A Trusted Infrastructure for P2P-Based Marketplaces

被引:2
|
作者
Dinh, Tien Tuan Anh [1 ]
Chothia, Tom [1 ]
Ryan, Mark [1 ]
机构
[1] Univ Birmingham, Sch Comp Sci, Birmingham B15 2TT, W Midlands, England
来源
2009 IEEE NINTH INTERNATIONAL CONFERENCE ON PEER-TO-PEER COMPUTING (P2P 2009) | 2009年
基金
英国工程与自然科学研究理事会;
关键词
D O I
10.1109/P2P.2009.5284522
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Peer-to-peer (P2P) based marketplaces have a number of advantages over traditional centralized systems (such as eBay). Peers form a distributed hash table and store sale offers for other peers. A key problem in such a system is ensuring that the peers store and report all sale offers fairly, and do not for instance favor their own offers. We give a solution to this problem based on Trusted Computing, but unlike other approaches we do not measure and restrict all firmware and software running on a peer. Instead, we tie offers to monotonic counters in such a way that any attempt to not report an offer, or report it falsely, will be detected.
引用
收藏
页码:151 / 154
页数:4
相关论文
共 50 条
  • [21] PGMS: A P2P-based grid monitoring system
    Yao, YZ
    Fang, BX
    Zhang, HL
    Wang, W
    GRID AND COOPERATIVE COMPUTING GCC 2004, PROCEEDINGS, 2004, 3251 : 903 - 906
  • [22] Practical Security in P2P-based Social Networks
    Graffi, Kalman
    Mukherjee, Patrick
    Menges, Burkhard
    Hartung, Daniel
    Kovacevic, Aleksandra
    Steinmetz, Ralf
    2009 IEEE 34TH CONFERENCE ON LOCAL COMPUTER NETWORKS (LCN 2009), 2009, : 269 - +
  • [23] Towards P2P-based computer network management
    Department of Computer Science, Huazhong Normal University, Wuhan 430079, China
    Int. J. Future Gener. Commun. Networking, 2009, 1 (25-32):
  • [24] P2P-based on data caching in VOD systems
    College of Computer Science and Technology, Huazhong University of Science and Technology, Wuhan 430074, China
    Huazhong Keji Daxue Xuebao (Ziran Kexue Ban)/Journal of Huazhong University of Science and Technology (Natural Science Edition), 2007, 35 (08): : 67 - 69
  • [25] Lawful Interception in P2P-Based VoIP Systems
    Seedorf, Jan
    PRINCIPLES, SYSTEMS AND APPLICATIONS OF IP TELECOMMUNICATIONS: SERVICES AND SECURITY FOR NEXT GENERATION NETWORKS, 2008, 5310 : 217 - 235
  • [26] Rapid detection technique for P2P-based botnets
    Yu, Ge
    Yu, Xiao-Cong
    Dong, Xiao-Mei
    Qin, Yu-Hai
    Dongbei Daxue Xuebao/Journal of Northeastern University, 2010, 31 (12): : 1709 - 1712
  • [27] P2P-Based Community Resource Sharing Model
    Xiao, Hui
    Gong, Wei
    2011 INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTATION AND INDUSTRIAL APPLICATION (ICIA2011), VOL III, 2011, : 481 - 484
  • [28] P2P-based web text information retrieval
    Chen, SP
    Shi, B
    WEB TECHNOLOGIES RESEARCH AND DEVELOPMENT - APWEB 2005, 2005, 3399 : 247 - 252
  • [29] P2P-Based Community Resource Sharing Model
    Xiao, Hui
    Gong, Wei
    2010 SECOND INTERNATIONAL CONFERENCE ON E-LEARNING, E-BUSINESS, ENTERPRISE INFORMATION SYSTEMS, AND E-GOVERNMENT (EEEE 2010), VOL II, 2010, : 106 - 109
  • [30] Towards P2P-based Computer Network Management
    Xu, Hui
    Xiao, Debao
    INTERNATIONAL JOURNAL OF FUTURE GENERATION COMMUNICATION AND NETWORKING, 2009, 2 (01): : 25 - 32