A Reputation Management Scheme Improving the Trustworthiness of P2P Networks

被引:5
|
作者
Shin, Junghwa [1 ]
Kim, Taehoon [1 ]
Tak, Sungwoo [1 ]
机构
[1] Pusan Natl Univ, Sch Engn & Comp Sci, Pusan, South Korea
关键词
D O I
10.1109/ICHIT.2008.266
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Because of the openness and anonymity of Peer-to-Peer (P2P) networks, P2P participants can easily spread inauthentic resources such as viruses or worms throughout Internet. Besides, the deployment of such inauthentic resources in P2P networks has a chance of posing serious problems, thus, the trust on P2P participants needs to be carefully considered. A possible way to cope with this issue is to prevent inauthentic resources from being distributed in a way to refer peers' reputation which reflect their past behaviors. However, a peer intentionally plays along with other peers in order to increase/decrease its reputation through false feedback exchanges. Therefore, we propose a new reputation management scheme, called TrustRM (Trustworthy Reputation Management for resource sharing), which identifies peers who give false feedback as well as provide shared resources and peers with reliability by identifying malicious peers. A case study based on NS2-simulator experiments is conducted to illustrate the application and efficiency of the TrustRM scheme. It shows that our TrustRM scheme yields efficient performance in terms of minimal download ratio of inauthentic resources, even distribution of traffic loads among peers, and efficient response to peers' trust changes according to their false feedback exchanges.
引用
收藏
页码:92 / 97
页数:6
相关论文
共 50 条
  • [1] A decentralized scheme for reputation management in P2P virtual communities
    Li, Jingtao
    Wang, Xueping
    Ma, Jianqing
    Jia, Xuefeng
    Wang, Qian
    Zhang, Gendu
    DYNAMICS OF CONTINUOUS DISCRETE AND IMPULSIVE SYSTEMS-SERIES B-APPLICATIONS & ALGORITHMS, 2006, 13E : 2800 - 2805
  • [2] Verifiable reputation management scheme based on RSA threshold secret sharing in P2P networks
    Sun, Hua
    Yu, Huiqun
    Yang, Nianhua
    Li, Li
    Journal of Computational Information Systems, 2011, 7 (08): : 2770 - 2778
  • [3] Alliatrust: A trustable reputation management scheme for unstructured P2P systems
    Gerard, Jeffrey
    Cai, Hailong
    Wang, Jun
    ADVANCES IN GRID AND PERVASIVE COMPUTING, PROCEEDINGS, 2006, 3947 : 115 - 125
  • [4] Content access control scheme for P2P networks using a reputation value
    Aburada, Kentaro
    Kita, Yoshihiro
    Park, Mirang
    Okazaki, Naonobu
    2015 IEEE 29TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS (IEEE AINA 2015), 2015, : 527 - 533
  • [5] A reputation-based trust management system for P2P networks
    Selçuk, AA
    Uzun, E
    Pariente, MR
    2004 IEEE INTERNATIONAL SYMPOSIUM ON CLUSTER COMPUTING AND THE GRID - CCGRID 2004, 2004, : 251 - 258
  • [6] Stable reputation management system in P2P networks: An evolutionary perspective
    Goswami, Antriksh
    Gupta, Ruchir
    JOURNAL OF COMPUTATIONAL SCIENCE, 2024, 78
  • [7] An independent reputation system for P2P networks
    Tayabovorn, Chaiyasit
    Maneewongvatana, Songrit
    ICEIS 2007: PROCEEDINGS OF THE NINTH INTERNATIONAL CONFERENCE ON ENTERPRISE INFORMATION SYSTEMS: SOFTWARE AGENTS AND INTERNET COMPUTING, 2007, : 249 - 252
  • [8] Hierarchical reputation model for P2P networks
    State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing 100876, China
    Dianzi Yu Xinxi Xuebao, 2007, 11 (2560-2563): : 2560 - 2563
  • [9] An effective calculation of reputation in P2P networks
    Prasad, R.V.V.S.V.
    Srinivas, Vegi
    Kumari, V. Valli
    Raju, K.V.S.V.N.
    Journal of Networks, 2009, 4 (05) : 332 - 342
  • [10] Propagation Model of Reputation in P2P Networks
    Sun, Hua
    Li, Li
    Yang, Wenzhong
    Qian, Yurong
    COMMUNICATIONS AND INFORMATION PROCESSING, PT 1, 2012, 288 : 368 - +