infrastructure to obtain the necessary reputation infor-
mation when it is not locally available at the querying
peer. The outcomes of past transactions are stored in
trust vectors; every peer maintains a trust vector for
every other peer it has dealt with in the past. The trust
query process is similar to the file query process ex-
cept that the subject of the query is a peer about whom
trust information is inquired. The responses are sorted
and weighted by the credibility rating of the respon-
der, derived from the credibility vectors maintained
by the local peer, which are similar to the trust vec-
tors.
In (Garg et al., 2005), the use of a scheme named
ROCQ (Reputation, Opinion, Credibility and Quality)
in a collaborative content-distribution system is ana-
lyzed. ROCQ computes global reputation values for
peers on the basis of first-hand opinions of transac-
tions provided by participants. Global reputation val-
ues are stored in a decentralized fashion using multi-
ple score managers for each individual peer. When a
peer wishes to interact with another peer, it retrieves
the reputation values for that peer from its score man-
agers. The final average reputation value is formed by
two aggregations, first at the score managers and sec-
ond at the requesting peer; if a peer has had interac-
tions with the prospective partner before, it may wish
to prefer its own first-hand experience to the informa-
tion being provided by the trust management system
or to use a combination of the global reputation and
its first hand experience.
All these works consider the situation in which a
peer with a bad reputation is simply isolated from the
system, while the analytical model we are proposing
describes different roles for peers, associated with dif-
ferent actions. So a peer with a suspect malicious be-
haviour can be first degradated, and eventually iso-
lated from the system. It is also possible to compute
the probability that the next feedback will be positive
for a peer, that allows a peer to increase its good ratio,
and the maximum rate with which one or more ma-
licious peer can provide negative feedbacks without
affecting the peer’s role.
7 CONCLUSIONS
In this work we have illustrated the analytical model
of a reputation management service for role-based
peergroups. The model defines some parameters and
indicators, such as the maximum tolerable rate of ma-
licious negative feedbacks. We applied the reputation
model to a four-role security policy, giving a param-
eter set for each role, and computing the theoretical
values for the main indicators. These results have
been confirmed by those we obtained from several
simulations, which we realized using a centralized
reputation management service.
Further work will follow two directions. To com-
plete the analytical model, we must consider also ma-
licious positive feedbacks. For example, we could
check for suspiciously rapid increasing of good ratios,
and introduce a recovery window not only to prevent
unjustified degradations, as in current model, but also
to contrast malicious promotion attempts. Once the
model is completed, and all parameters are tuned, we
can search for the best distributed solution for reputa-
tion storage and retrieval.
ACKNOWLEDGEMENTS
This work has been partially supported by the “STIL”
regional project, and by the “WEB-MINDS” FIRB
project of the National Research Ministry.
REFERENCES
Amoretti, M., Zanichelli, F., and Conte, G. (2005). SP2A: a
Service-oriented Framework for P2P-based Grids. In
3rd International Workshop on Middleware for Grid
Computing, Co-located with Middleware 2005.
Barab
´
asi, A. and Albert, R. (1999). Emergence of Scaling
in Random Networks. Science, 286(5439):509–512.
Garg, A., Battiti, R., and Cascella, R. (2005). Reputation
Management: Experiments on the Robustness of rocq.
Kamvar, S. D., Schlosser, M., and Garcia-Molina, H.
(2003). The Eigentrust Algorithm for Reputation
Management in peer-to-peer Networks. In The 12th
International World Wide Web Conference.
Lee, S. Y., Kwon, O.-H., Kim, J., and S.J.Hong (2005). A
Reputation Management System in Structured peer-
to-peer Networks. In The 14th International Work-
shops on Enabling Technologies:Infrastruture for
Collaborative Enterprise.
Mekouar, L., Iraqui, Y., and Boutaba, R. (2004a). Detecting
Malicious Peers in a Reputation-based peer-to-peer
System.
Mekouar, L., Iraqui, Y., and Boutaba, R. (2004b). A Reputa-
tion Management and Selection Advisor Schemes for
peer-to-peer Systems. In The 15th IFIP/IEEE Interna-
tional Workshop on Distributed Systems: Operations
and Management.
Selcuk, A. A., Uzun, E., and Pariente, M. R. (2004).
A Reputation-Based Trust Management System for
peer-to-peer peer-to-peer Networks. In IEEE Interna-
tional Symposium on Cluster Computing and the Grid.
Ye, S., Makedon, F., and Ford, J. (2004). Collaborative Au-
tomated Trust Negotiation in Peer-to-Peer Systems.
In Fourth International Conference on Peer-to-Peer
Computing (P2P’04).
ICE-B 2006 - INTERNATIONAL CONFERENCE ON E-BUSINESS
272