An evidence based architecture for efficient, attack-resistant computational trust dissemination in peer-to-peer networks

被引:0
|
作者
Ingram, D [1 ]
机构
[1] Univ Cambridge, Comp Lab, Cambridge CB3 0FD, England
来源
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Emerging peer to peer (P2P) applications have a requirement for decentralised access control. Computational trust systems address this, achieving security through collaboration. This paper surveys current work on overlay networks, trust and identity certification. Our focus is on the particular problem of distributing evidence for use in trust-based security decisions. We present a system we have implemented that solves this in a highly scalable way, and resists attacks such as false recommendations and collusion.
引用
收藏
页码:273 / 288
页数:16
相关论文
共 50 条
  • [41] A Trust Energy-efficient QoS Routing Scheme for Mobile Peer-to-Peer Networks
    Qu, Dapeng
    Liang, Dengyu
    Wu, Songlin
    Li, Jie
    Xuan, Weihong
    Wang, Xingwei
    [J]. 2018 17TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (IEEE TRUSTCOM) / 12TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING (IEEE BIGDATASE), 2018, : 169 - 176
  • [42] Efficient skyline retrieval on peer-to-peer networks
    Zhu, Lin
    Zhou, Shuigeng
    Guan, Jihong
    [J]. PROCEEDINGS OF FUTURE GENERATION COMMUNICATION AND NETWORKING, WORKSHOP PAPERS, VOL 2, 2007, : 309 - +
  • [43] A peer-to-peer approach to content dissemination and search in collaborative networks
    Bhana, I
    Johnson, D
    [J]. COMPUTATIONAL SCIENCE - ICCS 2005, PT 3, 2005, 3516 : 391 - 398
  • [44] A middleware-based telecom service architecture for peer-to-peer networks
    Banerjee, Nilanjan
    Chintada, Suresh K.
    [J]. SIXTH IEEE INTERNATIONAL CONFERENCE ON PEER-TO-PEER COMPUTING, PROCEEDINGS, 2006, : 225 - +
  • [45] Decentralised Peer-to-Peer data dissemination in Wireless Sensor Networks
    Carbajo, Ricardo Simon
    Mc Goldrick, Ciaran
    [J]. PERVASIVE AND MOBILE COMPUTING, 2017, 40 : 242 - 266
  • [46] An Efficient Management Technique for Peer-to-Peer Networks
    Faycal, Marguerite
    Serhrouchni, Ahmed
    [J]. 2008 INTERNATIONAL CONFERENCE ON SOFTWARE, TELECOMMUNICATIONS AND COMPUTER NETWORKS, 2008, : 350 - 354
  • [47] Efficient immunization algorithm for peer-to-peer networks
    Chen, H
    Jin, H
    Sun, JH
    Han, ZF
    [J]. HIGH PERFORMANCE COMPUTING - HIPC 2004, 2004, 3296 : 232 - 241
  • [48] Efficient immunization algorithm for peer-to-peer networks
    Chen, H
    Jin, H
    Sun, JH
    Han, ZF
    [J]. COMPUTATIONAL SCIENCE - ICCS 2004, PT 1, PROCEEDINGS, 2004, 3036 : 623 - 626
  • [49] A Trust-based Approach for Secure Data Dissemination in a Mobile Peer-to-Peer Network of AVs
    Bhargava, Bharat K.
    Angin, Pelin
    Ranchal, Rohit
    Sivakumar, Ranjitkumar
    Linderman, Mark
    Sinclair, Asher
    [J]. INTERNATIONAL JOURNAL OF NEXT-GENERATION COMPUTING, 2012, 3 (01): : 1 - 12
  • [50] Digital evidence from peer-to-peer networks
    Taylor, Mark
    Haggerty, John
    Gresty, David
    Berry, Tom
    [J]. COMPUTER LAW & SECURITY REVIEW, 2011, 27 (06) : 647 - 652