A Reputation Management Scheme Improving the Trustworthiness of P2P Networks

被引:5
|
作者
Shin, Junghwa [1 ]
Kim, Taehoon [1 ]
Tak, Sungwoo [1 ]
机构
[1] Pusan Natl Univ, Sch Engn & Comp Sci, Pusan, South Korea
关键词
D O I
10.1109/ICHIT.2008.266
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Because of the openness and anonymity of Peer-to-Peer (P2P) networks, P2P participants can easily spread inauthentic resources such as viruses or worms throughout Internet. Besides, the deployment of such inauthentic resources in P2P networks has a chance of posing serious problems, thus, the trust on P2P participants needs to be carefully considered. A possible way to cope with this issue is to prevent inauthentic resources from being distributed in a way to refer peers' reputation which reflect their past behaviors. However, a peer intentionally plays along with other peers in order to increase/decrease its reputation through false feedback exchanges. Therefore, we propose a new reputation management scheme, called TrustRM (Trustworthy Reputation Management for resource sharing), which identifies peers who give false feedback as well as provide shared resources and peers with reliability by identifying malicious peers. A case study based on NS2-simulator experiments is conducted to illustrate the application and efficiency of the TrustRM scheme. It shows that our TrustRM scheme yields efficient performance in terms of minimal download ratio of inauthentic resources, even distribution of traffic loads among peers, and efficient response to peers' trust changes according to their false feedback exchanges.
引用
收藏
页码:92 / 97
页数:6
相关论文
共 50 条
  • [21] Trust management without reputation in P2P games
    Wierzbicki, Adam
    SECRYPT 2006: Proceedings of the International Conference on Security and Cryptography, 2006, : 126 - 134
  • [22] Behavior-based reputation management in P2P file-sharing networks
    Fan, Xinxin
    Li, Mingchu
    Ma, Jianhua
    Ren, Yizhi
    Zhao, Hui
    Su, Zhiyuan
    JOURNAL OF COMPUTER AND SYSTEM SCIENCES, 2012, 78 (06) : 1737 - 1750
  • [23] How users' participation affects reputation management systems: The case of P2P networks
    Remondino, Marco
    Boella, Guido
    SIMULATION MODELLING PRACTICE AND THEORY, 2010, 18 (10) : 1493 - 1505
  • [24] A novel transfer protocol for reputation sharing on P2P networks
    Ma, Xin-Xin
    Qin, Zhi-Guang
    2007 INTERNATIONAL CONFERENCE ON COMMUNICATIONS, CIRCUITS AND SYSTEMS PROCEEDINGS, VOLS 1 AND 2: VOL 1: COMMUNICATION THEORY AND SYSTEMS; VOL 2: SIGNAL PROCESSING, COMPUTATIONAL INTELLIGENCE, CIRCUITS AND SYSTEMS, 2007, : 431 - +
  • [25] On a mechanism of detection of coalitions for reputation systems in P2P networks
    Orynczak, Grzegorz
    Kotulski, Zbigniew
    INTERNATIONAL SYMPOSIUM ON PERFORMANCE EVALUATION OF COMPUTER AND TELECOMMUNICATION SYSTEMS (SPECTS 2014), 2014, : 578 - 584
  • [26] Enabling Fast Bootstrap of Reputation in P2P Mobile Networks
    Cascella, Roberto G.
    2009 INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS, 2009, : 371 - 378
  • [27] Trustworthiness of Acquaintances in Peer-to-Peer(P2P) Overlay Networks
    Sawamura, Soichi
    Aikebaier, Ailixier
    Enokido, Tomoya
    Barolli, Valbona
    Takizawa, Makoto
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON COMPLEX, INTELLIGENT AND SOFTWARE INTENSIVE SYSTEMS (CISIS 2010), 2010, : 267 - 274
  • [28] Improving media services on P2P networks
    Lienhart, R
    Holliman, M
    Chen, YK
    Kozintsev, I
    Yeung, M
    IEEE INTERNET COMPUTING, 2002, 6 (01) : 73 - 77
  • [29] A dynamic trust management scheme to mitigate malware proliferation in P2P networks
    Ding, Xuhua
    Yu, Wei
    Pan, Ying
    2008 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, PROCEEDINGS, VOLS 1-13, 2008, : 1605 - +
  • [30] BaRMS: A Bayesian Reputation Management Approach for P2P Systems
    Long, Xuelian
    Joshi, James
    JOURNAL OF INFORMATION & KNOWLEDGE MANAGEMENT, 2011, 10 (03) : 273 - 283