CLC number: TP393
On-line Access: 2010-12-09
Received: 2009-11-27
Revision Accepted: 2010-08-19
Crosschecked: 2010-09-28
Cited: 2
Clicked: 8034
Bo-wei Yang, Guang-hua Song, Yao Zheng. An incentive model for voting based on information-hiding in P2P networks[J]. Journal of Zhejiang University Science C, 2010, 11(12): 967-975.
@article{title="An incentive model for voting based on information-hiding in P2P networks",
author="Bo-wei Yang, Guang-hua Song, Yao Zheng",
journal="Journal of Zhejiang University Science C",
volume="11",
number="12",
pages="967-975",
year="2010",
publisher="Zhejiang University Press & Springer",
doi="10.1631/jzus.C0910727"
}
%0 Journal Article
%T An incentive model for voting based on information-hiding in P2P networks
%A Bo-wei Yang
%A Guang-hua Song
%A Yao Zheng
%J Journal of Zhejiang University SCIENCE C
%V 11
%N 12
%P 967-975
%@ 1869-1951
%D 2010
%I Zhejiang University Press & Springer
%DOI 10.1631/jzus.C0910727
TY - JOUR
T1 - An incentive model for voting based on information-hiding in P2P networks
A1 - Bo-wei Yang
A1 - Guang-hua Song
A1 - Yao Zheng
J0 - Journal of Zhejiang University Science C
VL - 11
IS - 12
SP - 967
EP - 975
%@ 1869-1951
Y1 - 2010
PB - Zhejiang University Press & Springer
ER -
DOI - 10.1631/jzus.C0910727
Abstract: We propose an incentive model based on information-hiding to encourage peers to vote for resources in peer-to-peer (P2P) networks. The following are key motives for our model: (1) Some trust and reputation systems have been deployed in modern P2P systems, but a lot of blank rating resources exist in these P2P systems; (2) E-commerce consumer-to-consumer (C2C) websites that adopt simple rating strategies are receiving accusations that false and useless ratings are flooded. We establish an information-hiding based RRR/RIR (resource reputation rating/reputation incentive rating) voting model, which awards or punishes voters according to their behaviors. The RRR generating algorithm and the RIR generating algorithm are presented in detail, and the information-hiding mechanism is given. Experimental results showed that the incentive RRR/RIR model can effectively encourage valid voting and prevent malicious or arbitrary voting in the P2P reputation system.
[1]Aberer, K., Despotovic, Z., 2001. Managing Trust in a Peer-2-Peer Information System. Proc. 10th Int. Conf. on Information and Knowledge Management, p.310-317.
[2]Adar, E., Huberman, B.A., 2000. Free Riding on Gnutella. Available from http://www.eecs.harvard.edu/~jonathan/papers/2000 [Accessed on Aug. 3, 2009].
[3]Antoniadis, P., Courcoubetis, C., Mason, R., Papaioannou, T.G., Stamoulis, G.D., Weber, R., 2004. Results of Peer-to-Peer Market Models. Project IST MMAPPS. Available from http://www.mmapps.org [Accessed on Aug. 12, 2009].
[4]Chang, J.S., Wang, H.M., Yin, G., Tang, Y.B., 2007. A New Reputation Mechanism against Dishonest Recommendations in P2P Systems. Proc. 8th Int. Conf. on Web Information Systems Engineering, p.449-460.
[5]Cohen, B., 2003. Incentives Build Robustness in BitTorrent. Proc. 1st Workshop on Economics of Peer-to-Peer Systems, p.250-260.
[6]Dellarocas, C., 2000. Immunizing Online Reputation Reporting Systems Against Unfair Ratings and Discriminatory Behavior. Proc. 2nd ACM Conf. on Electronic Commerce, p.150-157.
[7]Feldman, M., Papadimitriou, C., Chuang, J., Stoica, I., 2004. Free-Riding and Whitewashing in Peer-to-Peer Systems. Proc. ACM SIGCOMM Workshop on Practice and Theory of Incentives in Networked Systems, p.228-236.
[8]Freedman, M.J., Aperjis, C., Johari, R., 2008. Prices Are Right: Managing Resources and Incentives in Peer-Assisted Content Distribution. Proc. 7th Int. Workshop on Peer-to-Peer Systems, p.1-6.
[9]Griffiths, N., 2005. Task Delegation Using Experience-Based Multi-dimensional Trust. Proc. 4th Int. Joint Conf. on Autonomous Agents and Multiagent Systems, p.489-496.
[10]Jin, Y., Gu, Z.M., Gu, J.G., Zhao, H.W., 2007. A New Reputation-Based Trust Management Mechanism Against False Feedbacks in Peer-to-Peer Systems. Proc. 8th Int. Conf. on Web Information Systems Engineering, p.62-73.
[11]Kamvar, S.D., Schlosser, M.T., Molina, H.G., 2003. The EigenTrust Algorithm for Reputation Management in P2P Networks. Proc. 12th Int. Conf. on World Wide Web, p.640-651.
[12]Liang, J., Kumar, R., Xi, Y., Ross, K., 2005. Pollution in P2P File Sharing Systems. IEEE INFOCOM, p.1174-1185.
[13]Mislove, A., Post, A., Druschel, P., Gummadi, K.P., 2008. Ostra: Leveraging Trust to Thwart Unwanted Communication. Proc. 5th USENIX Symp. on Networked Systems Design and Implementation, p.15-30.
[14]Ngan, T.W.J., Wallach, D.S., Druschel, P., 2003. Enforcing Fair Sharing of Peer-to-Peer Resources. Proc. 2nd Int. Workshop on Peer-to-Peer Systems, p.149-159.
[15]Papaioannou, T.G., Stamoulis, G.D., 2005. An Incentives’ Mechanism Promoting Truthful Feedback in Peer-to-Peer Systems. Proc. 5th IEEE Int. Symp. on Cluster Computing and the Grid, 1:275-283.
[16]Xiong, L., Liu, L., 2004. PeerTrust: supporting reputation-based trust for peer-to-peer electronic communities. IEEE Trans. Knowl. Data Eng., 16(7):843-857.
[17]Yang, B.W., Song, G.H., Zheng, Y., 2008. ResourceDog: a Trusted Resource Discovery and Automatic Invocation P2P Framework. Proc. 5th IFIP Int. Conf. on Network and Parallel Computing, p.185-195.
[18]Yang, M., Feng, Q.Y., Dai, Y.F., Zhang, Z., 2007. A Multi-dimensional Reputation System Combined with Trust and Incentive Mechanisms in P2P File Sharing Systems. Proc. 27th Int. Conf. on Distributed Computing Systems Workshops, p.29.
Open peer comments: Debate/Discuss/Question/Opinion
<1>