Abstract
Since there is no method to verify the trustworthiness of shared files in P2P file sharing systems, malicious peers can spread untrustworthy files to the system. In order to prevent untrustworthy files from spreading, we propose an effective trust management scheme using peer reputation and file reputation together in a DHT-based structured P2P systems. Simulation results show that the proposed scheme effectively restrains the spreading of untrustworthy files even in cases where malicious peers change their identities. Simulation results show that the overall message cost for managing trust data is relatively low. We also propose a replication scheme so as to avoid the loss or corruption of trust data.
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
eBay homepage, http://www.ebay.com
Gnutella homepage, http://www.gnutella.com
Kazza homepage, http://www.kazaa.com
Vbs.gnutella worm, http://securityresponse.symantec.com/avcenter/venc/data/vbs.gnutella.html
W32.supova worm, http://securityresponse.symantec.com/avcenter/venc/data/w32.supova.worm.html
Aberer, K.: P-grid: A self-organizing access structure for p2p information systems. In: Proceedings of ACM Conference on Information and Knowledge Management (CIKM) (2001)
Damiani, E., di Vimercati, D.C., Paraboschi, S., Samarati, P., Violante, F.: Reputation-based approach for choosing reliable resources in peer-to-peer networks. In: Proceedings of the 9th ACM Conference on Computer and Communications Security (2002)
Kamvar, S.D., Schlosser, M.T., Garcia-Molina, H.: The eigentrust algorithm for reputation management in p2p networks. In: Proceedings of the 12th International World Wide Web Conference (2003)
Maymounkov, P., Mazieres, D.: Kademlia: A peer-to-peer information system based on the xor metric. In: Druschel, P., Kaashoek, M.F., Rowstron, A. (eds.) IPTPS 2002. LNCS, vol. 2429, p. 53. Springer, Heidelberg (2002)
Ooi, B.C., Liau, C.Y., Tan, K.L.: Managing trust in peer-to-peer systems using reputation-based techniques. In: Dong, G., Tang, C., Wang, W. (eds.) WAIM 2003. LNCS, vol. 2762, pp. 2–12. Springer, Heidelberg (2003)
Ratnasamy, S., Francis, P., Handley, M., Karp, R., Shenker, S.: A scalable content addressable network. In: Proceedings of the ACM 2001 SIGCOMM Conference (2001)
Resnick, P., Zeckhauser, R., Friedman, E., Kuwabara, K.: Reputation systems. Communications of the ACM 43(12), 45–48 (2000)
Selcuk, A., Uzun, E., Pariente, M.: A reputation-based trust management system for p2p networks. In: Proceedings of the International Workshop on Global and Peer-to-Peer Computing, IEEE/ACM CCGRID (2004)
Stoica, I., Morris, R., Karger, D., Kaashoek, F., Balakrishnan, H.: Chord: A scalable Peer-To-Peer lookup service for internet applications. In: Proceedings of the 2001 ACM SIGCOMM Conference (2001)
Vishnumurthy, V., Chandrakumar, S., Sirer, E.: Karma: A secure economic framework for peer-to-peer resource sharing. In: Proceedings of the Workshop on Economics of Peer-to-Peer Systems (2003)
Xiong, L., Liu, L.: Peertrust: Supporting reputation-based trust for peer-to-peer electronic communities. IEEE Transactions on Knowledge and Data Engineering 16(7), 843–857 (2004)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2006 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Lee, S.Y., Kwon, OH., Kim, J., Hong, S.J. (2006). A Trust Management Scheme in Structured P2P Systems. In: Despotovic, Z., Joseph, S., Sartori, C. (eds) Agents and Peer-to-Peer Computing. AP2PC 2005. Lecture Notes in Computer Science(), vol 4118. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11925941_3
Download citation
DOI: https://doi.org/10.1007/11925941_3
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-49025-8
Online ISBN: 978-3-540-68967-6
eBook Packages: Computer ScienceComputer Science (R0)