A Reputation Management Scheme Improving the Trustworthiness of P2P Networks

被引:5
|
作者
Shin, Junghwa [1 ]
Kim, Taehoon [1 ]
Tak, Sungwoo [1 ]
机构
[1] Pusan Natl Univ, Sch Engn & Comp Sci, Pusan, South Korea
关键词
D O I
10.1109/ICHIT.2008.266
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Because of the openness and anonymity of Peer-to-Peer (P2P) networks, P2P participants can easily spread inauthentic resources such as viruses or worms throughout Internet. Besides, the deployment of such inauthentic resources in P2P networks has a chance of posing serious problems, thus, the trust on P2P participants needs to be carefully considered. A possible way to cope with this issue is to prevent inauthentic resources from being distributed in a way to refer peers' reputation which reflect their past behaviors. However, a peer intentionally plays along with other peers in order to increase/decrease its reputation through false feedback exchanges. Therefore, we propose a new reputation management scheme, called TrustRM (Trustworthy Reputation Management for resource sharing), which identifies peers who give false feedback as well as provide shared resources and peers with reliability by identifying malicious peers. A case study based on NS2-simulator experiments is conducted to illustrate the application and efficiency of the TrustRM scheme. It shows that our TrustRM scheme yields efficient performance in terms of minimal download ratio of inauthentic resources, even distribution of traffic loads among peers, and efficient response to peers' trust changes according to their false feedback exchanges.
引用
收藏
页码:92 / 97
页数:6
相关论文
共 50 条
  • [41] Reputation-based Methods for Building Secure P2P Networks
    Novotny, Miroslav
    Zavoral, Filip
    2008 FIRST INTERNATIONAL CONFERENCE ON THE APPLICATIONS OF DIGITAL INFORMATION AND WEB TECHNOLOGIES, VOLS 1 AND 2, 2008, : 410 - 415
  • [42] Information exchange mechanism based on reputation in mobile P2P networks
    Lai, Wei Yu
    Chen, Chia-Mei
    Jeng, Bingchiang
    Lai, Gu Hsin
    Lin, Hsiao-Chung
    2007 THIRD INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING, VOL II, PROCEEDINGS, 2007, : 643 - 646
  • [43] Ant-based reputation evidence distribution in P2P networks
    Wang, Wei
    Zeng, Guosun
    Yuan, Lulai
    GCC 2005: FIFTH INTERNATIONAL CONFERENCE ON GRID AND COOPERATIVE COMPUTING, PROCEEDINGS, 2006, : 129 - +
  • [44] A hybrid searching scheme in unstructured P2P networks
    Li, XQ
    Wu, J
    2005 International Conference on Parallel Processsing, Proceedings, 2005, : 277 - 284
  • [45] A secure key managemet scheme for P2P networks
    Wang, Xiao-Ming
    Chen, Huo-yan
    Zhang, Zhen
    2006 INTERNATIONAL CONFERENCE ON COMMUNICATIONS, CIRCUITS AND SYSTEMS PROCEEDINGS, VOLS 1-4: VOL 1: SIGNAL PROCESSING, 2006, : 1592 - +
  • [46] A computational reputation model in P2P networks based on trust and distrust
    Lin, W
    Yang, YT
    Zhang, SQ
    NETWORKING AND MOBILE COMPUTING, PROCEEDINGS, 2005, 3619 : 501 - 508
  • [47] A Reputation-Based Approach for Countering Vulnerabilities in P2P Networks
    Chen, Jianguo
    Lu, Huijuan
    Bruda, Stefan D.
    2010 2ND INTERNATIONAL CONFERENCE ON E-BUSINESS AND INFORMATION SYSTEM SECURITY (EBISS 2010), 2010, : 263 - 266
  • [48] Poisonedwater: An improved approach for accurate reputation ranking in P2P networks
    Wang Yufeng
    Nakao, Akihiro
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2010, 26 (08): : 1317 - 1326
  • [49] A fuzzy set based trust and reputation model in P2P networks
    Zhang, SQ
    Lu, DX
    Yang, YT
    INTELLIGENT DATA ENGINEERING AND AUTOMATED LEARNING IDEAL 2004, PROCEEDINGS, 2004, 3177 : 211 - 217
  • [50] Trustworthiness and CCCI metrics in P2P communication
    Hussain, FK
    Chang, E
    Dillon, T
    COMPUTER SYSTEMS SCIENCE AND ENGINEERING, 2004, 19 (03): : 173 - 190