Title: Trust algorithms in P2P file sharing networks

Authors: Semir Daskapan, Indira Nurtanti, Jan Van den Berg

Addresses: Faculty of System Engineering, Policy Analysis and Management, Delft University of Technology, P.O. Box 5015, 2600GA Delft, The Netherlands. ' Faculty of System Engineering, Policy Analysis and Management, Delft University of Technology, P.O. Box 5015, 2600GA Delft, The Netherlands. ' Faculty of System Engineering, Policy Analysis and Management, Delft University of Technology, P.O. Box 5015, 2600GA Delft, The Netherlands

Abstract: Many peer to peer (P2P) networks are used to share different types of files between users who are usually anonymous. To prevent the distribution of files that have been intentionally damaged, filled with false content or infected with malware, users need to be able to distinguish between trustworthy and malicious peers. One way to help a user in separating the good peers from the bad peers, is to provide him/her with a sophisticated trust algorithm that calculates the trustworthiness of any peer involved in a file sharing transaction. In this paper the results of a comparative study are presented as a first contribution. This study is based on taxonomy of 17 trust algorithms as found in literature. The evaluation is done by means of both a literature study and a series of simulation tests. By using the evaluation results, the advantages of each of the current algorithms are singled out, and next combined to develop and implement a new and better trust algorithm for file sharing in P2P networks. This is the second contribution.

Keywords: peer to peer networks; P2P networks; trust management; trust valuation; file sharing networks; simulation; trustworthiness.

DOI: 10.1504/IJITST.2010.031478

International Journal of Internet Technology and Secured Transactions, 2010 Vol.2 No.1/2, pp.174 - 200

Received: 14 Nov 2008
Accepted: 24 Apr 2009

Published online: 05 Feb 2010 *

Full-text access for editors Full-text access for subscribers Purchase this article Comment on this article