Surework: A Super-peer Reputation Framework for P2p Networks

Size: px
Start display at page:

Download "Surework: A Super-peer Reputation Framework for P2p Networks"

Transcription

1 Surework: A Super-peer Reputation Framework for P2p Networks ABSTRACT Manuel Rodriguez-Perez manuelr@entel.upc.edu Reputation systems are proved mechanisms used to help nodes to decide whom to trust, to maintain the overall credibility of the system and to promote collaboration. This paper presents Surework, a reputation framework based on Super-peers. In Surework, peers form clusters around Superreputation-peers (Sure-peers) who help to increase the reputation knowledge. Surework introduces incentives in order to promote that nodes with higher capabilities become Super-peers and assume more tasks than normal peers. Reciprocity is also promoted by encouraging peers to provide better services to most reputable client peers. Categories and Subject Descriptors C.2.4 [Distributed Systems]: Distributed applications; H.3.5 [Online Information Services]: Data sharing General Terms peer-to-peer, reputation, reciprocity, super-peer Keywords peer-to-peer reputation framework, promotion of collaboration and reciprocity 1. INTRODUCTION Reputation systems are proved mechanisms to prevent malicious behaviours and to promote collaboration. Reputation systems encourage honest cooperation, discouraging nodes from changing their identities. Peer-to-peer (p2p from here on) networks are usually heterogeneous as they consist of a set of peers with different capabilities [12]. Pure p2p networks do not take advantage of this heterogeneity. P2p networks based on Super-peers are more efficient, as they distribute tasks among peers according with their capabilities. Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. To copy otherwise, to republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. SAC 08 March 16-20, 2008, Fortaleza, Ceará, Brazil Copyright 2008 ACM /08/ $5.00. Oscar Esparza oesparza@entel.upc.edu Departament d Enginyeria Telemàtica Universitat Politecnica de Catalunya Barcelona, Spain 2019 Jose L. Muñoz jlmunoz@entel.upc.edu In this paper, we present a novel distributed reputation scheme called Surework, which is based in the Super-peer paradigm. Surework promotes that nodes with high reputation scores become Super-peer nodes for reputation, acting as reputation servers. The problem of managing trust in p2p systems, can be partitioned into three subproblems [1]: Define a global model of trust. Determine the local algorithm that each peer applies to determine trust. Specify the framework for data and communication management. This paper is focused on the third subproblem. We specify how reputation information is stored and shared among peers. We also define which parameters must be computed but we do not detail how. The rest of the paper is structured as follows: in Section 2, we present the state of the art about reputation schemes. Section 3 presents Surework, our reputation framework for p2p networks. In Section 4 we show the main advantages and drawbacks of our proposal while in Section 5 we evaluate Surework. Finally, we conclude in Section STATE OF THE ART Several distributed reputation schemes specifically designed for p2p systems have been proposed in the literature. Next we present the most significative proposals by terms of how they specify the framework for data and communication management. The local reputation system [9] is a very simple distributed reputation where the reputation knowledge is restricted to own experiences. Systems based on voting mechanisms [3, 14, 13] provide an enhanced knowledge of peers reputation but at the expense of increasing network load and computational costs. R. Gupta proposed a system based on certificates [4] where peers form groups called trust groups (TGrp) in order to help to propagate positive satisfaction certificates of the associated peers. However TGrp management is not clearly specified, so TGrp operation adds several security weaknesses. EigenTrust [7] is an algorithm for trust management where some other peers compute the reputation score of a peer. Although this algorithm is designed as a secure algorithm it presents some limitations, especially against collusion attacks. Mekouar et al. [11] propose a reputation management scheme designed for Superpeer networks where Super-peers compute the reputation

2 and credibility scores of all their associated peers. This system presents several weaknesses, especially when the Superpeer and its associated peers collude. PeerTrust [15] stores reputation information for each peer as feedback certificates by using a distributed hash table. Peers compute reputation scores dynamically by getting these feedbacks and weighting them according to different factors. One drawback of this approach is that assumes that peers will collaborate altruistically with the reputation system. In TruthRep [5] several consultants (Super-peers) collect evaluations and compute reputation scores of their leaf nodes. However, peer disaffiliation is not considered. 3. SUREWORK 3.1 Definitions Sure-peer A Super-Peer is a node in a p2p network that operates as a server to a set of clients and as an equal in a network of Super-peers [16]. In Surework, peers form reputation clusters around Sure-peers, sending their reputation information to their Sure-peer in order to increase the knowledge of the cluster about other peers reputation Peers In Surework, any peer that is not a Sure-peer is simply called a peer. We distinguish peers depending on if they are members or not of a reputation cluster. Single-peers are peers that are not a members of a cluster while Engagedpeers are peers that are members of a reputation cluster. 3.2 System Requirements Surework has been designed in order to address the following requirements: Scalability and Fault Tolerance. Enlargement of the reputation knowledge. Promotion of reciprocity. In Surework reciprocity is achieved by encouraging the server peers to provide different qualities of service. Sure-peer reciprocity. Unlike all previous proposals, Surework introduces incentives in order to promote that nodes with higher capabilities become Sure-peers. Free affiliation. All of the cluster members are free to break off their relationship at any moment, without losing their accumulated reputation. Promotion of cooperation with the reputation system. Unlike all of the previous proposals, in Surework peers are interested in sharing their reputation information. 3.3 Single-peer Operation In this Section we briefly describe the tasks that Singlepeers carry out by distinguishing when they act as a client or when they act as a server. We also introduce cluster engagement (see Section 3.3.2). Single-peer acting as client: Service discovery. When a single-peer wants to get a service from the p2p network, it gets the list of peers that are willing to provide the requested service by using the resource discovery protocol of the p2p network Consult local reputation database. From the list of candidates, the single-peer selects the most reputable peers by consulting its local reputation database. Service request. In order to get the service the client may require to request service to more than one server. If the server is member of a cluster, it will present its affiliation certificate. Update of the local reputation database. From this experience the single-peer updates its local reputation database (see Section 3.3.1). Single-peer acting as server: Consult local reputation database. When a single-peer receives a service request it checks its local reputation database to get the reputation of the service requester. Application of local policies. Each single-peer applies its own policy to decide whether it provides the service or not. The decision criteria may depend on the client s reputation or on the available resources. Service provision. If the single-peer provides the service, its quality will depend on the reputation of the requester Maintenance of the Local Reputation Database In Surework, peers will always keep this local reputation database (which is updated from their previous experiences) independently if they are engaged or not to a reputation cluster. This database is a trusted and reliable source of reputation information for that peer Cluster Engagement Any single-peer can try to join a cluster if it considers the reputation of the associated Sure-peer good enough. In a transaction, both client and the server can identify themselves as members of a reputation cluster by presenting an affiliation certificate (Section details the structure of these certificates). So then, after several transactions single peers will know the existence of some clusters of the system, and hence they can try to join them. To do that, the single peer sends an affiliation request to a Sure-peer, which evaluates the affiliation request based on its engagement policy. If the request is accepted, the Sure-peer sends an affiliation acknowledgment message including the new affiliation certificate. 3.4 Engaged-peer Operation In this Section we briefly describe the tasks that engagedpeers carry out when they act as a client, when they act as a server and those related to cluster management. Engaged-peer acting as client: Service discovery. Engaged-peers use the discovery protocol to get the list of available service providers. Consult local reputation database. From the initial list of candidates, the engaged-peer selects the most reputable peers by consulting its local reputation database. Consult cluster reputation database. Unlike singlepeers, it also sends the list of candidate servers to its Sure-peer (see Section 3.4.1).

3 Score aggregation. The engaged-peer computes the final reputation score by means of an aggregation algorithm (see Section 3.4.2). Service request. At this point, the client requests the service to one or more of the selected servers. Update of the local reputation database. From new experiences the engaged-peer updates its local reputation database. Transaction certificate. Finally, the engaged-peer generates and sends a transaction certificate to its Surepeer (see Section 3.4.3). Engaged-peer acting as server: Consult local reputation database. This query is done to know the reputation of the service requester. Consult cluster reputation database. As when acting as client, the engaged-peer sends the identity of the client to its Sure-peer (see Section 3.4.1). Score aggregation. Server aggregates both local and cluster reputation information to get the final reputation score of the client. Application of local policies. As single-peers, an engagedpeer applies its own policy to decide whether it provides the service or not. Service provision. If the server decides to provide the service, it is provided according to the reputation of the service requester Querying the Cluster Reputation Database When acting as servers or as clients, engaged-peers ask the Sure-peer in order to increase their reputation knowledge. When the Sure-peer receives the query, it checks the reputation scores of each peer on its reputation database and sends them back to the requester Score Aggregation In every transaction, the final reputation score of each candidate (server or client) is computed by means of an aggregation algorithm based on the local information and the information received from the Sure-peer. In the literature we can find several aggregation algorithms [8] Transaction Certificate After the service transaction, the client can generate a digital document to express its opinion about the transaction. The transaction certificate is the way the (engaged) clients share their reputation opinions about other peers acting as servers with their Sure-peers, and hence with the rest of members of the cluster. The transaction certificate includes: Server and client identifiers. The identifier of the server s Sure-peer (if applicable). A time-stamp to prevent its reuse. The signature of the client The engaged-peers of a cluster are promoted to send their transaction certificates. If an affiliated peer does not send transaction data to the Sure-peer, the Sure-peer can interpret that the node has low cooperation and the member is exposed to lose its affiliation. The Sure-peer updates the cluster reputation database from the information sent by the cluster members (see Section 3.5.4). As the cluster reputation database is available for all the members, they will have an extended scope of the reputation of the system proportional to the number of members of the cluster. This is the way in which engagedpeers take advantage of their affiliation Computing Sure-peer s Credibility The local reputation database is used to check the trust on the Sure-peer. After each information request to its Surepeer, the engaged-peer compares the information received from the Sure-peer with the one in its local database in order to check its consistence and to obtain a credibility score of the Sure-peer. The engaged-peer can also send requests to the Sure-peer only to update the Sure-peer s credibility Affiliation Renewal When the affiliation certificate expires, the engaged-peer can request an updated certificate. As engaged peers check the credibility of the information reported by their Surepeer, they can break their affiliation at any moment and become a single-peer or try to join another cluster. Notice that when a peer changes of cluster it does not decrease its reputation score because in Surework, nodes have an individual reputation score. This fact limits the dependence of individual peers on its Sure-peer. In the same manner, the Sure-peer can lose its trust on an affiliated peer (e.g., if it has a low cooperation or credibility ratios). To evict a member, the Sure-peer does not renew the associated affiliation certificate. 3.5 Sure-peer Operation When acting as a client or as a server a Sure-peer follows the same protocol as an engaged-peer. It is remarkable that when Sure-peers act as clients, the servers add a reputation increase to the reputation of the Sure-peer. This is because the opinion of the Sure-peer is more influential than the opinion of individual peers (see Section 3.5.4). The reputation increase can be proportional to the estimated reputation of the cluster. Notice that this is an extra motivation to be Sure-peer: peers are encouraged to become Sure-peers because they obtain a reputation plus because of their bigger contribution to the system Cluster Creation Theoretically, any node in the network can become a Surepeer, but in practice only the most reputable peers will receive affiliation requests. When an ordinary peer wants to become a Sure-peer, it issues an affiliation certificate for itself and from then on, it presents this affiliation certificate in all its service transactions. Sure-peer can also contact its known peers to let them know its new role Affiliation Processing Single-peers that want to become members of a cluster send their affiliation requests to the associated Sure-peer. When a Sure-peer receives a request, it checks its reputation

4 Figure 1: Transaction Success Rate (TSR) for local, voting and Surework reputation systems. database to decide if it accepts or not the new member. A Sure-peer can limit the number of members of the cluster, depending on its capabilities, such as memory or bandwidth. If the Sure-peer decides to admit the requester, it generates a new affiliation certificate, which is sent to the requester. If not, it answers with an affiliation deny message. The affiliation certificate includes: Affiliated peer Identifier. Sure-peer Identifier. A Validity Period. The signature of the Sure-peer. Engaged-peers and Sure-peers present this affiliation certificate in every service transaction to prove their membership to the cluster and to prove that they are a Sure-peer Cluster Dissolution A Sure-peer can become again a single-peer or an engagedpeer. If any of this happens, the reputation cluster managed by the Sure-peer must disappear. The smarter way is that the Sure-peer sends a dissolution message to each member of the cluster. However, in some circumstances, this might not be possible. In this case, cluster members observe that the Sure-peer has stopped making its specific tasks. Once the cluster is not alive any more, the members have to choose if they try to become an engaged-peer of another cluster or if they become single-peers Cluster Reputation Database Sure-peers are also nodes that interact, as clients or servers, with other peers. From their own experiences and the transaction certificates received from the cluster members, Surepeers are responsible for the maintenance of the cluster reputation database. As reputation information derived from the Sure-peer experiences is more trustworthy, the aggregation algorithm will weight the information depending on its origin. It must be stressed that Sure-peers have direct access to this reputation database, so they can consult this database as often as they want and they can also perform searches to find out the most reputable nodes of the system ADVANTAGES AND DRAWBACKS Surework has been designed to address the requirements detailed in Section 3.2. As peers always maintain their own local reputation database, the system is fault tolerant to Sure-peer unavailabilities. Reciprocity is achieved by encouraging peers to provide different qualities of service to service requests according to their reputations. As they will we served according to their reputation, service providers will also provide better services to more reputable peers in order to maximize their reputation. Surework is completely self-managed: nodes can change their affiliation or role depending on their own interest without losing their accumulated reputation. However, Surework also introduces some drawbacks. Surework increases system complexity and computational cost. However, this complexity is distributed according to the capabilities of each node. A malicious Sure-peer can condition the operation of all the peers that compose its cluster. However, as engaged-peers compute a credibility score, the effects of a malicious Sure-peer will be transitory. A malicious node acting as an engaged-peer can also condition the operation of the cluster. However, from the peer s credibility score, the Sure-peer may detect the malicious behaviour and deny renewing its affiliation. 5. PERFORMANCE EVALUATION 5.1 Simulation Details We have performed several simulations to evaluate the Surework approach. However, due to space limitations, the conclusions presented in this paper are only a subset of the obtained results. From the study of the different p2p simulation tools [2], we decided to use PeerSim [6]. We evaluated local, voting and Surework reputation systems. The parameters of our simulations are similar to those used in [10]. We simulated a fully connected power-law network of 5000 nodes, with an initial reputation rating set to 0.3 where malicious nodes always provide bad services and feedbacks. In Surework, when peers act as servers they provide three different qualities of service depending on the reputation of the server. In our simulations we focused on two performance parameters: The Transaction Success Rate (TSR from here on, which is computed as the relation between the number of successful services and the total number of services) and the distribution of the Transaction Success Rate among peers depending on their reputation. 5.2 Results Figure 1 shows the TSR with regard to the number of transactions performed by each node. The 30 percent of nodes are malicious. The graph presents several interesting observations. First we see an obvious gain of TSR of Surework when number of transactions is below 500. It is worth noting, that experimental results [12] point that the number of transactions performed by each peer is normally very low compared with the total population of the system. In this case, when the number of transactions is set to 50 Surework outperforms voting and local reputation system by a factor of 1.12 and 1.20, respectively. Second, the gain of TSR is reduced when the number of transactions increases. This is because as the number of transactions of each peer is relatively high compared to the network population, each peer

5 Figure 2: Transaction Success Rate (TSR) with regard to reputation of each peer in Surework. Most reputable peers get better success rate. Malicious peers are clearly identifiable. accumulates a high knowledge of the peers reputation, so all the systems tend to provide similar performances. However, even in this situation Surework outperforms voting and local reputation systems. Figure 2 shows the TSR with regard to reputation of each peer in Surework. The graph shows a very interesting behaviour. Peers are grouped in three categories depending on their reputation. Malicious nodes (20% of the population) get a poor TSR (0.42 in average) while the small rightmost group represents the 10 percent of Sure-peers of the system, which get a high TSR (0.84 in average). The third group represents the majority of the peers who get a TSR that finally depends on their reputation (0.76 in average). Combining previous results we can see that although the average TSR for Surework tends to 0.70 (Figure 1), non-malicious peers get a better success rate (up to 0.84) than in previous proposals, where all the peers get the same quality of service (even malicious peers). 6. CONCLUSIONS In this paper we present a reputation system called Surework. In Surework peers form reputation clusters around Super-reputation-peers (Sure-peers) in order to increase reputation knowledge. Surework introduces incentives to promote that nodes with higher capabilities become Sure-peers. Reciprocity is also promoted by encouraging peers to provide better services to most reputable peers. When we evaluate the Transaction Success Rate, results show that Surework outperforms voting and local reputation systems up to 12 and 20 percent, respectively. Simulations also show how Surework implements reciprocity. Malicious peers are clearly identifiable and get a poor Transaction Success Rate while most reputable peers get a success rate up to twice as much as malicious peers. Acknowledgments This work is funded by the Ministry of Science and Education under the projects SECCONET (CICYT - TSI C02-01), ITACA (CICYT TSI C02-02) and ARES (CONSOLIDER-INGENIO-2010 CSD ) REFERENCES [1] K. Aberer and Z. Despotovic. Managing trust in a peer-2-peer information system. In Tenth International Conference on Information and Knowledge Management, [2] A. Brown and M. Kolberg. Tools for peer-to-peer network simulation. Internet Draft: draft-irtf-p2prg-core-simulators-00. [3] E. Damiani, S. De Capitani di Vimercati, S. Paraboschi, and P. Samarati. Managing and sharing servents s reputations in p2p systems. In IEEE Transactions on Knowledge and Data Engineering, volume 15, [4] R. Gupta and A. K. Somani. Reputation management framework and its use as currency in large-scale peer-to-peer networks. In Fourth International Conference on Peer-to-peer Computing, [5] J. Han and Y. Liu. Dubious feedback: fair or not? In InfoScale 06: Proceedings of the 1st international conference on Scalable information systems, [6] M. Jelasity, A. Montresor, G. Jesi, and S. Voulgaris. Peersim: A peer-to-peer simulator. [7] S.D. Kamvar, M.T. Schlosser, and H. Garcia-Molina. The eigentrust algorithm for reputation management in p2p networks. In Twelfth International Conference on World Wide Web, [8] Z. Liang and W. Shi. Performance evaluation of rating aggregation algorithms in reputation systems. In First International Conference on Collaborative Computing, [9] S. Marti and H. Garcia-Molina. Identity crisis: Anonymity vs. reputation in p2p systems. In Third International Conference on Peer-to-Peer Computing, [10] S. Marti and H. Garcia-Molina. Limited reputation sharing in p2p systems. In Fifth ACM Conference On Electronic Commerce, [11] L. Mekouar, Y. Iraqi, and R. Boutaba. Detecting malicious peers in a reputation-based peer-to-peer system. In 2nd IEEE Consumer Communications and Networking Conference, [12] S. Saroiu, P. Gummadi, and S. Gribble. A measurement study of peer-to-peer file sharing systems. In Multimedia Computing and Networking, [13] S. Song, K. Hwang, R. Zhou, and Y. Kwok. Trusted p2p transactions with fuzzy reputation aggregation. IEEE Internet Computing, 9(6), [14] L. Srour, A. Kayssi, and A. Chehab. Reputation-based algorithm for managing trust in file sharing networks. In Securecomm and Workshops, 2006, [15] L. Xiong and L. Liu. Peertrust: Supporting reputation-based trust for peer-to-peer electronic communities. IEEE Transactions on Knowledge and Data Engineering, 16(7), [16] B. Yang and H. Garcia-Molina. Designing a super-peer network. In 19th International Conference on Data Engineering, 2003.

A Reputation Management and Selection Advisor Schemes for Peer-to-Peer Systems

A Reputation Management and Selection Advisor Schemes for Peer-to-Peer Systems A Reputation Management and Selection Advisor Schemes for Peer-to-Peer Systems Loubna Mekouar, Youssef Iraqi, and Raouf Boutaba University of Waterloo, Waterloo, Canada {lmekouar, iraqi, rboutaba}@bbcr.uwaterloo.ca

More information

A Reputation Management System in Structured Peer-to-Peer Networks

A Reputation Management System in Structured Peer-to-Peer Networks A Reputation Management System in Structured Peer-to-Peer Networks So Young Lee, O-Hoon Kwon, Jong Kim and Sung Je Hong Dept. of Computer Science & Engineering, Pohang University of Science and Technology

More information

Super-Agent Based Reputation Management with a Practical Reward Mechanism in Decentralized Systems

Super-Agent Based Reputation Management with a Practical Reward Mechanism in Decentralized Systems Super-Agent Based Reputation Management with a Practical Reward Mechanism in Decentralized Systems Yao Wang, Jie Zhang, and Julita Vassileva Department of Computer Science, University of Saskatchewan,

More information

ASecure Hybrid Reputation Management System for Super-Peer Networks

ASecure Hybrid Reputation Management System for Super-Peer Networks ASecure Hybrid Reputation Management System for Super-Peer Networks Ghassan Karame Department of Computer Science ETH Zürich 892 Zürich, Switzerland karameg@infethzch Ioannis T Christou Athens Information

More information

A reputation-based trust management in peer-to-peer network systems

A reputation-based trust management in peer-to-peer network systems A reputation-based trust management in peer-to-peer network systems Natalia Stakhanova, Sergio Ferrero, Johnny Wong, Ying Cai Department of Computer Science Iowa State University Ames, Iowa 50011 USA {

More information

Super-Consumer Based Reputation Management for Web Service Systems

Super-Consumer Based Reputation Management for Web Service Systems Super-Consumer Based Reputation Management for Web Service Systems Yao Wang, Julita Vassileva Department of Computer Science, University of Saskatchewan, Canada, e-mail:{yaw181, jiv}@cs.usask.ca Abstract

More information

Reputation Management Framework and its use as Currency in Large-Scale Peer-to-Peer Networks

Reputation Management Framework and its use as Currency in Large-Scale Peer-to-Peer Networks 1 Reputation Management Framework and its use as Currency in Large-Scale Peer-to-Peer Networks Rohit Gupta and Arun K. Somani Dependable Computing and Networking Laboratory Department of Electrical and

More information

Decoupling Service and Feedback Trust in a Peer-to-Peer Reputation System

Decoupling Service and Feedback Trust in a Peer-to-Peer Reputation System Decoupling Service and Feedback Trust in a Peer-to-Peer Reputation System Gayatri Swamynathan, Ben Y. Zhao and Kevin C. Almeroth Department of Computer Science, UC Santa Barbara {gayatri, ravenben, almeroth}@cs.ucsb.edu

More information

Reputation Management Framework and its use as Currency in Large-Scale Peer-to-Peer Networks

Reputation Management Framework and its use as Currency in Large-Scale Peer-to-Peer Networks 1 Reputation Management Framework and its use as Currency in Large-Scale Peer-to-Peer Networks Rohit Gupta and Arun K. Somani Dependable Computing and Networking Laboratory Department of Electrical and

More information

Reputation Management: Experiments on the Robustness of ROCQ

Reputation Management: Experiments on the Robustness of ROCQ Reputation Management: Experiments on the Robustness of ROCQ Anurag Garg Roberto Battiti Roberto Cascella Dipartimento di Informatica e Telecomunicazioni, Università di Trento, Via Sommarive 4, 385 Povo

More information

IDENTIFYING HONEST RECOMMENDERS IN REPUTATION SYSTEMS

IDENTIFYING HONEST RECOMMENDERS IN REPUTATION SYSTEMS IDENTIFYING HONEST RECOMMENDERS IN REPUTATION SYSTEMS Farag Azzedin King Fahd University of Petroleum and Minerals, Information and Computer Science Department, Dhahran, 31261, Saudi Arabia. ABSTRACT Reputation

More information

R-Chain: A Self-Maintained Reputation Management System in P2P Networks

R-Chain: A Self-Maintained Reputation Management System in P2P Networks R-Chain: A Self-Maintained Reputation Management System in P2P Networks Lintao Liu, Shu Zhang, Kyung Dong Ryu, Partha Dasgupta Dept. of Computer Science & Engineering Arizona State University Tempe, AZ

More information

Trust and Reputation Management in Distributed Systems

Trust and Reputation Management in Distributed Systems Trust and Reputation Management in Distributed Systems Máster en Investigación en Informática Facultad de Informática Universidad Complutense de Madrid Félix Gómez Mármol, Alemania (felix.gomez-marmol@neclab.eu)

More information

Fuzzy Logic Techniques for Reputation Management in Anonymous Peer-to-Peer Systems

Fuzzy Logic Techniques for Reputation Management in Anonymous Peer-to-Peer Systems Fuzzy Logic Techniques for Reputation Management in Anonymous Peer-to-Peer Systems Ernesto Damiani Sabrina De Capitani di Vimercati Stefano Paraboschi 2 Marco Pesenti Pierangela Samarati Sergio Zara ()

More information

Efficient Distributed Reputation Scheme for Peer-to-Peer Systems

Efficient Distributed Reputation Scheme for Peer-to-Peer Systems Efficient Distributed Reputation Scheme for Peer-to-Peer Systems Chu Yee Liau, Xuan Zhou, Stéphane Bressan, and Kian-Lee Tan Department of Computer Science, National University of Singapore {liaucy,zhouxuan,steph,tankl}@comp.nus.edu.sg

More information

Simulating a File-Sharing P2P Network

Simulating a File-Sharing P2P Network Simulating a File-Sharing P2P Network Mario T. Schlosser, Tyson E. Condie, and Sepandar D. Kamvar Department of Computer Science Stanford University, Stanford, CA 94305, USA Abstract. Assessing the performance

More information

A Reputation-Based Trust Management System for P2P Networks

A Reputation-Based Trust Management System for P2P Networks A Reputation-Based Trust Management System for P2P Networks Ali Aydın Selçuk Ersin Uzun Mark Reşat Pariente Department of Computer Engineering Bilkent University Ankara, 68, Turkey E-mail: selcuk@cs.bilkent.edu.tr,

More information

A Point-Based Incentive Scheme for P2P Reputation Management Systems

A Point-Based Incentive Scheme for P2P Reputation Management Systems A Point-Based Incentive Scheme for P2P Reputation Management Systems Takuya NISHIKAWA 1 and Satoshi FUJITA 1 1 Department of Information Engineering, Hiroshima University Higashi-Hiroshima, 739-8527, Japan

More information

A Super-Agent Based Framework for Reputation Management and Community Formation in Decentralized Systems

A Super-Agent Based Framework for Reputation Management and Community Formation in Decentralized Systems Computational Intelligence, Volume 000, Number 000, 0000 A Super-Agent Based Framework for Reputation Management and Community Formation in Decentralized Systems Yao Wang, Jie Zhang and Julita Vassileva

More information

New Metrics for Reputation Management in P2P Networks

New Metrics for Reputation Management in P2P Networks New for Reputation in P2P Networks D. Donato, M. Paniccia 2, M. Selis 2, C. Castillo, G. Cortesi 3, S. Leonardi 2. Yahoo!Research Barcelona Catalunya, Spain 2. Università di Roma La Sapienza Rome, Italy

More information

A Reputation System for Peer-to-Peer Networks

A Reputation System for Peer-to-Peer Networks A Reputation System for Peer-to-Peer Networks Minaxi Gupta, Paul Judge, Mostafa Ammar College of Computing, Georgia Institute of Technology {minaxi, judge, ammar}@cc.gatech.edu ABSTRACT We investigate

More information

A Fuzzy Approach for Reputation Management in Online Communities for Bittorrent P2P Network

A Fuzzy Approach for Reputation Management in Online Communities for Bittorrent P2P Network A Fuzzy Approach for Reputation Management in Online Communities for Bittorrent P2P Network Ansuman Mahapatra #1, Nachiketa Tarasia #2, Madhusmita Sahoo #3, Hemanta Kumar Paikray *4, Subhasish Das #5 #

More information

Gossip-based Reputation Aggregation for Unstructured Peer-to-Peer Networks*

Gossip-based Reputation Aggregation for Unstructured Peer-to-Peer Networks* Gossip-based Reputation Aggregation for Unstructured Peer-to-Peer Networks* Runfang Zhou and Kai Hwang University of Southern California Los Angeles, CA, 90089 Abstract: Peer-to-Peer (P2P) reputation systems

More information

A Fuzzy Approach for Reputation Management using Voting Scheme in Bittorrent P2P Network

A Fuzzy Approach for Reputation Management using Voting Scheme in Bittorrent P2P Network A Fuzzy Approach for Reputation Management using Voting Scheme in Bittorrent P2P Network Ansuman Mahapatra, Nachiketa Tarasia School of Computer Engineering KIIT University, Bhubaneswar, Orissa, India

More information

Costs and Benefits of Reputation Management Systems

Costs and Benefits of Reputation Management Systems Costs and Benefits of Reputation Management Systems Roberto G. Cascella University of Trento Dipartimento di Ingegneria e Scienza dell Informazione Via Sommarive 14, I-381 Povo (TN), Italy cascella@disi.unitn.it

More information

Reputation Algebra for Cloud-based Anonymous Data Storage Systems

Reputation Algebra for Cloud-based Anonymous Data Storage Systems Reputation Algebra for Cloud-based Anonymous Data Storage Systems Harsh N. Thakker, Mayank Saha and Manik Lal Das Dhirubhai Ambani Institute of ICT Gandhinagar 382007, Gujarat, India {harshnthakker, saha.mayank}@gmail.com

More information

ONLINE REPUTATION SYSTEMS

ONLINE REPUTATION SYSTEMS ONLINE REPUTATION SYSTEMS YUYE WANG 1 CPSC 557: Sensitive Information in a Wired World Professor: Joan Feigenbaum Date: 12 Nov, 2013 Identity Reput ation Trust 2 TRUST SYSTEM Trust system, guide people

More information

Peer to peer networks: sharing between peers. Trond Aspelund

Peer to peer networks: sharing between peers. Trond Aspelund Peer to peer networks: sharing between peers Trond Aspelund Abstract In this literature survey we look at peer-to-peer networks. We first see how peer-to-peer networks distinguish themselves from the client/server

More information

Implementation of P2P Reputation Management Using Distributed Identities and Decentralized Recommendation Chains

Implementation of P2P Reputation Management Using Distributed Identities and Decentralized Recommendation Chains Implementation of P2P Reputation Management Using Distributed Identities and Decentralized Recommendation Chains P.Satheesh Associate professor Dept of Computer Science and Engineering MVGR college of

More information

RepHi: A Novel Attack against P2P Reputation Systems

RepHi: A Novel Attack against P2P Reputation Systems The First International Workshop on Security in Computers, Networking and Communications RepHi: A Novel Attack against P2P Reputation Systems Jingyu Feng a,b, Yuqing Zhang b, Shenglong Chen b,anminfu a,b

More information

A Multi-dimensional Reputation System Combined with Trust and Incentive Mechanisms in P2P File Sharing Systems

A Multi-dimensional Reputation System Combined with Trust and Incentive Mechanisms in P2P File Sharing Systems A Multi-dimensional Reputation System Combined with Trust and Incentive Mechanisms in P2P File Sharing Systems Mao Yang 21, Qinyuan Feng 1, Yafei Dai 1, Zheng Zhang 2 Peking University, Beijing, China

More information

Trust and reputation in file-sharing Peer-to-Peer systems

Trust and reputation in file-sharing Peer-to-Peer systems TDDC03 Projects, Spring 2004 Trust and reputation in file-sharing Peer-to-Peer systems Peng Mu, Xianying Cheng Supervisor: Claudiu Duma Trust and reputation in file-sharing Peer-to-Peer systems Peng Mu,

More information

A Reputation-based Trust Management System for P2P Networks

A Reputation-based Trust Management System for P2P Networks International Journal of Network Security, Vol.6, No.2, PP.227-237, Mar. 28 227 A Reputation-based Trust Management System for P2P Networks Ali Aydın Selçuk 1, Ersin Uzun 2, and Mark Reşat Pariente 3 (Corresponding

More information

Hedaquin: A reputation-based health data quality indicator

Hedaquin: A reputation-based health data quality indicator STM 2007 Hedaquin: A reputation-based health data quality indicator Ton van Deursen a,b, Paul Koster a, Milan Petković a a Philips Research Eindhoven, The Netherlands b Université du Luxembourg, Luxembourg

More information

Reputation-Oriented Trustworthy Computing in E-Commerce Environments

Reputation-Oriented Trustworthy Computing in E-Commerce Environments Reputation-Oriented Trustworthy Computing in E-Commerce Environments Yan Wang Macquarie University Kwei-Jay Lin University of California, Irvine The reputation-oriented trust issue is critical to e-commerce

More information

Impact of Peer Incentives on the Dissemination of Polluted Content

Impact of Peer Incentives on the Dissemination of Polluted Content Impact of Peer Incentives on the Dissemination of Polluted Content Fabricio Benevenuto fabricio@dcc.ufmg.br Virgilio Almeida virgilio@dcc.ufmg.br Cristiano Costa krusty@dcc.ufmg.br Jussara Almeida jussara@dcc.ufmg.br

More information

Dynamic Reputation Based Trust Management Using Neural Network Approach

Dynamic Reputation Based Trust Management Using Neural Network Approach www.ijcsi.org 161 Dynamic Reputation Based Trust Management Using Neural Network Approach Reza Azmi 1 Mahdieh Hakimi 2, and Zahra Bahmani 3 1 College of Engineering, Alzahra University 2 College of Engineering,

More information

Load Balancing in Structured Peer to Peer Systems

Load Balancing in Structured Peer to Peer Systems Load Balancing in Structured Peer to Peer Systems DR.K.P.KALIYAMURTHIE 1, D.PARAMESWARI 2 Professor and Head, Dept. of IT, Bharath University, Chennai-600 073 1 Asst. Prof. (SG), Dept. of Computer Applications,

More information

Evolution of Peer-to-Peer Systems

Evolution of Peer-to-Peer Systems EE 657 Lecture 9 on Sept. 28, 2007 Evolution of Peer-to-Peer Systems Peer-To-Peer Computing: Part 1 : P2P Platforms, Overlay Networks, and Gnutella Prof. kai Hwang University of Southern California Taylor

More information

Reputation Management in P2P Networks: The EigenTrust Algorithm

Reputation Management in P2P Networks: The EigenTrust Algorithm Reputation Management in P2P Networks: The EigenTrust Algorithm by Adrian Alexa supervised by Anja Theobald 1 Introduction Peer-to-Peer networks is a fast developing branch of Computer Science and many

More information

Secure Reputation Mechanism For Unstructured Peer To Peer System

Secure Reputation Mechanism For Unstructured Peer To Peer System Secure Reputation Mechanism For Unstructured Peer To Peer System N. Vijaya Kumar. 1, Prof. Senthilnathan 2 M.E, Department of CSE, P.S.V College of Engineering and Technology, Krishnagiri, Tamilnadu, India

More information

TREMA: A Tree-based Reputation Management Solution for P2P Systems

TREMA: A Tree-based Reputation Management Solution for P2P Systems 163 TREMA: A Tree-based Reputation Management Solution for P2P Systems Quang Hieu Vu ETISALAT BT Innovation Center (EBTIC) Khalifa University, UAE quang.vu@kustar.ac.ae Abstract Trust is an important aspect

More information

Alliatrust: A Trustable Reputation Management Scheme for Unstructured P2P Systems

Alliatrust: A Trustable Reputation Management Scheme for Unstructured P2P Systems Alliatrust: A Trustable Reputation Management Scheme for Unstructured P2P Systems Jeffrey Gerard, Hailong Cai, and Jun Wang Computer Science & Engineering, University of Nebraska Lincoln {jgerar, hcai,

More information

Reputation Management Survey

Reputation Management Survey Reputation Management Survey Sini Ruohomaa, Lea Kutvonen Department of Computer Science University of Helsinki {lea.kutvonen,sini.ruohomaa}@cs.helsinki.fi Eleni Koutrouli Department of Informatics and

More information

Fighting Peer-to-Peer SPAM and Decoys with Object Reputation

Fighting Peer-to-Peer SPAM and Decoys with Object Reputation Fighting Peer-to-Peer SPAM and Decoys with Object Reputation Kevin Walsh Department of Computer Science Cornell University Ithaca, NY 14853 kwalsh@cs.cornell.edu Emin Gün Sirer Department of Computer Science

More information

Mapping the Gnutella Network: Macroscopic Properties of Large-Scale Peer-to-Peer Systems

Mapping the Gnutella Network: Macroscopic Properties of Large-Scale Peer-to-Peer Systems Mapping the Gnutella Network: Macroscopic Properties of Large-Scale Peer-to-Peer Systems Matei Ripeanu, Ian Foster {matei, foster}@cs.uchicago.edu Abstract Despite recent excitement generated by the peer-to-peer

More information

Reputation Management Survey

Reputation Management Survey Reputation Management Survey Eleni Koutrouli, Lea Kutvonen, Sini Ruohomaa, Aphrodite Tsalgatidou Department of Informatics and Communications, National University of Athens {ekou,atsalga}@di.uoa.gr Department

More information

SuperViz: An Interactive Visualization of Super-Peer P2P Network

SuperViz: An Interactive Visualization of Super-Peer P2P Network SuperViz: An Interactive Visualization of Super-Peer P2P Network Anthony (Peiqun) Yu pqyu@cs.ubc.ca Abstract: The Efficient Clustered Super-Peer P2P network is a novel P2P architecture, which overcomes

More information

Load Balancing in Structured Peer to Peer Systems

Load Balancing in Structured Peer to Peer Systems Load Balancing in Structured Peer to Peer Systems Dr.K.P.Kaliyamurthie 1, D.Parameswari 2 1.Professor and Head, Dept. of IT, Bharath University, Chennai-600 073. 2.Asst. Prof.(SG), Dept. of Computer Applications,

More information

International Journal of Scientific & Engineering Research, Volume 4, Issue 11, November-2013 349 ISSN 2229-5518

International Journal of Scientific & Engineering Research, Volume 4, Issue 11, November-2013 349 ISSN 2229-5518 International Journal of Scientific & Engineering Research, Volume 4, Issue 11, November-2013 349 Load Balancing Heterogeneous Request in DHT-based P2P Systems Mrs. Yogita A. Dalvi Dr. R. Shankar Mr. Atesh

More information

Method of Fault Detection in Cloud Computing Systems

Method of Fault Detection in Cloud Computing Systems , pp.205-212 http://dx.doi.org/10.14257/ijgdc.2014.7.3.21 Method of Fault Detection in Cloud Computing Systems Ying Jiang, Jie Huang, Jiaman Ding and Yingli Liu Yunnan Key Lab of Computer Technology Application,

More information

Adaptive Tolerance Algorithm for Distributed Top-K Monitoring with Bandwidth Constraints

Adaptive Tolerance Algorithm for Distributed Top-K Monitoring with Bandwidth Constraints Adaptive Tolerance Algorithm for Distributed Top-K Monitoring with Bandwidth Constraints Michael Bauer, Srinivasan Ravichandran University of Wisconsin-Madison Department of Computer Sciences {bauer, srini}@cs.wisc.edu

More information

Permanent Link: http://espace.library.curtin.edu.au/r?func=dbin-jump-full&local_base=gen01-era02&object_id=19474

Permanent Link: http://espace.library.curtin.edu.au/r?func=dbin-jump-full&local_base=gen01-era02&object_id=19474 Citation: Chang, Elizabeth and Hussain, Farookh and Dillon, Tharam. 2005. : Reputation ontology for reputation systems, in Herrero, P. and Meersman, R. and Tari, Z. (ed), First IFIP/WG2.12 and WG12.4 International

More information

A Case for Dynamic Selection of Replication and Caching Strategies

A Case for Dynamic Selection of Replication and Caching Strategies A Case for Dynamic Selection of Replication and Caching Strategies Swaminathan Sivasubramanian Guillaume Pierre Maarten van Steen Dept. of Mathematics and Computer Science Vrije Universiteit, Amsterdam,

More information

Dynamic Trust Management for the Internet of Things Applications

Dynamic Trust Management for the Internet of Things Applications Dynamic Trust Management for the Internet of Things Applications Fenye Bao and Ing-Ray Chen Department of Computer Science, Virginia Tech Self-IoT 2012 1 Sept. 17, 2012, San Jose, CA, USA Contents Introduction

More information

International journal of Engineering Research-Online A Peer Reviewed International Journal Articles available online http://www.ijoer.

International journal of Engineering Research-Online A Peer Reviewed International Journal Articles available online http://www.ijoer. RESEARCH ARTICLE ISSN: 2321-7758 GLOBAL LOAD DISTRIBUTION USING SKIP GRAPH, BATON AND CHORD J.K.JEEVITHA, B.KARTHIKA* Information Technology,PSNA College of Engineering & Technology, Dindigul, India Article

More information

Scalable Reputation Management for P2P MMOGs

Scalable Reputation Management for P2P MMOGs Scalable Reputation Management for P2P MMOGs Guan-Yu Huang 1, Shun-Yun Hu 2, Jehn-Ruey Jiang 3 Department of Computer Science and Information Engineering National Central University, Taiwan, R.O.C. 1 aby@acnlab.csie.ncu.edu.tw

More information

Establishing How Many VoIP Calls a Wireless LAN Can Support Without Performance Degradation

Establishing How Many VoIP Calls a Wireless LAN Can Support Without Performance Degradation Establishing How Many VoIP Calls a Wireless LAN Can Support Without Performance Degradation ABSTRACT Ángel Cuevas Rumín Universidad Carlos III de Madrid Department of Telematic Engineering Ph.D Student

More information

Mitigation of Malware Proliferation in P2P Networks using Double-Layer Dynamic Trust (DDT) Management Scheme

Mitigation of Malware Proliferation in P2P Networks using Double-Layer Dynamic Trust (DDT) Management Scheme Mitigation of Malware Proliferation in P2P Networks using Double-Layer Dynamic Trust (DDT) Management Scheme Lin Cai and Roberto Rojas-Cessa Abstract Peer-to-peer (P2P) networking is used by users with

More information

SocioPath: In Whom You Trust?

SocioPath: In Whom You Trust? SocioPath: In Whom You Trust? Nagham Alhadad Philippe Lamarre Patricia Serrano-Alvarado Yann Busnel Marco Biazzini {Name.Lastname}@univ-nantes.fr LINA / Université de Nantes 2, rue de la Houssiniére BP

More information

Implementation of a NAT and Firewall Traversal Library

Implementation of a NAT and Firewall Traversal Library Implementation of a NAT and Firewall Traversal Library Damien Auroux Supervisors: Prof. Karl Aberer Nicolas Bonvin Distributed Systems Laboratory January 1, 2009 Presentation Outline I- Motivations and

More information

RESEARCH ISSUES IN PEER-TO-PEER DATA MANAGEMENT

RESEARCH ISSUES IN PEER-TO-PEER DATA MANAGEMENT RESEARCH ISSUES IN PEER-TO-PEER DATA MANAGEMENT Bilkent University 1 OUTLINE P2P computing systems Representative P2P systems P2P data management Incentive mechanisms Concluding remarks Bilkent University

More information

Design Issues for Peer-to-Peer Massively Multiplayer Online Games

Design Issues for Peer-to-Peer Massively Multiplayer Online Games Design Issues for Peer-to-Peer Massively Multiplayer Online Games MMVE 09 Lu Fan, Phil Trinder, and Hamish Taylor Heriot-Watt University, Edinburgh, UK Overview Background Design Issues for P2P MMOGs Interest

More information

PEER TO PEER FILE SHARING USING NETWORK CODING

PEER TO PEER FILE SHARING USING NETWORK CODING PEER TO PEER FILE SHARING USING NETWORK CODING Ajay Choudhary 1, Nilesh Akhade 2, Aditya Narke 3, Ajit Deshmane 4 Department of Computer Engineering, University of Pune Imperial College of Engineering

More information

Varalakshmi.T #1, Arul Murugan.R #2 # Department of Information Technology, Bannari Amman Institute of Technology, Sathyamangalam

Varalakshmi.T #1, Arul Murugan.R #2 # Department of Information Technology, Bannari Amman Institute of Technology, Sathyamangalam A Survey on P2P File Sharing Systems Using Proximity-aware interest Clustering Varalakshmi.T #1, Arul Murugan.R #2 # Department of Information Technology, Bannari Amman Institute of Technology, Sathyamangalam

More information

Dynamic Trust Management for Mitigation of Malware Dissemination in P2P Networks

Dynamic Trust Management for Mitigation of Malware Dissemination in P2P Networks Dynamic Trust Management for Mitigation of Malware Dissemination in P2P Networks Roberto Rojas-Cessa Assoc. Professor In collaboration with Lin Cai Networking Research Laboratory Department of Electrical

More information

Dynamic Load Balancing for Cluster-based Publish/Subscribe System

Dynamic Load Balancing for Cluster-based Publish/Subscribe System Dynamic Load Balancing for Cluster-based Publish/Subscribe System Hojjat Jafarpour, Sharad Mehrotra and Nalini Venkatasubramanian Department of Computer Science University of California, Irvine {hjafarpo,

More information

Cosdes: A Collaborative Spam Detection System with a Novel E-Mail Abstraction Scheme

Cosdes: A Collaborative Spam Detection System with a Novel E-Mail Abstraction Scheme IJCSET October 2012 Vol 2, Issue 10, 1447-1451 www.ijcset.net ISSN:2231-0711 Cosdes: A Collaborative Spam Detection System with a Novel E-Mail Abstraction Scheme I.Kalpana, B.Venkateswarlu Avanthi Institute

More information

Isolines: Energy-efficient Mapping in Sensor Networks

Isolines: Energy-efficient Mapping in Sensor Networks Isolines: Energy-efficient Mapping in Sensor Networks Ignacio Solis and Katia Obraczka {isolis, katia}@cse.ucsc.edu Computer Engineering Department University of California, Santa Cruz April 15, 2005 Abstract

More information

Secure and Effective P2P Reputation System using Trust Management and Self Certified Cryptographic Exchanges

Secure and Effective P2P Reputation System using Trust Management and Self Certified Cryptographic Exchanges www.ijcsi.org 519 Secure and Effective P2P Reputation System using Trust Management and Self Certified Cryptographic Exchanges M. Srikanth 1 and K.B. Madhuri 2 1 Dept. of IT, G.V.P College of engineering(a),

More information

Weighted Graph Approach for Trust Reputation Management

Weighted Graph Approach for Trust Reputation Management Weighted Graph Approach for Reputation Management K.Thiagarajan, A.Raghunathan, Ponnammal Natarajan, G.Poonkuzhali and Prashant Ranjan Abstract In this paper, a two way approach of developing trust between

More information

Design and Implementation of Smart Camera Network for Efficient Wide Area Surveillance

Design and Implementation of Smart Camera Network for Efficient Wide Area Surveillance Vol.5, Issue (04), pp.-8 http://dx.doi.org/0.457/ijeic.04.5..0 Design and Implementation of Smart Camera Network for Efficient Wide Area Surveillance Soomi Yang Department of Information Security, The

More information

A Review on Efficient File Sharing in Clustered P2P System

A Review on Efficient File Sharing in Clustered P2P System A Review on Efficient File Sharing in Clustered P2P System Anju S Kumar 1, Ratheesh S 2, Manoj M 3 1 PG scholar, Dept. of Computer Science, College of Engineering Perumon, Kerala, India 2 Assisstant Professor,

More information

Using Peer to Peer Dynamic Querying in Grid Information Services

Using Peer to Peer Dynamic Querying in Grid Information Services Using Peer to Peer Dynamic Querying in Grid Information Services Domenico Talia and Paolo Trunfio DEIS University of Calabria HPC 2008 July 2, 2008 Cetraro, Italy Using P2P for Large scale Grid Information

More information

Increasing the capacity of RAID5 by online gradual assimilation

Increasing the capacity of RAID5 by online gradual assimilation Increasing the capacity of RAID5 by online gradual assimilation Jose Luis Gonzalez,Toni Cortes joseluig,toni@ac.upc.es Departament d Arquiectura de Computadors, Universitat Politecnica de Catalunya, Campus

More information

An Introduction to Peer-to-Peer Networks

An Introduction to Peer-to-Peer Networks An Introduction to Peer-to-Peer Networks Presentation for MIE456 - Information Systems Infrastructure II Vinod Muthusamy October 30, 2003 Agenda Overview of P2P Characteristics Benefits Unstructured P2P

More information

An Approach to High-Performance Scalable Temporal Object Storage

An Approach to High-Performance Scalable Temporal Object Storage An Approach to High-Performance Scalable Temporal Object Storage Kjetil Nørvåg Department of Computer and Information Science Norwegian University of Science and Technology 791 Trondheim, Norway email:

More information

A Reputation Mechanism for Layered Communities

A Reputation Mechanism for Layered Communities A Reputation Mechanism for Layered Communities ELODIE FOURQUET, KATE LARSON and WILLIAM COWAN David R. Cheriton School of Computer Science, University of Waterloo The exchange of digital goods via peer-to-peer

More information

MINIMIZING STORAGE COST IN CLOUD COMPUTING ENVIRONMENT

MINIMIZING STORAGE COST IN CLOUD COMPUTING ENVIRONMENT MINIMIZING STORAGE COST IN CLOUD COMPUTING ENVIRONMENT 1 SARIKA K B, 2 S SUBASREE 1 Department of Computer Science, Nehru College of Engineering and Research Centre, Thrissur, Kerala 2 Professor and Head,

More information

A Load Balancing Method in SiCo Hierarchical DHT-based P2P Network

A Load Balancing Method in SiCo Hierarchical DHT-based P2P Network 1 Shuang Kai, 2 Qu Zheng *1, Shuang Kai Beijing University of Posts and Telecommunications, shuangk@bupt.edu.cn 2, Qu Zheng Beijing University of Posts and Telecommunications, buptquzheng@gmail.com Abstract

More information

Research Issues in Peer-to-Peer Data Management

Research Issues in Peer-to-Peer Data Management Research Issues in Peer-to-Peer Data Management Özgür Ulusoy Department of Computer Engineering Bilkent University, Ankara, Turkey oulusoy@cs.bilkent.edu.tr Abstract-Data management in Peer-to-Peer (P2P)

More information

EADRM: A Framework for Explanation-Aware Distributed Reputation Management of Web Services

EADRM: A Framework for Explanation-Aware Distributed Reputation Management of Web Services 2008 IEEE Asia-Pacific Services Computing Conference EADRM: A Framework for Explanation-Aware Distributed Reputation Management of Web Services Wanita Sherchan, Shonali Krishnaswamy Faculty of Information

More information

International Journal of Advanced Research in Computer Science and Software Engineering

International Journal of Advanced Research in Computer Science and Software Engineering Volume 2, Issue 9, September 2012 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com An Experimental

More information

QUANTITATIVE TRUST MANAGEMENT: QuanTM, Reputation, and PreSTA. Andrew G. West PRECISE Meeting 11/18/2009

QUANTITATIVE TRUST MANAGEMENT: QuanTM, Reputation, and PreSTA. Andrew G. West PRECISE Meeting 11/18/2009 QUANTITATIVE TRUST MANAGEMENT: QuanTM, Reputation, and PreSTA Andrew G. West PRECISE Meeting 11/18/2009 TALK OUTLINE Introducing QTM QuanTM [1] Model TDG: Glue between security & reputation Fundamentals

More information

Peer-to-Peer Research at Stanford

Peer-to-Peer Research at Stanford Peer-to-Peer Research at Stanford Mayank Bawa, Brian F. Cooper, Arturo Crespo, Neil Daswani, Prasanna Ganesan, Hector Garcia-Molina, Sepandar Kamvar, Sergio Marti, Mario Schlosser, Qi Sun, Patrick Vinograd,

More information

Personalized Reputation Management in P2P Networks

Personalized Reputation Management in P2P Networks Personalized Reputation Management in P2P Networks Paul - Alexandru Chirita 1, Wolfgang Nejdl 1, Mario Schlosser 2, and Oana Scurtu 1 1 L3S Research Center / University of Hannover Deutscher Pavillon Expo

More information

Balanced Reputation Detective System (BREDS): Proposed Algorithm

Balanced Reputation Detective System (BREDS): Proposed Algorithm Balanced Reputation Detective System (BREDS): Proposed Algorithm Pallavi Bansal 1, Narender Singh 2 1,2Computer science &Engineering department, G.I.T.M, Bilaspur, Yamunanagar, Haryana ---------------------------------------------------------------------***---------------------------------------------------------------------

More information

D1.1 Service Discovery system: Load balancing mechanisms

D1.1 Service Discovery system: Load balancing mechanisms D1.1 Service Discovery system: Load balancing mechanisms VERSION 1.0 DATE 2011 EDITORIAL MANAGER Eddy Caron AUTHORS STAFF Eddy Caron, Cédric Tedeschi Copyright ANR SPADES. 08-ANR-SEGI-025. Contents Introduction

More information

Interoperability of Peer-To-Peer File Sharing Protocols

Interoperability of Peer-To-Peer File Sharing Protocols Interoperability of -To- File Sharing Protocols Siu Man Lui and Sai Ho Kwok -to- (P2P) file sharing software has brought a hot discussion on P2P file sharing among all businesses. Freenet, Gnutella, and

More information

Evaluation of Unlimited Storage: Towards Better Data Access Model for Sensor Network

Evaluation of Unlimited Storage: Towards Better Data Access Model for Sensor Network Evaluation of Unlimited Storage: Towards Better Data Access Model for Sensor Network Sagar M Mane Walchand Institute of Technology Solapur. India. Solapur University, Solapur. S.S.Apte Walchand Institute

More information

MALLET-Privacy Preserving Influencer Mining in Social Media Networks via Hypergraph

MALLET-Privacy Preserving Influencer Mining in Social Media Networks via Hypergraph MALLET-Privacy Preserving Influencer Mining in Social Media Networks via Hypergraph Janani K 1, Narmatha S 2 Assistant Professor, Department of Computer Science and Engineering, Sri Shakthi Institute of

More information

A Blueprint for Universal Trust Management Services

A Blueprint for Universal Trust Management Services A Blueprint for Universal Trust Management Services Tomasz Kaszuba Krzysztof Rzadca Adam Wierzbicki Grzegorz Wierzowiecki Polish-Japanese Institute of Information Technology Warsaw, Poland adamw@pjwstk.edu.pl

More information

Operating System Multilevel Load Balancing

Operating System Multilevel Load Balancing Operating System Multilevel Load Balancing M. Corrêa, A. Zorzo Faculty of Informatics - PUCRS Porto Alegre, Brazil {mcorrea, zorzo}@inf.pucrs.br R. Scheer HP Brazil R&D Porto Alegre, Brazil roque.scheer@hp.com

More information

Enhancing Data Security in Cloud Storage Auditing With Key Abstraction

Enhancing Data Security in Cloud Storage Auditing With Key Abstraction Enhancing Data Security in Cloud Storage Auditing With Key Abstraction 1 Priyadharshni.A, 2 Geo Jenefer.G 1 Master of engineering in computer science, Ponjesly College of Engineering 2 Assistant Professor,

More information

Comments on "public integrity auditing for dynamic data sharing with multi-user modification"

Comments on public integrity auditing for dynamic data sharing with multi-user modification University of Wollongong Research Online Faculty of Engineering and Information Sciences - Papers Faculty of Engineering and Information Sciences 2016 Comments on "public integrity auditing for dynamic

More information

A Lightweight Secure SIP Model for End-to-End Communication

A Lightweight Secure SIP Model for End-to-End Communication A Lightweight Secure SIP Model for End-to-End Communication Weirong Jiang Research Institute of Information Technology, Tsinghua University, Beijing, 100084, P.R.China jwr2000@mails.tsinghua.edu.cn Abstract

More information

A Semantic Approach for Access Control in Web Services

A Semantic Approach for Access Control in Web Services A Semantic Approach for Access Control in Web Services M. I. Yagüe, J. Mª Troya Computer Science Department, University of Málaga, Málaga, Spain {yague, troya}@lcc.uma.es Abstract One of the most important

More information

Video Authentication for H.264/AVC using Digital Signature Standard and Secure Hash Algorithm

Video Authentication for H.264/AVC using Digital Signature Standard and Secure Hash Algorithm Video Authentication for H.264/AVC using Digital Signature Standard and Secure Hash Algorithm Nandakishore Ramaswamy Qualcomm Inc 5775 Morehouse Dr, Sam Diego, CA 92122. USA nandakishore@qualcomm.com K.

More information

TRUSTNET: A TRUST AND REPUTATION MANAGEMENT SYSTEM IN DISTRIBUTED ENVIRONMENTS HUANYU ZHAO

TRUSTNET: A TRUST AND REPUTATION MANAGEMENT SYSTEM IN DISTRIBUTED ENVIRONMENTS HUANYU ZHAO TRUSTNET: A TRUST AND REPUTATION MANAGEMENT SYSTEM IN DISTRIBUTED ENVIRONMENTS By HUANYU ZHAO Bachelor of Engineering in Information Security University of Science and Technology of China Hefei, Anhui,

More information

A Collaborative and Semantic Data Management Framework for Ubiquitous Computing Environment

A Collaborative and Semantic Data Management Framework for Ubiquitous Computing Environment A Collaborative and Semantic Data Management Framework for Ubiquitous Computing Environment Weisong Chen, Cho-Li Wang, and Francis C.M. Lau Department of Computer Science, The University of Hong Kong {wschen,

More information