma J, et al. Behavior-based reputation management in P2P file-sharing networks[J]. Journal of Computer and System Sciences, 2012, 78(6): 1737-1750.
[2] Sarjaz B S, Abbaspour M. Securing BitTorrent using a new reputation-based trust management system[J]. Peer-to-Peer Networking and Applications, 2013, 6(1): 86-100.
[3] Shin K, Reeves D S, Rhee I. Treat-before-trick: Free-riding prevention for BitTorrent-like peer-to-peer networks[C]∥Parallel & Distributed Processing, IEEE, 2009: 1-12.
[4] Gheorghe G, Cigno R L, Montresor A. Security and privacy issues in P2P streaming systems: a survey[J]. Peer-to-Peer Networking and Applications, 2011, 4(2): 75-91.
[5] Douceur J R. The Sybil Attack[M].Berlin:Springer Berlin Heidelberg, 2002: 251-260.
[6] Locher T, Moor P, Schmid S, et al. Free riding in BitTorrent is cheap[C]∥Proc Workshop on Hot Topics in Networks (HotNets),California,USA,2006: 85-90.
[7] Piatek M, Isdal T, Anderson T, et al. Do incentives build robustness in BitTorrent[C]∥Proc of NSDI,Cambridge,2007:1-14.
[8] Levin D, LaCurts K, Spring N, et al. Bittorrent is an auction: analyzing and improving bittorrent's incentives[C]∥ACM SIGCOMM Computer Communication Review, ACM, 2008, 38(4): 243-254.
[9] Shah P, Pâris J F. Incorporating trust in the BitTorrent protocol[C]∥International Symposium on Performance Evaluation of Computer and Telecommunication Systems,San Diego,USA,2007:586-593.
[10] Ge T, Manoharan S. Mitigating free-riding on bittorrent networks[C]∥Digital Telecommunications (ICDT), 2010 Fifth International Conference on, IEEE, 2010: 52-56.
[11] Manoharan S, Ge T. A demerit point strategy to reduce free-riding in BitTorrent[J]. Computer Communications, 2013, 36(8): 875-880.
[12] 陈绵书, 王世朋, 陈贺新, 等. 改进的基于推荐证据的对等网络信任模型[J]. 吉林大学学报: 工学版, 2013,43 (6): 1666-1674. Chen Mian-shu, Wang Shi-peng, Chen He-xin, et al. Improved trust model based on recommendation evidence for P2P networks[J]. Journal of Jilin University (Engineering and Technology Edition), 2013,43 (6): 1666-1674.
[13] Bhakuni A, Sharma P, Kaushal R. Free-rider detection and punishment in BitTorrent based P2P networks[C]∥Advance Computing Conference (IACC), 2014 IEEE International, IEEE, 2014: 155-159.
[1] LIU Fu,ZONG Yu-xuan,KANG Bing,ZHANG Yi-meng,LIN Cai-xia,ZHAO Hong-wei. Dorsal hand vein recognition system based on optimized texture features [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(6): 1844-1850.
[2] WANG Li-min,LIU Yang,SUN Ming-hui,LI Mei-hui. Ensemble of unrestricted K-dependence Bayesian classifiers based on Markov blanket [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(6): 1851-1858.
[3] JIN Shun-fu,WANG Bao-shuai,HAO Shan-shan,JIA Xiao-guang,HUO Zhan-qiang. Synchronous sleeping based energy saving strategy of reservation virtual machines in cloud data centers and its performance research [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(6): 1859-1866.
[4] ZHAO Dong,SUN Ming-yu,ZHU Jin-long,YU Fan-hua,LIU Guang-jie,CHEN Hui-ling. Improved moth-flame optimization method based on combination of particle swarm optimization and simplex method [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(6): 1867-1872.
[5] LIU En-ze,WU Wen-fu. Agricultural surface multiple feature decision fusion disease judgment algorithm based on machine vision [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(6): 1873-1878.
[6] OUYANG Dan-tong, FAN Qi. Clause-level context-aware open information extraction [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(5): 1563-1570.
[7] LIU Fu, LAN Xu-teng, HOU Tao, KANG Bing, LIU Yun, LIN Cai-xia. Metagenomic clustering method based on k-mer frequency optimization [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(5): 1593-1599.
[8] GUI Chun, HUANG Wang-xing. Network clustering method based on improved label propagation algorithm [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(5): 1600-1605.
[9] LIU Yuan-ning, LIU Shuai, ZHU Xiao-dong, CHEN Yi-hao, ZHENG Shao-ge, SHEN Chun-zhuang. LOG operator and adaptive optimization Gabor filtering for iris recognition [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(5): 1606-1613.
[10] CHE Xiang-jiu, WANG Li, GUO Xiao-xin. Improved boundary detection based on multi-scale cues fusion [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(5): 1621-1628.
[11] ZHAO Hong-wei, LIU Yu-qi, DONG Li-yan, WANG Yu, LIU Pei. Dynamic route optimization algorithm based on hybrid in ITS [J]. 吉林大学学报(工学版), 2018, 48(4): 1214-1223.
[12] HUANG Hui, FENG Xi-an, WEI Yan, XU Chi, CHEN Hui-ling. An intelligent system based on enhanced kernel extreme learning machine for choosing the second major [J]. 吉林大学学报(工学版), 2018, 48(4): 1224-1230.
[13] FU Wen-bo, ZHANG Jie, CHEN Yong-le. Network topology discovery algorithm against routing spoofing attack in Internet of things [J]. 吉林大学学报(工学版), 2018, 48(4): 1231-1236.
[14] CAO Jie, SU Zhe, LI Xiao-xu. Image annotation method based on Corr-LDA model [J]. 吉林大学学报(工学版), 2018, 48(4): 1237-1243.
[15] HOU Yong-hong, WANG Li-wei, XING Jia-ming. HTTP-based dynamic adaptive streaming video transmission algorithm [J]. 吉林大学学报(工学版), 2018, 48(4): 1244-1253.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!