Trusted Reputation Management Service for Peer-to-Peer Collaboration

被引:0
|
作者
Deng, Lingli [1 ]
He, Yeping [1 ]
Xu, Ziyao [1 ]
机构
[1] Chinese Acad Sci, Inst Software, Beijing 100190, Peoples R China
关键词
P2P; reputation management; data integrity; trusted computing; virtual machine;
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
The open and autonomous nature of peer-to-peer (P2P) systems invites the phenomenon of widespread decoys and free-riding. Reputation systems are constructed to ensure file authenticity and stimulate collaboration. We identify the authenticity, availability and privacy issues concerning the previous reputation management, schemes. We propose to add integrity control for the reputation storage/computation processing in order to enhance the authenticity of the resultant reputation values; and present; an integrity model to articulate necessary mechanisms and rules for integrity protection in a P2P reputation system. We design a fully-distributed and secure reputation management scheme, Trusted Reputation Management Service (TRMS). Employing Trusted Computing and Virtual Machine Technologies, a peer's reputation values and specific transaction records can be stored, accessed and updated in a tamper-proof way by the Trusted Reputation Agent (TRA) on the same platform, which guarantees the authenticity of reputation values. Transaction partners exchange directly with each other for reputation values, services and transaction comments with no reliance on a remote third party, ensuring the availability of reputation and peers' privacy.
引用
收藏
页码:1069 / 1086
页数:18
相关论文
共 50 条
  • [1] Reputation management service for peer-to-peer enterprise architectures
    Amoretti, M.
    Bisi, M.
    Laghi, M. C.
    Zanichelli, F.
    Conte, G.
    [J]. ICE-B 2006: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON E-BUSINESS, 2006, : 265 - +
  • [2] Reputation Management Service for Peer-to-Peer Enterprise Architectures
    Amoretti, M.
    Bisi, M.
    Laghi, M. C.
    Zanichelli, F.
    Conte, G.
    [J]. E-BUSINESS AND TELECOMMUNICATION NETWORKS, 2008, 9 : 52 - 63
  • [3] Secure peer-to-peer networks for trusted collaboration
    Hamlen, Kevin W.
    Thuraisingham, Bhavani
    [J]. 2007 INTERNATIONAL CONFERENCE ON COLLABORATIVE COMPUTING: NETWORKING, APPLICATIONS AND WORKSHARING, 2008, : 58 - 63
  • [4] PowerTrust: A robust and scalable reputation system for trusted Peer-to-Peer computing
    Zhou, Runfang
    Hwang, Kai
    [J]. IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2007, 18 (04) : 460 - 473
  • [5] DHTrust: a robust and distributed reputation system for trusted peer-to-peer networks
    Xue, Weilian
    Liu, Yaqiong
    Li, Keqiu
    Chi, Zhongxian
    Min, Geyong
    Qu, Wenyu
    [J]. CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2012, 24 (10): : 1037 - 1051
  • [6] DHTrust: A Robust and Distributed Reputation System for Trusted Peer-to-Peer Networks
    Liu, Yaqiong
    Xue, Weilian
    Li, Keqiu
    Chi, Zhongxian
    Min, Geyong
    Qu, Wenyu
    [J]. 2010 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE GLOBECOM 2010, 2010,
  • [7] Reputation and Trust Management Models in Peer-to-Peer
    Raju, Hima S.
    Salim, Soja
    [J]. 2016 INTERNATIONAL CONFERENCE ON RESEARCH ADVANCES IN INTEGRATED NAVIGATION SYSTEMS (RAINS), 2016,
  • [8] Distributed reputation management for service-oriented peer-to-peer enterprise communities
    Amoretti, Michele
    Zanichelli, Francesco
    [J]. INTERNATIONAL JOURNAL OF COMPUTATIONAL SCIENCE AND ENGINEERING, 2016, 13 (02) : 147 - 157
  • [9] Trusted Digital Rights Management in Peer-to-Peer Communities
    Llewellyn-Jones, David
    Merabti, Madjid
    Shi, Qi
    Askwith, Bob
    [J]. 2009 SECOND INTERNATIONAL CONFERENCE ON DEVELOPMENTS IN ESYSTEMS ENGINEERING (DESE 2009), 2009, : 207 - 215
  • [10] Management in peer-to-peer systems: Trust, reputation and security
    Boutaba, R
    Marshall, A
    [J]. COMPUTER NETWORKS, 2006, 50 (04) : 469 - 471