The Chain effect for the reputation-based trust model in peer-to-peer computing

Sinjae Lee, Wonjun Lee

Research output: Contribution to journalArticle

1 Citation (Scopus)

Abstract

This letter analyzes a resource chain trust model for P2P reputation-based systems. Many researchers have given a lot of efforts to reputation-based system area and some of them have made good theoretical models. Problems are to spread malicious contents whereas the remark that such models only concentrate on the relationship between the node and its direct neighbors is still controversial. To solve the problems, we introduced the RCM (Resource Chain Model) and the Enhanced RCM. In this letter, we analyze the models and then show usage of our models can help us to find the best and safest location efficiently and decrease the number of malicious transaction.

Original languageEnglish
Pages (from-to)177-180
Number of pages4
JournalIEICE Transactions on Information and Systems
VolumeE-95-D
Issue number1
DOIs
Publication statusPublished - 2012 Jan 1

Keywords

  • Chain model
  • Credibility
  • P2P networks
  • P2P trust model
  • Reputation

ASJC Scopus subject areas

  • Electrical and Electronic Engineering
  • Software
  • Artificial Intelligence
  • Hardware and Architecture
  • Computer Vision and Pattern Recognition

Cite this

The Chain effect for the reputation-based trust model in peer-to-peer computing. / Lee, Sinjae; Lee, Wonjun.

In: IEICE Transactions on Information and Systems, Vol. E-95-D, No. 1, 01.01.2012, p. 177-180.

Research output: Contribution to journalArticle

@article{d1da33293db3432ba80b7374497cca7b,
title = "The Chain effect for the reputation-based trust model in peer-to-peer computing",
abstract = "This letter analyzes a resource chain trust model for P2P reputation-based systems. Many researchers have given a lot of efforts to reputation-based system area and some of them have made good theoretical models. Problems are to spread malicious contents whereas the remark that such models only concentrate on the relationship between the node and its direct neighbors is still controversial. To solve the problems, we introduced the RCM (Resource Chain Model) and the Enhanced RCM. In this letter, we analyze the models and then show usage of our models can help us to find the best and safest location efficiently and decrease the number of malicious transaction.",
keywords = "Chain model, Credibility, P2P networks, P2P trust model, Reputation",
author = "Sinjae Lee and Wonjun Lee",
year = "2012",
month = "1",
day = "1",
doi = "10.1587/transinf.E95.D.177",
language = "English",
volume = "E-95-D",
pages = "177--180",
journal = "IEICE Transactions on Information and Systems",
issn = "0916-8532",
publisher = "Maruzen Co., Ltd/Maruzen Kabushikikaisha",
number = "1",

}

TY - JOUR

T1 - The Chain effect for the reputation-based trust model in peer-to-peer computing

AU - Lee, Sinjae

AU - Lee, Wonjun

PY - 2012/1/1

Y1 - 2012/1/1

N2 - This letter analyzes a resource chain trust model for P2P reputation-based systems. Many researchers have given a lot of efforts to reputation-based system area and some of them have made good theoretical models. Problems are to spread malicious contents whereas the remark that such models only concentrate on the relationship between the node and its direct neighbors is still controversial. To solve the problems, we introduced the RCM (Resource Chain Model) and the Enhanced RCM. In this letter, we analyze the models and then show usage of our models can help us to find the best and safest location efficiently and decrease the number of malicious transaction.

AB - This letter analyzes a resource chain trust model for P2P reputation-based systems. Many researchers have given a lot of efforts to reputation-based system area and some of them have made good theoretical models. Problems are to spread malicious contents whereas the remark that such models only concentrate on the relationship between the node and its direct neighbors is still controversial. To solve the problems, we introduced the RCM (Resource Chain Model) and the Enhanced RCM. In this letter, we analyze the models and then show usage of our models can help us to find the best and safest location efficiently and decrease the number of malicious transaction.

KW - Chain model

KW - Credibility

KW - P2P networks

KW - P2P trust model

KW - Reputation

UR - http://www.scopus.com/inward/record.url?scp=84855307571&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=84855307571&partnerID=8YFLogxK

U2 - 10.1587/transinf.E95.D.177

DO - 10.1587/transinf.E95.D.177

M3 - Article

AN - SCOPUS:84855307571

VL - E-95-D

SP - 177

EP - 180

JO - IEICE Transactions on Information and Systems

JF - IEICE Transactions on Information and Systems

SN - 0916-8532

IS - 1

ER -