|
Type | Systems | Environment | Tool used | Trust value evaluation | Performance measured |
|
Peer-based trust systems | EigenTrust [30] | P2P network | P2P simulator | Calculating the sum of positive and negative ratings | Number of inauthentic files |
PeerTrust [37] | Decentralized P2P network | Mathematica 4.0 | Normalizing the transaction rating | Trust computation error against malicious behaviors |
PowerTrust [38] | P2P Grid computing | Discrete-event driven simulator | Bayesian theory | Reputation convergence overhead, ranking discrepancy, and aggregation errors |
HonestPeer [35] | P2P network | P2P trust simulator | Calculating the global reputation of other peers | Success rate and the percentage of inauthentic downloads |
CuboidTrust [39] | P2P network | - | Using power iteration | Number of inauthentic resource downloads under various threat models |
BP-P2P [40] | P2P network | MATLAB | Using belief propagation distributed message | Error in the reputation values of peers, the computational complexity, and the communication overhead |
GossipTrust [41] | P2P network | P2P trust simulator | Using gossip protocol | Query success rate |
HFTrust [42] | P2P network | Simulation using Java | Using fuzzy logic | Number of inauthentic files in the system |
VectorTrust [43] | P2P network | VTSim simulator using Netlogo | Using Bellman-Ford-based algorithm | Convergence speed, communication overhead, malicious peer detection rate and detection speed |
TNA-SL [28] | P2P network | - | Using subjective logic | - |
Trust model for reliable file exchange [44] | P2P private cloud | - | Calculating the sum of all metric values multiplied by a given weight | - |
Reputation-based trust model [45] | P2P private cloud | CloudAnalyst environment tool. | Using a mathematical model | Trust rate |
Trust modeling [46] | P2P clouds | PeerSim simulator | Using game theory | Level of trust in terms of trusted and untrusted peers |
Service trust worthiness [47] | Intercloud computing | - | Based on quorum | - |
|
File-based trust systems | Reputation management system [48] | Structured P2P network | - | Using file reputation and peer reputation | Degree of preventing untrustworthy files from spreading compared to existing systems |
|
Hybrid-based trust systems | AuthenticPeer [49] | P2P sensor network | P2P trust simulator | Using [30] for peer quality and [48] for file quality | Success rate and the failure rate of authentic files |
|