Trustworthiness in peer-to-peer overlay networks

被引:0
|
作者
Nakajima, Yoshio [1 ]
Watanabe, Kenichi [1 ]
Hayashibara, Naohiro [1 ]
Enokido, Tomoya [1 ]
Takizawa, Makoto [1 ]
Deen, S. Misbah [1 ]
机构
[1] Tokyo Denki Univ, Tokyo, Japan
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In peer-to-peer (P2P) overlay networks, objects are distributed to peers in various ways like downloading. Service supported by an object is modeled to be a set of methods and quality of service (QoS). In addition to discovering a peer holding a target object, it is critical to discuss what peer is allowed to manipulate the target object in what method In this paper we take an acquaintance approach to finding and manipulating objects in P2P overlay networks. An acquaintance peer of a peer p is a peer whose service the peer p knows and with which the peer p can directly communicate. If an access request is issued, a peer has to find where a target object exists, how to obtain an access right on the target object, and how to manipulate the target object. In this paper we discuss ways to obtain results satisfying an access request by the cooperation of acquaintances. Acquaintance peers of a peer p may hold different information on target peers since it takes time to propagate change information of the target peers and peers may be faulty. Here, it is critical to discuss how much a peer can trust each acquaintance. First, we define how much a requesting peer is satisfied for each access request issued to an acquaintance. Then, we define the trustworthiness of an acquaintance peer based on the satisfiability. That is, a peer considers an acquaintance to be more trustworthy if the acquaintance returns more satisfiable replies.
引用
收藏
页码:86 / +
页数:2
相关论文
共 50 条
  • [1] Trustworthiness of acquaintances in peer-to-peer overlay networks
    Watanabe, Kenichi
    Enokido, Tomoya
    Takizawa, Makoto
    [J]. International Journal of High Performance Computing and Networking, 2009, 6 (02) : 160 - 171
  • [2] Satistiability and trustworthiness of peers in peer-to-peer overlay networks
    Nakajima, Yoshio
    Watanabe, Kenichi
    Hayashibara, Naohiro
    Enokido, Tomoya
    Takizawa, Makoto
    Deen, S. Misbah
    [J]. FIRST INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY, PROCEEDINGS, 2006, : 42 - +
  • [3] Satisfiability and trustworthiness of acquaintances in peer-to-peer overlay networks
    Kenichi Watanabe
    Tomoya Enokido
    Makoto Takizawa
    [J]. Information Systems Frontiers, 2006, 8 : 271 - 284
  • [4] Satisfiability and trustworthiness of acquaintances in peer-to-peer overlay networks
    Watanabe, Kenichi
    Enokido, Tomoya
    Takizawa, Makoto
    [J]. INFORMATION SYSTEMS FRONTIERS, 2006, 8 (04) : 271 - 284
  • [5] Service oriented trustworthiness of acquaintances in peer-to-peer overlay networks
    Watanabe, Kenichi
    Nakajima, Yoshio
    Hayashibara, Naohiro
    Enokido, Tomoya
    Takizawa, Makoto
    Deen, S. M.
    [J]. 20TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS, VOL 1, PROCEEDINGS, 2006, : 3 - +
  • [6] An inter-peer trustworthiness based on access control in peer-to-peer overlay networks
    Nakajima, Yoshio
    Watanabe, Kenichi
    Barolli, Valbona
    Enokido, Tomoya
    Takizawa, Makoto
    [J]. CISIS 2007: FIRST INTERNATIONAL CONFERENCE ON COMPLEX, INTELLIGENT AND SOFTWARE INTENSIVE SYSTEMS, PROCEEDINGS, 2007, : 163 - 170
  • [7] Trustworthiness of Acquaintances in Peer-to-Peer(P2P) Overlay Networks
    Sawamura, Soichi
    Aikebaier, Ailixier
    Enokido, Tomoya
    Barolli, Valbona
    Takizawa, Makoto
    [J]. PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON COMPLEX, INTELLIGENT AND SOFTWARE INTENSIVE SYSTEMS (CISIS 2010), 2010, : 267 - 274
  • [8] On the connectedness of peer-to-peer overlay networks
    Si, WS
    Li, MC
    [J]. 11th International Conference on Parallel and Distributed Systems, Vol I, Proceedings, 2005, : 474 - 480
  • [9] Tailored trustworthiness estimations in peer-to-peer networks
    Ylitalo, Katri
    Holtmanns, Silke
    [J]. 2005 WORKSHOP OF THE 1ST INTL CONFERENCE ON SECURITY AND PRIVACY FOR EMERGING AREAS IN COMMUNICATION NETWORKS - SECURECOMM, 2005, : 113 - 118
  • [10] A framework for structured peer-to-peer overlay networks
    Alima, LO
    Ghodsi, A
    Haridi, S
    [J]. GLOBAL COMPUTING, 2005, 3267 : 223 - 249