Misplaced Pages

EigenTrust

Article snapshot taken from Wikipedia with creative commons attribution-sharealike license. Give it a read and then ask your questions in the chat. We can research this topic together.

EigenTrust algorithm is a reputation management algorithm for peer-to-peer networks, developed by Sep Kamvar, Mario Schlosser, and Hector Garcia-Molina. The algorithm provides each peer in the network a unique global trust value based on the peer's history of uploads and thus aims to reduce the number of inauthentic files in a P2P network. It has been cited by approximately 3853 other articles according to Google Scholar.

Overview

Peer-to-peer systems available today (like Gnutella) are open, often anonymous and lack accountability. Hence a user with malicious intent can introduce into the peer-to-peer network resources that may be inauthentic, corrupted or malicious (Malware). This reflects poorly on the credibility of current peer-to-peer systems. A research team from Stanford provides a reputation management system, where each peer in the system has a unique global trust value based on the peer's history of uploads. Any peer requesting resources will be able to access the trust value of a peer and avoid downloading files from untrusted peers.

Algorithm

The Eigentrust algorithm is based on the notion of transitive trust: If a peer i trusts any peer j, it would also trust the peers trusted by j. Each peer i calculates the local trust value sij for all peers that have provided it with authentic or fake downloads based on the satisfactory or unsatisfactory transactions that it has had.

s i j = sat ( i , j ) unsat ( i , j ) {\displaystyle s_{ij}=\operatorname {sat} (i,j)-\operatorname {unsat} (i,j)}

where sat (i, j) refers to the number of satisfactory responses that peer i has received from peer j, and unsat(ij) refers to the number of unsatisfactory responses that peer i has received from peer j.

The local value is normalized, to prevent malicious peers from assigning arbitrarily high local trust values to colluding malicious peers and arbitrarily low local trust values to good peers. The normalized local trust value cij is then

c i j = max ( s i j , 0 ) j max ( s i j , 0 ) {\displaystyle c_{ij}={\frac {\max(s_{ij},0)}{\sum _{j}\max(s_{ij},0)}}}

The local trust values are aggregated at a central location or in a distributed manner to create a trust vector for the whole network. Based on the idea of transitive trust, a peer i would ask other peers it knows to report the trust value of a peer k and weigh responses of these peers by the trust peer i places in them.

t i k = j c i j c j k {\displaystyle t_{ik}=\sum _{j}c_{ij}c_{jk}}

If we assume that a user knew the cij values for the whole network in the form of a matrix C, then trust vector t ¯ i {\displaystyle {\bar {t}}_{i}} that defines the trust value for t i k {\displaystyle t_{ik}} is given by

t ¯ i = C T c ¯ i . {\displaystyle {\bar {t}}_{i}=C^{T}{\bar {c}}_{i}.\,}

In the equation shown above, if C is assumed to be aperiodic and strongly connected, powers of the matrix C will converge to a stable value at some point.

t ¯ = ( C T ) x c ¯ i . {\displaystyle {\bar {t}}=(C^{T})^{x}{\bar {c}}_{i}.\,}

It seems that for a large value of x, the trust vector t ¯ i {\displaystyle {\bar {t}}_{i}} will converge to the same vector for every peer in the network. The vector t ¯ i {\displaystyle {\bar {t}}_{i}} is known as the left principal eigenvector of the matrix C. We also note that since t ¯ i {\displaystyle {\bar {t}}_{i}} is same for all nodes in the network, it represents the global trust value.

Based on the results above a simple centralized trust value computing algorithm can be written. Note that we assume that all the local trust values for the whole network are available and present in the matrix C. We also note that, if the equation shown above converges, we can replace the initial vector c ¯ i {\displaystyle {\bar {c}}_{i}} by a vector e ¯ {\displaystyle {\bar {e}}} that is an m-vector representing uniform probability distribution over all m peers. The basic EigenTrust algorithm is shown below:

t ¯ 0 = e ¯ ; {\displaystyle {\bar {t}}_{0}={\bar {e}};}
repeat
t ¯ ( k + 1 ) = C T t ¯ ( k ) ; {\displaystyle {\bar {t}}^{(k+1)}=C^{T}{\bar {t}}^{(k)};}
δ = t ( k + 1 ) t ( k ) ; {\displaystyle {\delta }=\|t^{(k+1)}-t^{(k)}\|;}
until δ < e r r o r ; {\displaystyle {\delta }<\mathrm {error} ;}

See also

References

  1. Kamvar, S.D.; Schlosser, M.T.; Garcia-Molina, H. (2003). "The Eigentrust algorithm for reputation management in P2P networks". Proceedings of the twelfth international conference on World Wide Web - WWW '03. pp. 640–651. doi:10.1145/775152.775242. ISBN 1-58113-680-3. S2CID 3102087. Retrieved 5 July 2015.
  2. "Google Scholar". Retrieved 5 July 2015.
Categories: