Comparison of Trust Model in Peer to Peer System

Size: px
Start display at page:

Download "Comparison of Trust Model in Peer to Peer System"

Transcription

1 Comparison of Trust Model in Peer to Peer System Hai Ren Helsinki University of Technology Abstract In a peer-to-peer system, one of the most important issues should be paid attention on is trust managing. Since such system always encounters some unknown agents. At present, the existing models for trust management, that are based on reputation. They do not either rely on a central database or require to maintain global knowledge at each agent to provide data on earlier interactions. In this paper we present some main trust models based on reputation. Through comparing with several different existing trust models in P2P systems, you will understand what they are, what characters they have. We expect that, the trust models which we presented could be considered carefully, if you plan to implement a certain P2P reputation system. KEYWORDS: trust model, reputation, peer-to-peer systems, securitys 1 Introduction With the increasing availability of high bandwidth Internet connections and low price of computers, peer-to-peer (P2P) networks have become very popular in resource sharing and exchange. There are no fixed clients and servers. Any node could be a client or a server. The architecture of P2P lively differs with the client-server model where the communication is via operation of the central server. For example, the FTP (File Transfer Protocol)system is a typical example of non peer-to-peer file transfer [3], there are fixed a server and aclient. The FTP server, running FTP server software, listens on the network for connection requests from other computers. The client computer, running FTP client software, initiates a connection to the server. Once connected, the client can do a number of file manipulation operations such as uploading files to the server, download files from the server and so on. The purposes of P2P are sharing files containing digital formats, communications and other applications [8]. Anyone can provides content and services to other users on the scalable mechanism provided by such system; anyone also can search and request resources from this kind of system. But, at the same time, since the open attribute of this system, which opens a door to the malicious users who wish to poison the system with corrupted data or harmful services for personal or commercial gain [6]. So that, it is required for user to be ware about the quality or validity of the resources of services the purchase through the system. How to distinguish the validity of a resource and how to verify the authenticity of the content of a file or document are both problems, that should to be faced. The simplest case to solve these problems is using a digest, which may be available for the file from a trusted authority who owns the file in fact. Calculating a hash and comparing it to the digest validity of this file. However, locating the resource s authority is rather difficult. In order to solve this problem, reputation system is stimulated in this background [2]. This kind of system is used for detecting misbehavior and circumvent malicious nodes, it can be used for collecting information on the trustworthiness of resource providers, provide some help for the peer to locate good provider. In this paper, we would try to find out the existing trust models used in Peer-to Peer reputation system, show their own attributes of every one. For differet situtations, different trust models could be adopted, get a general idea of the model s mechanism. Then, make a comparision among the exiting alogrithms in trust models. Lastly, make a short conclusion of trust models in P2P reputation system. 2 Some issues about P2P System There are three main parts in this section. The first one, list some existing applications of P2P System, what services does a P2P System provide; the second one, an introduction of some thing about the advantages of peer-to-peer, why it is becoming much more popular; the last one, what kinds of attacks could be found in peer-to-peer networks, and the attributes of these attacks. 2.1 Applications of P2P System Current applications of P2P can be divided into three categories: 1. File Sharing: Such as Napster, Gnutella, FreeNet, KaZaA and others that make it possible for Internet users to share their photos, video, files and other kinds of digital information [7]. 2. Distributed Processing: In a P2P system, the distributed processing share the computing power of their nodes. For instance, SETI@Home is a such application [7] ( SETI@home is a scientific experiment that uses Internet-connected computers in the Search for Extraterrestrial Intelligence), and some other online auction sites also adopt P2P communities to build on top of a client server computing architecture.

2 3. Instant Messaging: Such as MSN Messageer, Yahoo [7], and AOL Instant Messenger allow the peers to send instant messages immediately with out a fixed central server. 2.2 Advantages of P2P system The main features of peer-to-peer system are that: all of the clients provide not only their own data, but also their storage space and computing power. So, when one node joins in a P2P system, the total ability of the system will be increased as well. Since there is no fixed server in the system, adding more clients could improve the speed of data transmission for all users. 2.3 Attacks in P2P system Because there is no centralized node acting as an authority, the behaviors of another node could not be monitored and controled. Some bug or malicious services could be motivated by the attackers, and the attackers can get away without any attention after doing some ugly things. There are three main types of attacks as follow: Poisoning attacks: the content provided in the files is different from the description. Insertion of viruses to carried data: the viruses are hidden in the carring data, downloading or carried files maybe infected with the viruses [3]. Identity attacks: track the users of the network, harassing or legally attack the users [4]. 3 Existing Trust Models in Peer to Peer System Before examining some main existing Trust Models in Peerto-Peer reputation System, let s focus on four issues firstly, which are vital to address in any P2P system [10]. These characteristics are that a peer-to-peer shoulld possess. Since, all of them directly affect the quality of reputation mechanism in a P2P system. 1. Self-policing: it means that, the shared moral of the user population are defined and enforced by itself, but not by other central authority. The system can dominate itself. 2. Anonymity maintaining: In order to main the anonymity, the peer s reputation should be associated with an opacity identifier, but not with an seemingly associated identity (for example, a peer s IP address). 3. Do not assign any profit to newcomers: that is the consistent good behavior can get the reputation via several transactions [10], this does not mean the advantageous for malicious peers with poor reputations to continuously change their opacity identifiers to get freshmen status. 4. To the system, it should have minimal overhead in terms of infrastructure and message complexity. For the malicious collectives of peers who know one another and attempt to collectively disturb the system, the system should also be very energetic to them. 3.1 Global Trust Model This model is based on binary trust. In other words, an agent could be either trustworthy or not. The transactions are performed by the agents, and each of them t(p,q) [11] can be performed correctly or not. If there is one agent p cheating within a transaction, the agent will become from the global perspective untrustworthy. For distributing the information about transactions agent, these information is forwarded by agents to other agents. In this model, it is assumed that the trust exists and malicious behavior are just exceptions. If there is a malicious behavior of q, an agent is able to file a complaint c(p,q). Firstly, let s consider a simple situation. If there are two agents p and q, they interact with each other very well. After for a while, another agentr, which wants to get the trustworthiness of p and q. As p, it is cheating, but q is honest. After their interaction, the complaint about p will be filed by q, that is pretty fair. On the other side, p will also do the similar thing as q does, so that to hide its misbehavior. To an outside observer r, it can not distinguish whether p is honest or q is honest, it is very hard for r to tell the truth. There is another new trouble for P continues to cheat. p is a cheater which can be distinguished in the following way. Assume that, p is cheating in another interaction with s. Then, agent r will detect that p complaints about q and s. In contract, both q and s all complaint about p. So we can get a conclusion, p is the cheater. Generalizing the above idea by the below equation: T(p) = { c(p,q) q P } {c(q,p) q P } [11] (1) The higher values of T(p), the trustworthy of p is lower. The above simple situation is directly forward for an agent. The agent can collect all information about its own interactions with other agents. But for some other specific agents, it is very hard to collect all of the complaints. Then, from the data management can solve the problem. The details of decentralized data management could be found from reference [11]. 3.2 NICE Model In order to determine good peers in P2P system, and establish steady cooperation with other peers, NICE model is inspired in this background. This model is used to guard against malicious peers. Each peer at the ends of an interaction, creating a cookie with feedback about the other peer assign it. The signed cookies are exchange among them. If the transaction is successful, the value of the cookie is positive, otherwise, the value is negative. NICE model differs other models lively. For other models, it is required for them to be in change of the requestor is trusted. For NICE model, if one peer wants to request a certain data or other things. The peer can just show the provider with a cookie signed by

3 C 0.6 D A 0.9 B E Figure 1: Directed Graph in NICE [8] the provider itself. The validity of the cookies provided will be justify by the provider. If the cookie is right, then, it is regarded as a evidence of the requestor peer s trustworthiness. Howerver, if the requesting peer does not have a direct cookie, what it is going to do next? It will check a path of trust between itself and the provider peer, and shows this path to the provider. Figure1 shows a directed graph with trust paths between peers A and B, which can be presented by B to A in support of B s trustworthiness [8]. Positive cookies will be exchanged by interacting peers, negative cookies are retained by the peer that creates it. To guarantee the negative cookies are untampered and available to other peers in the system. To avoid any other attacks perpetrated by colluding peers, the peers will create robust cooperative groups with other good peers. In this way, every peer has a preference list of good peers, and maintaining it based on the past interaction history. 3.3 EIGENTRUST EigenTrust model is designed for the reputation management of P2P system. The global reputation of each peer i is marked by the local trust values assigned to peer i by other peers, and it is weighted by the gobal reputation of the assigned peers [10]. For normalizing local trust value Cij[10], the definition is as follow:sij is meant for each peer enable to store the number satisfactory transactions it has had with peer j, and it is also meant for the number of unsatisfactory transactions it has had with peer. (2) C ij = max(s ij, 0) max(s ij, 0) j However, there are some shorting comings in this normalizing. For instance, the normalized trust values can not distinguish between a peer with whom peer i [10] did not interact and a peer with whom peer i has bad experience. Aggregating local trust Values, after normalizing local trust value, it is required to aggregate the normalized local trust valus. In a distributed environment, one common way to do this is as follow: for the peer i will ask its acquaintances about their opinions about other peers. There is a notable probabilistic interpretation of this method. Suppose that, one agent is looking for reputable peers, it can roam in the network following this rule: it crawls to peer j with probability Cij After a roaming for a while, the agent is more possible to be at reputation peers than unreputable peers [5]. 3.4 Trust in Large-Scale Peer-to-Peer Systems For large-scale P2P systems, one major challenge is how to build up trust between different peers without the benefit trusted third parties or authorities. In general, the peers do not have any pre-existing relationship. Even if there are some authorities are available, such as an authentication server or certification authority, it can guarantee these authorities enable lookup transactions, and then declare the trustworthiness of different peers. Generally, this trust model aims to a distributed reputation mechanism for P2P system, e.g., multiagent systems, the binary ratings cannot accurately model a peer s experience of the quality of service (QoS) with other peers in this system. In P2P systems, the peers interact with each other by forming ratings. In order to evaluate the trustworthiness of a given party, especially prior to any frequent direct interactions, the peers would depend on cooperation the knowledge of other peers - termed witness, these peers interacted with the same party via the reputation mechanisms. In this model, each peer has its own a set of acquaintances, a subset of which are identified as its neighbors [4]. The neighbors are such peers that the given peer would contact and the peers that it would refer others to. A peer maintains a model of each acquaintance. The acquaintance s reliability and credibility are included in this model. Reliability is used for providing high-quality services, credibility is used for providing trustworthy ratings to other peers. Ratings Generation, In the binary ratings, a peer rates the services from another peer as one of two values, commonly interpreted as either one (e.g., positive or satisfactory) or zero (e.g., negative, unsatisfactory). Binary ratings work pretty well for file sharing systems where a file is either the definitive correct version or is wrong, but cannot accurately model richer services in other settings such as web services and electronic commerce, where a boolean may not adequately represent a peer s experience of the quality of service (QoS) with other peers [4], e.g., the quality of products the peer sends and the expected delivery time. Ratings Discovery: the polling algorithms for rating discovery in Large-Scale Peer-to-Peer Systems are based on Gnutella protocols, in which the requesting peer broadcasts the message to all other peers within the horizon of a given TTL (Time to Live)[4]. Polling processes waste much bandwidth and processing power since each peer queries all of its neighbors. Ratings Aggregation: although some of the existing approaches consider the credibilities of voters (or witnesses) in the enhanced polling protocol, they don t consider how to effectively aggregate the noisy ratings in presence of dishonest or unreliable voters. Aggregate rating is used for telling whether the peer is trustworth, but this can not be propagated to other peers.

4 3.5 A reputation-based trust Model for Peerto-Peer ecommerce Communities This trust model is designed based on the Peer-to-Peer (P2P) electronic commerce. The kind of electronic commerce communities can be seen as truly distributed computing application, and the peers in this application communicates directly with one another to exchange information, distribute tasks, or execute transactions. There are two computing architectures choices for such communications, one is on top of a P2P network, the other one is on a conventional clientserver platform. In ecommerce, the P2P communications are always established dynamically with other peers. However, these peers are unrelated and unknown to each other. To the peers, how to manage the risk in such communications without prior experience and knowledge about each other s reputation [9]. One solution to this uncertainly is to develop strategies for establishing community-based trust through reputation [3]. The importance in communications is that, trust can provide buyers with high satisfying exchange relationships. This peer-to-peer trust model is for quantifying and assessing the trustworthiness of peers in P2P ecommerce communities. The goal of this model is to establish a general trust metrics which can provide an effective measure for capturing the trustworthiness of peers, address the fake or misleading feedbacks [1]. The metrics [3] can also adapt to different communities and situations. This model has the unique five import factors for evaluating the trustworthiness of a peer in an evolving P2P ecommerce community: The feedback in terms of amount of satisfaction a peer obtains from other peers through transactions. The feedback scope, such as the total number of transactions that a peer performs with other peers in the community, The credibility factor for the feedback source. The transaction context factor for discriminating missioncritical transactions from less or non-critical ones, and Items Global Trust Model NICE Model EIGENTRUST Model Trust in large-scale A reputation-based trust Base binary trust Cookie Trust value A set of acquintances quantify and access the trustworth Table 1: Comparsion of Base in some trust models Items Global Trust Model NICE Model EIGENTRUST Model Trust in large-scale A reputation-based trust Scope As a part of any model guard agaist malicious peers Reputation is assigned by each other large-scale ecommernce Table 2: Comparsion of Scope in some trust models peers according to their trustworthiness [10] [3]. The core of the protocol is that, a special normalization process where the trust ratings held by a peer are normalized to have their sum equal to 1. Its shortcoming is that this normalization could occurs the loss of important trust information. Another proposal with a similar scope is the protocol of Damiani et al. [3]. This protocol is used for assessing the trustability of a file to be downloaded by "voting" of the peers. There is no distinction between the votes from trustworthy in this algorithm, and there is no authentication of thc vote messages. Also, no quantitative trust metric is specified for choosing among altemativc versions. Table1, 2 below show two comparision of five trust models mentioned above, from base and scope sides. Except for the above comparision, there are some disadvantages of them should be paid much attention. It is very hard to ditingish normalized trust values in EIGNTRUST Model. The trust model in large-scale, much more work is needed for computing trust values. In the reputation-based trust model, only partly deception can be prevented. The community context factor for addressing communityrelated characteristics and vulnerabilities. 4 Comparison of the Trust algorithms There are some algorithms which have been proposed for reputation-based trust management in P2P systems. In this section, let s to examine the differences among them. As one of the earliest works in this area, the algorithm designed by Aberer and Despotovic is to identify dishonest peers by a complaint-based system. The disadvantage of this algorithm is that, it can not provide any means for a trustworthy peer to the distinguished a new peer, only the negative feedbacks is maintained. Its trust evaluation is very simple, distinguish every peer either as trustworthy or or untrustworthy. EigenTrust scheme is proposed by Kamvaret al., which can be used for evaluating the trust information provided by 5 Discussion P2P systems have been adopted to distribute the responsibilities traditionally held by centralized servers across the network, delegating them to the clients. But, as P2P systems decompose resources into the network, they also disperse security weaknesses.the issue of secure score management in P2P networks is an important problem, with implications for reputation management, incentive systems, and P2P micropayment schemes, among others. It is important to note that the core EigenTrust algorithm may be used with many different secure score management schemes. There are some possible attacks of reputation mechanisms. These attacks aim at utilizing the weakness of reputationbased approaches, such as rumor, deception and pseudonyms [4]. Rumors There is no discussion about the problem of ru-

5 mors in other reputation-based approaches. Rumor is not same to the deception. If the witness returns the ratings not from its direct interaction, then romors occurs. The ratings aggregating can be used in the P2P systems and maybe by some malicious peers, e.g., attacking the reputation of normal peers. Deception If one witness returns multiple ratings or wrong ratings toward a peer, then deception happens. The trouble of multiple ratings is very simple. Suppose that, the malicious peer encrypt the message with the same key K. To the requesting peer, which just simply discards all the messages encrypted with key K. Sometimes the malicious peer may filch the keys of others. Pseudonyms It is not so hard to hide themself (the peers) and re-enter under a completely different identity with zero or very low cost. The general case of pseudonyms is that, peers can establish a reputation, use it by cheating or attacking others, and then access the system aganin with its new identity. For EigenTrust, the security issues are that: Firstly, the peer s current trust value must not be calculated by and reside at the peer itself. If it likes that, the peer can easily to be manipulated. Thus, we adopt a different peer in the network compute the trust value of a peer. Secondly, it will be in the interest of malicious peers to return wrong results when they are supposed to compute any peer s trust value. So, if in order to compute the trust value of one peer in the network, you will have to get more than one other peers. For Trust in Large-Scale Peer-to-Peer Systems, the security issues are that:. For Rumors: it is very dangerous to double counting of evidence in a distributed system, sicne it can cause to rumors: peers holding opinions about others, just because they heard them from someone. For Deception: It focuses on the deception from a colluding group, the ratings in deception are from a cluster of malicious peers, however, they are not from a clique of IP addresses. This approach can partially prevents this kind of attack with tracking the weights of different witnesses in the colluding group. If there is one witness found cheating, testimonies from the deceptive witness will have a reduced, which effects on the aggregated ratings in the future. 6 Conclusions Enable peers to develop trust and among themselves is important in a peer-to-peer system where resources (such as files) of different quality are offered. It will become increasingly important in systems for peer-to-peer computation, where trust mechanisms can provide a way for protection of unreliable, infected or ugly peers. We presented some main repuation-based trust models in P2P system. Although, there is not enough details about the algorithm in each models, we still can get the general idea about them, how they operate in some certain situtation. Thougth the compaison among the existing trust protocols (trust algorithms), we get the differneces of them, what specific goals of their design and their characters. Security of the trust model in peer-to-peer system is another issue we focus on, we tried to list the common attack means and two security issues in EigenTrust and Trust in Large-Scale Peerto-Peer Systems. Each of them has its own consideration of the seucrity. References [1] Li Xiong and Ling Liu. A Reputation-Based Trust Model for Peer-to-Peer ecommerce Communities. Proceedings of the IEEE International Conference on E-Commerce. [2] Yao Wang and Julita Vassileva. Trust and Reputation Model in Peer-to-Peer Networks. IEEE Proceedings of the Third International Conference on Peer-to-Peer Computing (P2Paŕ03),2003. [3] Ali Aydin Selpk, Ersin Uzun and Mark Regat Pariente. A Reputation-Based Trust Management System for P2P Networks. In IEEE International Symposium on Cluster Computing and the Grid, [4] Bin Yu, Munindar P. Singh and Katia Sycara. Developing Trust in Large-Scale Peer-to-Peer Systems. IEEE [5] Yan Wang and Vijay Varadharajan. Dynamicnust: The Trust Development in Peer-to-Peer Environments. In IEEE Proceedings of the IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing (SUTC O6), [6] Roger Dingledine, Nick Mathewson and Paul Syverson. Reputation in P2P Anonymity Systems. [7] Ernesto Damiani, Sabrina De Capitani di Vimercati and Stefano Paraboschi. A ReputationBased Approach for Choosing Reliable Resources in PeertoPeer Networks. CCSąŕ02, November 1822,2002, Washington, DC, USA. [8] Girish Suryanarayana, Mamadou H. Diallo, Justin R. Erenkrantz, and Richard N. Taylor. Architectural Support for Trust Models in Decentralized Applications. In ICSE 06, May, 2006, Shanghai, China. [9] Sergio Marti and Hector Garcia-Molina. Limited Reputation Sharing in P2P Systems. In EC 04 May20.08, 2004, New York, New York, USA. [10] Sepandar D. Kamvar, Mario T. Schlosser and Hector GarciaMolina. The EigenTrust Algorithm for Reputation Management in P2P Networks. [11] Karl Aberer and Zoran Despotovic Managing Trust in a Peer-2-Peer Information System. In CIKM 01, November S-10,2001, Atlanta, Georgia, USA.

A Reputation Management System in Structured Peer-to-Peer Networks

A Reputation Management System in Structured Peer-to-Peer Networks A Reputation Management System in Structured Peer-to-Peer Networks So Young Lee, O-Hoon Kwon, Jong Kim and Sung Je Hong Dept. of Computer Science & Engineering, Pohang University of Science and Technology

More information

A reputation-based trust management in peer-to-peer network systems

A reputation-based trust management in peer-to-peer network systems A reputation-based trust management in peer-to-peer network systems Natalia Stakhanova, Sergio Ferrero, Johnny Wong, Ying Cai Department of Computer Science Iowa State University Ames, Iowa 50011 USA {

More information

A Reputation-Based Trust Management System for P2P Networks

A Reputation-Based Trust Management System for P2P Networks A Reputation-Based Trust Management System for P2P Networks Ali Aydın Selçuk Ersin Uzun Mark Reşat Pariente Department of Computer Engineering Bilkent University Ankara, 68, Turkey E-mail: selcuk@cs.bilkent.edu.tr,

More information

Decoupling Service and Feedback Trust in a Peer-to-Peer Reputation System

Decoupling Service and Feedback Trust in a Peer-to-Peer Reputation System Decoupling Service and Feedback Trust in a Peer-to-Peer Reputation System Gayatri Swamynathan, Ben Y. Zhao and Kevin C. Almeroth Department of Computer Science, UC Santa Barbara {gayatri, ravenben, almeroth}@cs.ucsb.edu

More information

A Reputation Management and Selection Advisor Schemes for Peer-to-Peer Systems

A Reputation Management and Selection Advisor Schemes for Peer-to-Peer Systems A Reputation Management and Selection Advisor Schemes for Peer-to-Peer Systems Loubna Mekouar, Youssef Iraqi, and Raouf Boutaba University of Waterloo, Waterloo, Canada {lmekouar, iraqi, rboutaba}@bbcr.uwaterloo.ca

More information

Trust and reputation in file-sharing Peer-to-Peer systems

Trust and reputation in file-sharing Peer-to-Peer systems TDDC03 Projects, Spring 2004 Trust and reputation in file-sharing Peer-to-Peer systems Peng Mu, Xianying Cheng Supervisor: Claudiu Duma Trust and reputation in file-sharing Peer-to-Peer systems Peng Mu,

More information

ONLINE REPUTATION SYSTEMS

ONLINE REPUTATION SYSTEMS ONLINE REPUTATION SYSTEMS YUYE WANG 1 CPSC 557: Sensitive Information in a Wired World Professor: Joan Feigenbaum Date: 12 Nov, 2013 Identity Reput ation Trust 2 TRUST SYSTEM Trust system, guide people

More information

R-Chain: A Self-Maintained Reputation Management System in P2P Networks

R-Chain: A Self-Maintained Reputation Management System in P2P Networks R-Chain: A Self-Maintained Reputation Management System in P2P Networks Lintao Liu, Shu Zhang, Kyung Dong Ryu, Partha Dasgupta Dept. of Computer Science & Engineering Arizona State University Tempe, AZ

More information

ASecure Hybrid Reputation Management System for Super-Peer Networks

ASecure Hybrid Reputation Management System for Super-Peer Networks ASecure Hybrid Reputation Management System for Super-Peer Networks Ghassan Karame Department of Computer Science ETH Zürich 892 Zürich, Switzerland karameg@infethzch Ioannis T Christou Athens Information

More information

Super-Consumer Based Reputation Management for Web Service Systems

Super-Consumer Based Reputation Management for Web Service Systems Super-Consumer Based Reputation Management for Web Service Systems Yao Wang, Julita Vassileva Department of Computer Science, University of Saskatchewan, Canada, e-mail:{yaw181, jiv}@cs.usask.ca Abstract

More information

A Super-Agent Based Framework for Reputation Management and Community Formation in Decentralized Systems

A Super-Agent Based Framework for Reputation Management and Community Formation in Decentralized Systems Computational Intelligence, Volume 000, Number 000, 0000 A Super-Agent Based Framework for Reputation Management and Community Formation in Decentralized Systems Yao Wang, Jie Zhang and Julita Vassileva

More information

Trust Management Towards Service-Oriented Applications

Trust Management Towards Service-Oriented Applications Trust Management Towards Service-Oriented Applications Yan Wang Department of Computing Macquarie University Sydney, NSW 2109, Australia yanwang@ics.mq.edu.au Duncan S. Wong Department of Computer Science

More information

IDENTIFYING HONEST RECOMMENDERS IN REPUTATION SYSTEMS

IDENTIFYING HONEST RECOMMENDERS IN REPUTATION SYSTEMS IDENTIFYING HONEST RECOMMENDERS IN REPUTATION SYSTEMS Farag Azzedin King Fahd University of Petroleum and Minerals, Information and Computer Science Department, Dhahran, 31261, Saudi Arabia. ABSTRACT Reputation

More information

Fuzzy Logic Techniques for Reputation Management in Anonymous Peer-to-Peer Systems

Fuzzy Logic Techniques for Reputation Management in Anonymous Peer-to-Peer Systems Fuzzy Logic Techniques for Reputation Management in Anonymous Peer-to-Peer Systems Ernesto Damiani Sabrina De Capitani di Vimercati Stefano Paraboschi 2 Marco Pesenti Pierangela Samarati Sergio Zara ()

More information

Reputation Management: Experiments on the Robustness of ROCQ

Reputation Management: Experiments on the Robustness of ROCQ Reputation Management: Experiments on the Robustness of ROCQ Anurag Garg Roberto Battiti Roberto Cascella Dipartimento di Informatica e Telecomunicazioni, Università di Trento, Via Sommarive 4, 385 Povo

More information

Efficient Distributed Reputation Scheme for Peer-to-Peer Systems

Efficient Distributed Reputation Scheme for Peer-to-Peer Systems Efficient Distributed Reputation Scheme for Peer-to-Peer Systems Chu Yee Liau, Xuan Zhou, Stéphane Bressan, and Kian-Lee Tan Department of Computer Science, National University of Singapore {liaucy,zhouxuan,steph,tankl}@comp.nus.edu.sg

More information

A Reputation-based Trust Management System for P2P Networks

A Reputation-based Trust Management System for P2P Networks International Journal of Network Security, Vol.6, No.2, PP.227-237, Mar. 28 227 A Reputation-based Trust Management System for P2P Networks Ali Aydın Selçuk 1, Ersin Uzun 2, and Mark Reşat Pariente 3 (Corresponding

More information

Super-Agent Based Reputation Management with a Practical Reward Mechanism in Decentralized Systems

Super-Agent Based Reputation Management with a Practical Reward Mechanism in Decentralized Systems Super-Agent Based Reputation Management with a Practical Reward Mechanism in Decentralized Systems Yao Wang, Jie Zhang, and Julita Vassileva Department of Computer Science, University of Saskatchewan,

More information

Dynamic Reputation Based Trust Management Using Neural Network Approach

Dynamic Reputation Based Trust Management Using Neural Network Approach www.ijcsi.org 161 Dynamic Reputation Based Trust Management Using Neural Network Approach Reza Azmi 1 Mahdieh Hakimi 2, and Zahra Bahmani 3 1 College of Engineering, Alzahra University 2 College of Engineering,

More information

New Metrics for Reputation Management in P2P Networks

New Metrics for Reputation Management in P2P Networks New for Reputation in P2P Networks D. Donato, M. Paniccia 2, M. Selis 2, C. Castillo, G. Cortesi 3, S. Leonardi 2. Yahoo!Research Barcelona Catalunya, Spain 2. Università di Roma La Sapienza Rome, Italy

More information

Trust and Reputation Management

Trust and Reputation Management Trust and Reputation Management Omer Rana School of Computer Science and Welsh escience Centre, Cardiff University, UK Omer Rana (CS, Cardiff, UK) CM0356/CMT606 1 / 28 Outline 1 Context Defining Trust

More information

A Fuzzy Approach for Reputation Management using Voting Scheme in Bittorrent P2P Network

A Fuzzy Approach for Reputation Management using Voting Scheme in Bittorrent P2P Network A Fuzzy Approach for Reputation Management using Voting Scheme in Bittorrent P2P Network Ansuman Mahapatra, Nachiketa Tarasia School of Computer Engineering KIIT University, Bhubaneswar, Orissa, India

More information

A Trust based Access Control Framework for P2P File-Sharing Systems

A Trust based Access Control Framework for P2P File-Sharing Systems A Trust based Access Control Framework for P2P File-Sharing Systems Huu Tran Michael Hitchens Vijay Varadharajan Paul Watters Department of Computing Macquarie University {huutran, michaelh, vijay, pwatters}@ics.mq.edu.au

More information

An Effective Risk Avoidance Scheme for the EigenTrust Reputation Management System

An Effective Risk Avoidance Scheme for the EigenTrust Reputation Management System An Effective Risk Avoidance Scheme for the EigenTrust Reputation Management System Takuya Nishikawa and Satoshi Fujita Department of Information Engineering, Hiroshima University Kagamiyama 1-4-1, Higashi-Hiroshima,

More information

Reputation Management Framework and its use as Currency in Large-Scale Peer-to-Peer Networks

Reputation Management Framework and its use as Currency in Large-Scale Peer-to-Peer Networks 1 Reputation Management Framework and its use as Currency in Large-Scale Peer-to-Peer Networks Rohit Gupta and Arun K. Somani Dependable Computing and Networking Laboratory Department of Electrical and

More information

Reputation Management in P2P Networks: The EigenTrust Algorithm

Reputation Management in P2P Networks: The EigenTrust Algorithm Reputation Management in P2P Networks: The EigenTrust Algorithm by Adrian Alexa supervised by Anja Theobald 1 Introduction Peer-to-Peer networks is a fast developing branch of Computer Science and many

More information

Implementation of P2P Reputation Management Using Distributed Identities and Decentralized Recommendation Chains

Implementation of P2P Reputation Management Using Distributed Identities and Decentralized Recommendation Chains Implementation of P2P Reputation Management Using Distributed Identities and Decentralized Recommendation Chains P.Satheesh Associate professor Dept of Computer Science and Engineering MVGR college of

More information

Reputation-Oriented Trustworthy Computing in E-Commerce Environments

Reputation-Oriented Trustworthy Computing in E-Commerce Environments Reputation-Oriented Trustworthy Computing in E-Commerce Environments Yan Wang Macquarie University Kwei-Jay Lin University of California, Irvine The reputation-oriented trust issue is critical to e-commerce

More information

Peer to peer networks: sharing between peers. Trond Aspelund

Peer to peer networks: sharing between peers. Trond Aspelund Peer to peer networks: sharing between peers Trond Aspelund Abstract In this literature survey we look at peer-to-peer networks. We first see how peer-to-peer networks distinguish themselves from the client/server

More information

Napster and Gnutella: a Comparison of two Popular Peer-to-Peer Protocols. Anthony J. Howe Supervisor: Dr. Mantis Cheng University of Victoria

Napster and Gnutella: a Comparison of two Popular Peer-to-Peer Protocols. Anthony J. Howe Supervisor: Dr. Mantis Cheng University of Victoria Napster and Gnutella: a Comparison of two Popular Peer-to-Peer Protocols Anthony J Howe Supervisor: Dr Mantis Cheng University of Victoria February 28, 2002 Abstract This article presents the reverse engineered

More information

Dynamic Trust Management for Mitigation of Malware Dissemination in P2P Networks

Dynamic Trust Management for Mitigation of Malware Dissemination in P2P Networks Dynamic Trust Management for Mitigation of Malware Dissemination in P2P Networks Roberto Rojas-Cessa Assoc. Professor In collaboration with Lin Cai Networking Research Laboratory Department of Electrical

More information

A Reputation-Based Trust Model for Peer-to-Peer ecommerce Communities

A Reputation-Based Trust Model for Peer-to-Peer ecommerce Communities A Reputation-Based Trust Model for Peer-to-Peer ecommerce Communities Li Xiong College of Computing Georgia Institute of Technology lxiong@cc.gatech.edu Ling Liu College of Computing Georgia Institute

More information

Simulating a File-Sharing P2P Network

Simulating a File-Sharing P2P Network Simulating a File-Sharing P2P Network Mario T. Schlosser, Tyson E. Condie, and Sepandar D. Kamvar Department of Computer Science Stanford University, Stanford, CA 94305, USA Abstract. Assessing the performance

More information

Balanced Reputation Detective System (BREDS): Proposed Algorithm

Balanced Reputation Detective System (BREDS): Proposed Algorithm Balanced Reputation Detective System (BREDS): Proposed Algorithm Pallavi Bansal 1, Narender Singh 2 1,2Computer science &Engineering department, G.I.T.M, Bilaspur, Yamunanagar, Haryana ---------------------------------------------------------------------***---------------------------------------------------------------------

More information

A Reputation System for Peer-to-Peer Networks

A Reputation System for Peer-to-Peer Networks A Reputation System for Peer-to-Peer Networks Minaxi Gupta, Paul Judge, Mostafa Ammar College of Computing, Georgia Institute of Technology {minaxi, judge, ammar}@cc.gatech.edu ABSTRACT We investigate

More information

Trust and Reputation Management in Distributed Systems

Trust and Reputation Management in Distributed Systems Trust and Reputation Management in Distributed Systems Máster en Investigación en Informática Facultad de Informática Universidad Complutense de Madrid Félix Gómez Mármol, Alemania (felix.gomez-marmol@neclab.eu)

More information

An Introduction to Peer-to-Peer Networks

An Introduction to Peer-to-Peer Networks An Introduction to Peer-to-Peer Networks Presentation for MIE456 - Information Systems Infrastructure II Vinod Muthusamy October 30, 2003 Agenda Overview of P2P Characteristics Benefits Unstructured P2P

More information

File reputation in decentralized P2P reputation management

File reputation in decentralized P2P reputation management File reputation in decentralized P2P reputation management Vladislav Jumppanen Helsinki University of Technology Vladislav.Jumppanen (at) hut.fi Abstract Reputation systems have been proven useful in online

More information

Gossip-based Reputation Aggregation for Unstructured Peer-to-Peer Networks*

Gossip-based Reputation Aggregation for Unstructured Peer-to-Peer Networks* Gossip-based Reputation Aggregation for Unstructured Peer-to-Peer Networks* Runfang Zhou and Kai Hwang University of Southern California Los Angeles, CA, 90089 Abstract: Peer-to-Peer (P2P) reputation systems

More information

The Role and uses of Peer-to-Peer in file-sharing. Computer Communication & Distributed Systems EDA 390

The Role and uses of Peer-to-Peer in file-sharing. Computer Communication & Distributed Systems EDA 390 The Role and uses of Peer-to-Peer in file-sharing Computer Communication & Distributed Systems EDA 390 Jenny Bengtsson Prarthanaa Khokar jenben@dtek.chalmers.se prarthan@dtek.chalmers.se Gothenburg, May

More information

A Survey Study on Reputation-Based Trust Management in P2P Networks

A Survey Study on Reputation-Based Trust Management in P2P Networks A Survey Study on Reputation-Based Trust Management in P2P Networks Siddharth Maini Department of Computer Science Kent State University Kent, OH 44240 E-mail: smaini@kent.edu Abstract In this survey study

More information

RepHi: A Novel Attack against P2P Reputation Systems

RepHi: A Novel Attack against P2P Reputation Systems The First International Workshop on Security in Computers, Networking and Communications RepHi: A Novel Attack against P2P Reputation Systems Jingyu Feng a,b, Yuqing Zhang b, Shenglong Chen b,anminfu a,b

More information

Evolution of Peer-to-Peer Systems

Evolution of Peer-to-Peer Systems EE 657 Lecture 9 on Sept. 28, 2007 Evolution of Peer-to-Peer Systems Peer-To-Peer Computing: Part 1 : P2P Platforms, Overlay Networks, and Gnutella Prof. kai Hwang University of Southern California Taylor

More information

Peer-to-Peer Systems: "A Shared Social Network"

Peer-to-Peer Systems: A Shared Social Network Peer-to-Peer Systems: "A Shared Social Network" Nguyen Hoang Anh Helsinki University of Technology hanguyen@cc.hut.fi Abstract In the last few years, the success of the Napster online music sharing program

More information

SIP Service Providers and The Spam Problem

SIP Service Providers and The Spam Problem SIP Service Providers and The Spam Problem Y. Rebahi, D. Sisalem Fraunhofer Institut Fokus Kaiserin-Augusta-Allee 1 10589 Berlin, Germany {rebahi, sisalem}@fokus.fraunhofer.de Abstract The Session Initiation

More information

Reputation Management Framework and its use as Currency in Large-Scale Peer-to-Peer Networks

Reputation Management Framework and its use as Currency in Large-Scale Peer-to-Peer Networks 1 Reputation Management Framework and its use as Currency in Large-Scale Peer-to-Peer Networks Rohit Gupta and Arun K. Somani Dependable Computing and Networking Laboratory Department of Electrical and

More information

RESEARCH ISSUES IN PEER-TO-PEER DATA MANAGEMENT

RESEARCH ISSUES IN PEER-TO-PEER DATA MANAGEMENT RESEARCH ISSUES IN PEER-TO-PEER DATA MANAGEMENT Bilkent University 1 OUTLINE P2P computing systems Representative P2P systems P2P data management Incentive mechanisms Concluding remarks Bilkent University

More information

Scalable Reputation Management for P2P MMOGs

Scalable Reputation Management for P2P MMOGs Scalable Reputation Management for P2P MMOGs Guan-Yu Huang 1, Shun-Yun Hu 2, Jehn-Ruey Jiang 3 Department of Computer Science and Information Engineering National Central University, Taiwan, R.O.C. 1 aby@acnlab.csie.ncu.edu.tw

More information

Reputation Algebra for Cloud-based Anonymous Data Storage Systems

Reputation Algebra for Cloud-based Anonymous Data Storage Systems Reputation Algebra for Cloud-based Anonymous Data Storage Systems Harsh N. Thakker, Mayank Saha and Manik Lal Das Dhirubhai Ambani Institute of ICT Gandhinagar 382007, Gujarat, India {harshnthakker, saha.mayank}@gmail.com

More information

TREMA: A Tree-based Reputation Management Solution for P2P Systems

TREMA: A Tree-based Reputation Management Solution for P2P Systems 163 TREMA: A Tree-based Reputation Management Solution for P2P Systems Quang Hieu Vu ETISALAT BT Innovation Center (EBTIC) Khalifa University, UAE quang.vu@kustar.ac.ae Abstract Trust is an important aspect

More information

Hedaquin: A reputation-based health data quality indicator

Hedaquin: A reputation-based health data quality indicator STM 2007 Hedaquin: A reputation-based health data quality indicator Ton van Deursen a,b, Paul Koster a, Milan Petković a a Philips Research Eindhoven, The Netherlands b Université du Luxembourg, Luxembourg

More information

A Fuzzy Approach for Reputation Management in Online Communities for Bittorrent P2P Network

A Fuzzy Approach for Reputation Management in Online Communities for Bittorrent P2P Network A Fuzzy Approach for Reputation Management in Online Communities for Bittorrent P2P Network Ansuman Mahapatra #1, Nachiketa Tarasia #2, Madhusmita Sahoo #3, Hemanta Kumar Paikray *4, Subhasish Das #5 #

More information

Trust based Peer-to-Peer System for Secure Data Transmission ABSTRACT:

Trust based Peer-to-Peer System for Secure Data Transmission ABSTRACT: Trust based Peer-to-Peer System for Secure Data Transmission ABSTRACT: Open nature of peer-to-peer systems exposes them to malicious activity. Building trust relationships among peers can mitigate attacks

More information

A Point-Based Incentive Scheme for P2P Reputation Management Systems

A Point-Based Incentive Scheme for P2P Reputation Management Systems A Point-Based Incentive Scheme for P2P Reputation Management Systems Takuya NISHIKAWA 1 and Satoshi FUJITA 1 1 Department of Information Engineering, Hiroshima University Higashi-Hiroshima, 739-8527, Japan

More information

Towards Trusted Semantic Service Computing

Towards Trusted Semantic Service Computing Towards Trusted Semantic Service Computing Michel Deriaz University of Geneva, Switzerland Abstract. This paper describes a new prototype of a semantic Service Oriented Architecture (SOA) called Spec Services.

More information

Costs and Benefits of Reputation Management Systems

Costs and Benefits of Reputation Management Systems Costs and Benefits of Reputation Management Systems Roberto G. Cascella University of Trento Dipartimento di Ingegneria e Scienza dell Informazione Via Sommarive 14, I-381 Povo (TN), Italy cascella@disi.unitn.it

More information

Secure and Effective P2P Reputation System using Trust Management and Self Certified Cryptographic Exchanges

Secure and Effective P2P Reputation System using Trust Management and Self Certified Cryptographic Exchanges www.ijcsi.org 519 Secure and Effective P2P Reputation System using Trust Management and Self Certified Cryptographic Exchanges M. Srikanth 1 and K.B. Madhuri 2 1 Dept. of IT, G.V.P College of engineering(a),

More information

Privacy Preserving Public Auditing for Data in Cloud Storage

Privacy Preserving Public Auditing for Data in Cloud Storage Privacy Preserving Public Auditing for Data in Cloud Storage M.Priya 1, E. Anitha 2, V.Murugalakshmi 3 M.E, Department of CSE, Karpagam University, Coimbatore, Tamilnadu, India 1, 3 M.E, Department of

More information

Secure Reputation Mechanism For Unstructured Peer To Peer System

Secure Reputation Mechanism For Unstructured Peer To Peer System Secure Reputation Mechanism For Unstructured Peer To Peer System N. Vijaya Kumar. 1, Prof. Senthilnathan 2 M.E, Department of CSE, P.S.V College of Engineering and Technology, Krishnagiri, Tamilnadu, India

More information

Personalized Reputation Management in P2P Networks

Personalized Reputation Management in P2P Networks Personalized Reputation Management in P2P Networks Paul - Alexandru Chirita 1, Wolfgang Nejdl 1, Mario Schlosser 2, and Oana Scurtu 1 1 L3S Research Center / University of Hannover Deutscher Pavillon Expo

More information

Mitigation of Malware Proliferation in P2P Networks using Double-Layer Dynamic Trust (DDT) Management Scheme

Mitigation of Malware Proliferation in P2P Networks using Double-Layer Dynamic Trust (DDT) Management Scheme Mitigation of Malware Proliferation in P2P Networks using Double-Layer Dynamic Trust (DDT) Management Scheme Lin Cai and Roberto Rojas-Cessa Abstract Peer-to-peer (P2P) networking is used by users with

More information

Peer-to-Peer Networks 02: Napster & Gnutella. Christian Schindelhauer Technical Faculty Computer-Networks and Telematics University of Freiburg

Peer-to-Peer Networks 02: Napster & Gnutella. Christian Schindelhauer Technical Faculty Computer-Networks and Telematics University of Freiburg Peer-to-Peer Networks 02: Napster & Gnutella Christian Schindelhauer Technical Faculty Computer-Networks and Telematics University of Freiburg Napster Shawn (Napster) Fanning - published 1999 his beta

More information

Maximum Likelihood Estimation of Peers Performance in P2P Networks

Maximum Likelihood Estimation of Peers Performance in P2P Networks Maximum Likelihood Estimation of Peers Performance in P2P Networks Zoran Despotovic, Karl Aberer EPFL - Swiss Federal Institute of Technology Lausanne, Switzerland email:{zoran.despotovic, karl.aberer}@epfl.ch

More information

A Review on Trust and Reputation for Web Service Selection

A Review on Trust and Reputation for Web Service Selection A Review on Trust and Reputation for Web Service Selection Yao Wang, Julita Vassileva Department of Computer Science University of Saskatchewan {yaw181, jiv}@cs.usask.ca Abstract A trust and reputation

More information

Multiagent Reputation Management to Achieve Robust Software Using Redundancy

Multiagent Reputation Management to Achieve Robust Software Using Redundancy Multiagent Reputation Management to Achieve Robust Software Using Redundancy Rajesh Turlapati and Michael N. Huhns Center for Information Technology, University of South Carolina Columbia, SC 29208 {turlapat,huhns}@engr.sc.edu

More information

Secure Data transfer in Cloud Storage Systems using Dynamic Tokens.

Secure Data transfer in Cloud Storage Systems using Dynamic Tokens. Secure Data transfer in Cloud Storage Systems using Dynamic Tokens. P.Srinivas *,K. Rajesh Kumar # M.Tech Student (CSE), Assoc. Professor *Department of Computer Science (CSE), Swarnandhra College of Engineering

More information

Multicast vs. P2P for content distribution

Multicast vs. P2P for content distribution Multicast vs. P2P for content distribution Abstract Many different service architectures, ranging from centralized client-server to fully distributed are available in today s world for Content Distribution

More information

A Multi-dimensional Reputation System Combined with Trust and Incentive Mechanisms in P2P File Sharing Systems

A Multi-dimensional Reputation System Combined with Trust and Incentive Mechanisms in P2P File Sharing Systems A Multi-dimensional Reputation System Combined with Trust and Incentive Mechanisms in P2P File Sharing Systems Mao Yang 21, Qinyuan Feng 1, Yafei Dai 1, Zheng Zhang 2 Peking University, Beijing, China

More information

Security Enhanced Cooperative Game Theory for Mobile Ad-Hoc Network

Security Enhanced Cooperative Game Theory for Mobile Ad-Hoc Network Security Enhanced Cooperative Game Theory for Mobile Ad-Hoc Network Bondu Raja PG Scholar, Vignana Bharathi Institute of Technology, Hyderabad, Telngana, India. Ch.Suneetha AssociateProfessor, Vignana

More information

Anonymous Communication in Peer-to-Peer Networks for Providing more Privacy and Security

Anonymous Communication in Peer-to-Peer Networks for Providing more Privacy and Security Anonymous Communication in Peer-to-Peer Networks for Providing more Privacy and Security Ehsan Saboori and Shahriar Mohammadi Abstract One of the most important issues in peer-to-peer networks is anonymity.

More information

Weighted Graph Approach for Trust Reputation Management

Weighted Graph Approach for Trust Reputation Management Weighted Graph Approach for Reputation Management K.Thiagarajan, A.Raghunathan, Ponnammal Natarajan, G.Poonkuzhali and Prashant Ranjan Abstract In this paper, a two way approach of developing trust between

More information

A Reference Model for Reputation Systems

A Reference Model for Reputation Systems A Reference Model for Reputation Systems Sokratis Vavilis a,, Milan Petković a,b, Nicola Zannone a a Eindhoven University of Technology, Den Dolech 2, Eindhoven 5612AZ, Netherlands b Philips Research Eindhoven,

More information

Christoph Sorge. February 12th, 2014 Bitcoin minisymposium at KNAW

Christoph Sorge. February 12th, 2014 Bitcoin minisymposium at KNAW Bitcoin s Peer-to-Peer network Christoph Sorge February 12th, 2014 Bitcoin minisymposium at KNAW Clipart source: http://openclipart.org, users Machovka and Keistutis Department of Computer Science What

More information

SocioPath: In Whom You Trust?

SocioPath: In Whom You Trust? SocioPath: In Whom You Trust? Nagham Alhadad Philippe Lamarre Patricia Serrano-Alvarado Yann Busnel Marco Biazzini {Name.Lastname}@univ-nantes.fr LINA / Université de Nantes 2, rue de la Houssiniére BP

More information

H-Trust: A Group Trust Management System for Peer-to- Peer Desktop Grid

H-Trust: A Group Trust Management System for Peer-to- Peer Desktop Grid J. Comput. Sci. & Technol. H-Trust: A Group Trust Management System for Peer-to- Peer Desktop Grid Huanyu Zhao and Xiaolin Li Scalable Software Systems Laboratory, Department of Computer Science, Oklahoma

More information

An Optimization Model of Load Balancing in P2P SIP Architecture

An Optimization Model of Load Balancing in P2P SIP Architecture An Optimization Model of Load Balancing in P2P SIP Architecture 1 Kai Shuang, 2 Liying Chen *1, First Author, Corresponding Author Beijing University of Posts and Telecommunications, shuangk@bupt.edu.cn

More information

PEER-TO-PEER NETWORK

PEER-TO-PEER NETWORK PEER-TO-PEER NETWORK February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without

More information

PathTrust: A Trust-Based Reputation Service for Virtual Organization Formation

PathTrust: A Trust-Based Reputation Service for Virtual Organization Formation PathTrust: A Trust-Based Reputation Service for Virtual Organization Formation Florian Kerschbaum, Jochen Haller, Yücel Karabulut, and Philip Robinson SAP Research, CEC Karlsruhe, Germany {florian.kerschbaum,

More information

QUANTITATIVE TRUST MANAGEMENT: QuanTM, Reputation, and PreSTA. Andrew G. West PRECISE Meeting 11/18/2009

QUANTITATIVE TRUST MANAGEMENT: QuanTM, Reputation, and PreSTA. Andrew G. West PRECISE Meeting 11/18/2009 QUANTITATIVE TRUST MANAGEMENT: QuanTM, Reputation, and PreSTA Andrew G. West PRECISE Meeting 11/18/2009 TALK OUTLINE Introducing QTM QuanTM [1] Model TDG: Glue between security & reputation Fundamentals

More information

Reputation Management Survey

Reputation Management Survey Reputation Management Survey Sini Ruohomaa, Lea Kutvonen Department of Computer Science University of Helsinki {lea.kutvonen,sini.ruohomaa}@cs.helsinki.fi Eleni Koutrouli Department of Informatics and

More information

Fighting Peer-to-Peer SPAM and Decoys with Object Reputation

Fighting Peer-to-Peer SPAM and Decoys with Object Reputation Fighting Peer-to-Peer SPAM and Decoys with Object Reputation Kevin Walsh Department of Computer Science Cornell University Ithaca, NY 14853 kwalsh@cs.cornell.edu Emin Gün Sirer Department of Computer Science

More information

IEEE JAVA Project 2012

IEEE JAVA Project 2012 IEEE JAVA Project 2012 Powered by Cloud Computing Cloud Computing Security from Single to Multi-Clouds. Reliable Re-encryption in Unreliable Clouds. Cloud Data Production for Masses. Costing of Cloud Computing

More information

The design of a reliable reputation system

The design of a reliable reputation system Electron Commer Res (2010) 10: 239 270 DOI 10.1007/s10660-010-9064-y The design of a reliable reputation system Gayatri Swamynathan Kevin C. Almeroth Ben Y. Zhao Published online: 31 August 2010 The Author(s)

More information

File sharing using IP-Multicast

File sharing using IP-Multicast File sharing using IP-Multicast Kai Trojahner, Peter Sobe University of Luebeck, Germany Institute of Computer Engineering email: sobe@iti.uni-luebeck.de Abstract: File sharing systems cause a huge portion

More information

PEER TO PEER FILE SHARING USING NETWORK CODING

PEER TO PEER FILE SHARING USING NETWORK CODING PEER TO PEER FILE SHARING USING NETWORK CODING Ajay Choudhary 1, Nilesh Akhade 2, Aditya Narke 3, Ajit Deshmane 4 Department of Computer Engineering, University of Pune Imperial College of Engineering

More information

A model of indirect reputation assessment for adaptive buying agents in electronic markets

A model of indirect reputation assessment for adaptive buying agents in electronic markets A model of indirect reputation assessment for adaptive buying agents in electronic markets Kevin Regan and Robin Cohen School of Computer Science University of Waterloo Abstract. In this paper, we present

More information

Reputation Management Survey

Reputation Management Survey Reputation Management Survey Eleni Koutrouli, Lea Kutvonen, Sini Ruohomaa, Aphrodite Tsalgatidou Department of Informatics and Communications, National University of Athens {ekou,atsalga}@di.uoa.gr Department

More information

Advanced Peer to Peer Discovery and Interaction Framework

Advanced Peer to Peer Discovery and Interaction Framework Advanced Peer to Peer Discovery and Interaction Framework Peeyush Tugnawat J.D. Edwards and Company One, Technology Way, Denver, CO 80237 peeyush_tugnawat@jdedwards.com Mohamed E. Fayad Computer Engineering

More information

Decentralized Peer-to-Peer Network Architecture: Gnutella and Freenet

Decentralized Peer-to-Peer Network Architecture: Gnutella and Freenet Decentralized Peer-to-Peer Network Architecture: Gnutella and Freenet AUTHOR: Jem E. Berkes umberkes@cc.umanitoba.ca University of Manitoba Winnipeg, Manitoba Canada April 9, 2003 Introduction Although

More information

N6Lookup( title ) Client

N6Lookup( title ) Client CS 640: Introduction Networks AdityaAkella Peer-to-Peer Lecture 24 -to Computer p2p Uses Downloading: Searching Centralized Flooding Smarter Routing file of sharing p2p The (Freenet, (Gnutella, flooding

More information

Mapping the Gnutella Network: Macroscopic Properties of Large-Scale Peer-to-Peer Systems

Mapping the Gnutella Network: Macroscopic Properties of Large-Scale Peer-to-Peer Systems Mapping the Gnutella Network: Macroscopic Properties of Large-Scale Peer-to-Peer Systems Matei Ripeanu, Ian Foster {matei, foster}@cs.uchicago.edu Abstract Despite recent excitement generated by the peer-to-peer

More information

A Blueprint for Universal Trust Management Services

A Blueprint for Universal Trust Management Services A Blueprint for Universal Trust Management Services Tomasz Kaszuba Krzysztof Rzadca Adam Wierzbicki Grzegorz Wierzowiecki Polish-Japanese Institute of Information Technology Warsaw, Poland adamw@pjwstk.edu.pl

More information

Attacks Against Peer-to-peer Networks and Countermeasures

Attacks Against Peer-to-peer Networks and Countermeasures Attacks Against Peer-to-peer Networks and Countermeasures Lin Wang Helsinki University of Technology lwang@cc.hut.fi Abstract Peer-to-peer (P2P) networks have many distinct aspects that are different from

More information

A Collaborative and Semantic Data Management Framework for Ubiquitous Computing Environment

A Collaborative and Semantic Data Management Framework for Ubiquitous Computing Environment A Collaborative and Semantic Data Management Framework for Ubiquitous Computing Environment Weisong Chen, Cho-Li Wang, and Francis C.M. Lau Department of Computer Science, The University of Hong Kong {wschen,

More information

Peer-to-Peer Research at Stanford

Peer-to-Peer Research at Stanford Peer-to-Peer Research at Stanford Mayank Bawa, Brian F. Cooper, Arturo Crespo, Neil Daswani, Prasanna Ganesan, Hector Garcia-Molina, Sepandar Kamvar, Sergio Marti, Mario Schlosser, Qi Sun, Patrick Vinograd,

More information

Research Issues in Peer-to-Peer Data Management

Research Issues in Peer-to-Peer Data Management Research Issues in Peer-to-Peer Data Management Özgür Ulusoy Department of Computer Engineering Bilkent University, Ankara, Turkey oulusoy@cs.bilkent.edu.tr Abstract-Data management in Peer-to-Peer (P2P)

More information

Peer-to-Peer Networks Organization and Introduction 1st Week

Peer-to-Peer Networks Organization and Introduction 1st Week Peer-to-Peer Networks Organization and Introduction 1st Week Department of Computer Science 1 Peer-to-Peer Networks Organization 2 2 Web & Dates Web page http://cone.informatik.uni-freiburg.de/lehre/vorlesung/

More information

SPIES: Secret Protection Incentive-based Escrow System

SPIES: Secret Protection Incentive-based Escrow System SPIES: Secret Protection Incentive-based Escrow System N Boris Margolin Matthew K Wright Brian N Levine Dept of Computer Science, University of Massachusetts, Amherst, MA 01003 {margolin,mwright,brian}@csumassedu

More information

Experience with an Object Reputation System for Peer-to-Peer Filesharing

Experience with an Object Reputation System for Peer-to-Peer Filesharing Experience with an Object Reputation System for Peer-to-Peer Filesharing Kevin Walsh Emin Gün Sirer Cornell University {kwalsh,egs}@cs.cornell.edu Abstract In this paper, we describe Credence, a decentralized

More information

A Robust Reputation System for P2P and Mobile Ad-hoc Networks

A Robust Reputation System for P2P and Mobile Ad-hoc Networks A Robust Reputation System for P2P and Mobile Ad-hoc Networks Sonja Buchegger EPFL-IC-LCA CH-1015 Lausanne, Switzerland sonja.buchegger@epfl.ch Jean-Yves Le Boudec EPFL-IC-LCA CH-1015 Lausanne, Switzerland

More information