ASecure Hybrid Reputation Management System for Super-Peer Networks
|
|
|
- Preston Mills
- 10 years ago
- Views:
Transcription
1 ASecure Hybrid Reputation Management System for Super-Peer Networks Ghassan Karame Department of Computer Science ETH Zürich 892 Zürich, Switzerland Ioannis T Christou Athens Information Technology 195km Markopoulo Ave, Peania 192, Athens, Greece ichr@aitedugr Tassos Dimitriou Athens Information Technology 195km Markopoulo Ave, Peania 192, Athens, Greece tdim@aitedugr Abstract In this paper, we propose a novel hybrid system for handling reputation in Super-Peer-based networks by combining the personal history of each user s interactions with other users, the opinions of peer-friends together with global ratings of peers as they emerge from all of their interactions with other users of the network We introduce the notion of peer friends in a P2P network and use it to prevent malicious collectives from reducing the reputation of a peer in the network We also present a secure distributed framework that ensures that trust reports remain encrypted and are never opened during the submission or aggregation process Computational results from our distributed prototype simulation show that our solution compares favorably with all other proposed methods for handling reputation when subject to various malicious strategies Index Terms Social Networks, Peer-to-Peer, Super-peer Networks, Trust, Reputation, Security I INTRODUCTION Peer-to-peer (P2P) systems are gaining increased popularity due to their ability to harness large amounts of resources (eg Gnutella[2]) and to scale and self-organize in the presence of a highly transient population of nodes Since P2P networks enable files to be hosted by unknown users, there is an omnipresent risk that the downloaded files might carry various kinds of malicious software like viruses and worms This suggests that a number of trust/reputation issues need to be addressed in P2P networks as means of providing popularity based ranking in order to help users discover the desired authentic data ([4], [5], [8], [9], [1]) Most of the proposed approaches rely on distributed polling protocols, thus incurring significant messaging overhead and load imbalance in the network Furthermore, they fail to handle spurious rumors spread by independent and colluding peers This paper proposes a novel hybrid mechanism for handling reputation in P2P file sharing networks Although our model can be easily integrated in most P2P topologies, we only target in this work super-peer architectures mainly due to their widespread use (eg: Gnutella (v6), KaZaA [1]) and performance superiority when compared to other P2P architectures Our model combines i) the personal history of each user s interactions with other users, ii) the opinions of personal acquaintances, and iii) the global ratings of peers as they emerge from all of their interactions with other users of the network We also introduce the notion of trusted friends, consisting of a subset of peers that share previous social experience and constantly provide each other with their feedback on all the interactions they established with other peers While it is true that friends may not always behave correctly and introduce spurious opinions, we devise some methods in Section III-D to defend against such malicious friends The proposed combination of local and global metrics is highly resistant to malicious rumors spread by dishonest peers and mobs of malicious nodes All the aforementioned parameters are securely pooled together in a general trust metric for evaluating an opinion about the trustworthiness of a peer in the P2P community In addition, we make sure that anonymity, privacy and integrity of the votes, fairness, etc, are preserved when aggregating the global ratings The remainder of the paper is organized as follows Section 2 highlights the related work in the area Section 3 introduces our proposed solution of combining local and global metrics in order to evaluate the trustworthiness of peers Section 4 describes how to ensure the security, anonymity and authenticity of the submitted ratings Finally, in Section 5, we evaluate our simulation results derived from the integration of our approach with realistic P2P file sharing settings II RELATED WORK Although the literature includes several proposals for reputation management in P2P systems, to the best of our knowledge, no previous work proposed the use of peer inter-personal relationships to strengthen trust handling in P2P networks A survey of the various research proposals in the area of trust and reputation is presented by Marti et al [3] in the context of a taxonomy of trust and reputation systems for P2P Networks Cornelli et al [4] propose to base reputation sharing on distributed polling whereby a requestor u can assess the reliability of resource providers by polling its peers In [5], this work has been extended to cover Super peer networks However, in both works, there is no indication how this approach eliminates malicious votes if dishonest peers badly rate good peers and reconfirm their ratings when contacted Yu and Singh [11] developed a model of reputation management based on the Dempster-Shafer theory of evidence Each peer has a set of acquaintances, a subset of which are identified as its neighbors, that a peer would refer to in order to 1
2 investigate the ratings of another peer However, as with other reputation approaches, this approach does not fully protect against malicious ratings generated by malicious agents EigenTrust [9] attempts to handle spurious ratings by assigning to every peers a unique global reputation value computed using an algorithm similar to PageRank by relying on the presence of a-priori good nodes whose reputation never goes down However, this solution is not feasible in large scale P2P systems where some nodes might be unreachable [7] A Design Goals III HYBRID REPUTATION MODEL In this work, we focus on developing an efficient reputation management system resistant to rumors and colluding malicious peers attacking the reputation of loners Our approach reduces several problems encountered in most reputation-based approaches, namely: whitewashing 1 and pseudo-spoofing 2 attacks, while maintaining load balance in the network Furthermore, we argue that nothing must affect the submission process: peers must not be able to affect the system if they submit wrong values, colluding peers must not be able to alter the resulting ratings and the contents of the votes must not be visible even by trust handling peers In addition, our proposed model should incur minimal messaging/computational overhead B P2P Communication Model Since we are not concerned with proposing a new communication/peer-discovery protocol, we assume throughout this paper a variant of the traditional Super-peer model as implemented in KaZaA [1] and Gnutella v6 In the latter model, each peer is either a super node (SN) or an ordinary node (ON) TCP connections are established between ON and its SN and between pairs of SNs Each SN tracks the content of its ON s Similarly, in K-redundant Super-peer networks, K-super peers work in a round robin fashion for each cluster to decrease the load on super peers [12] C Algorithm Description In this section, we present the details of our approach We assume that each peer is associated with a number of peer friends Peers can adaptively choose their friends based on some previous social experience, personal history, etc Such interpersonal relationships are more likely to coexist with the various P2P trends, owing to the heterogeneity present in these systems (eg friendship web-based applications: FaceBook [13] and Friendster [14]) In this paper, friendship connotes a relationship between two entities that share mutual knowledge and trust (eg web of trust of PGP [15]) As depicted in Figure 1, upon reception of v s request for download, peer u issues a reply confirming his possession of the requested resource In addition, one of the superpeers 1 Whitewashing describes the act in which malicious peers rejoin the network using a new ID to clean their previous bad record 2 Pseudo-spoofing refer to the creation of multiple IDs on different hosts by the same malicious user as a mean to affect the reputation building process Fig 1 Protocol Specification of u responds to v with the global rating of u The latter metric refers to the accumulation of all the peers opinions about u The superpeers of u securely compute, aggregate and communicate its global rating (Section IV) Algorithm 1: Distributed Reputation Building 1 Suppose peer u is requesting for a resource r u first sends its request query in the network 2 u awaits for peer replies Suppose V is the finite set of all peers possessing r 3 u receives V s various global ratings (Section IV-A) 4 for each replier v in V do: 5 u fetches Personal History P v with v from local database, 6 u fetches friends opinions F v about v from local database, 7 u locally computes v s aggregate rating by combining v s global rating with P v and F v (Section III-D) 8 end 9 u picks offerer v r that has a high reputation metric 1 u downloads r from v r 11 u updates its interaction history with v r and save it locally 12 u sends its rating for the last interaction with v r to be processed by the super peers of v r 13 u updates its friends with its new opinion about v r After receiving the various providers replies, peer v calculates its own perception of the replying peers reputations based on their global rating, the advertised opinion of v s friends about them and v s interaction history with them (Section III-D) We refer to this perception as the aggregate rating of peer v for peer u Once v computes the aggregate ratings of the offerers, it chooses a suitable peer to interact with Then, peer v issues an encrypted rating of the interaction it had with peer u Upon reception of the vote, the global trust value of u is securely updated by u superpeers Finally, v updates its friends with its aggregate rating for u A summary of these various steps in shown in Algorithm 1 D Ratings Aggregation In our model, a peer s trustworthiness is defined by an evaluation of its behavior towards other peers in the network We identify three factors for such an evaluation: the feedback a peer obtains from its friends, the global rating of the offerer, reflecting the feedback from all the peers in the system and the personal interaction history with the offerer 2
3 The aggregate rating of peer u is particular to every peer as it combines both global and local metrics Upon completion of every interaction, v s friends update v with their latest feedback, which will be stored locally in v for later use This allows for on-the-fly computation of the value of aggregate rating, without the use of expensive polling protocols The resulting trust metric is computed by means of weighted averaging, as follows: R vu = w Gvu G u + w F v F vu + w P vu P vu -R vu : the aggregate metric for peer u as seen by peer v -w Gvu : the weight assigned by v for the aggregation of the global reputation of u -G u : the global reputation of u in the system, advertised and manipulated by u s superpeers (Section IV-A) -w F v : the weight assigned by v for the aggregation of v s friends opinions about u -F vu refers to v s aggregate friends opinions about u F vu is computed using simple averaging of the friends opinions F vu excludes the opinions of suspicious friends by taking a fault tolerant average That is, a subset of friends opinions is chosen that do not differ from one another by more than a specified amount, and F vu could be calculated using only these opinions -w P vu : the weight assigned by v for the aggregation of the personal history of peer v with peer u -P vu refers to the personal history of peer v with u It denotes the ratio of the number of authentic interactions to the total number of interactions between v and u Note that all weights w Gvu, w F v and w P vu are local variables and thus are particular to peer v The magnitude of the resulting local reputation metric R vu reveals peer u s credibility as interpreted by peer v In case a peer recently joined the system, its local reputation would be zero This results in cold start problems since the new joining peer would gain limited exposure due to its low reputation We propose to resolve this problem by setting R vu to w P vu 5 if u did not interact 3 with any peer in the network E Selection of the Averaging Weights The choice of the local averaging weights w Gvu, w F v and w P vu is particular to every peer and thus may differ between nodes present in the network In order to cope with dynamics of P2P networks, we assume that peer v s client dynamically adjusts these weights according to peer v s view about its friends, other malicious peers, etc Nevertheless, we suggest some heuristics derived from extensive simulations for choosing the various weights: The sum of any two averaging weights should be larger than their third counterpart to ensure that any single malicious party is not able to impact peer v s decision P vu should be assigned with a significant weight (> 1 3 ) since no malicious party can affect its value 3 The number of interactions of peer u is securely provided by its Super peer(s) when peer v queries u s global reputation (refer to Section IV) After extensive simulations, we identified the triplet (w Gvu,w F v,w P vu ) = (2,35,45) to best cope with the multitude of malicious strategies studied in Section V F Incentives for Honest Peers Nowadays, most P2P systems provide various incentive mechanisms in order to encourage peers to actively participate in P2P file sharing networks These existing schemes are in some sense orthogonal to reputation-based systems; as peers accumulate higher reputation metrics, they are likely to serve more requests for download Therefore, highly reputable peers are more likely to experience additional privileges (eg: increased download bandwidth) IV SECURE RATINGS AGGREGATION In this section, we describe a framework that ensures the anonymity, integrity, soundness and fairness of the ratings aggregation process A Securing the aggregation of Global Ratings We propose the following approach in order to secure global ratings aggregation (see [16] for more details) Our protocol makes use of two essential cryptographic tools: i) homomorphic encryption functions, and ii) a (t, n) threshold secret sharing scheme to protect against malicious aggregators submitting erroneous decryptions When a peer v joins the network, a trusted certificate authority assigns a random set of the Super peers pertaining to its cluster to be the n aggregators for v These will be responsible for decrypting the aggregated trust value of v that remains encrypted in the system This group has an associated public key P K va, which is used by other peers u to rate their interactions with v and submit their encrypted reports into the system The corresponding decryption key SK va is shared amongst the aggregators using the threshold cryptosystem In addition, the CA assigns a storage repository for each cluster chosen from the most reputable and trusted Super peers When a peer u has interacted with peer v, it issues a report indicating the global rating of this interaction Here, we assume that u has acquired the public key P K va through a previous reply received from v Given the public key, u constructs the following message m: m = Ev A (V alue) T i, u, v, Sig v (T i, u, v) T imestamp, where Ev A (V alue) is the vote submitted by u encrypted with the public key of v s aggregators and T i, u, v, Sig v (T i, u, v) is a proof of interaction between u and v Then it transmits message m (along with its digital signature) and its public key/certificate pairs Upon receiving the trust report for v, the aggregators update v s reputation using the homomorphic property, and submit the aggregation result back to the storage Super peer in order to guarantee the durability of the ratings in the system In turn, the storage Super peer only stores the encrypted value that was advertised by the majority of the aggregators The invariant that is maintained at any moment is that the current aggregate value resides 3
4 EigenTrust [1] No Reputation Model (a) Individual Malicious peers effect in an Eigen- Trust ([9]) small-network example (1 peers) (d) Effect of Malicious Colluding Peers (b) Individual Malicious peers effect in a realistic network scenario (1 peers) Percentage of Malicious Friends (%) (e) Effect of Malicious Friends Total Number of Messages Fraction of Authentic Resource per Malicious Peer 45 x (c) Changing Malicious Strategy) Pure P2P Networks SupRep [6] Hybrid Reputation Model 8 friends per peer Hybrid Reputation Model 3 friends per peer Number of Requests x 1 4 (f) Messaging Overhead in our hybrid model Fig 2 Experimental Results of our Hybrid Model Confidence intervals were omitted from the figures due to their negligible size encrypted in the system Furthermore, only eligible peers with authentic proof of interaction < T i, u, v, Sig v (T i, u, v) > are able to submit their ratings B Securing the Friends Interactions Since our protocol relies on existing trust relationships amongst friends, securing the friends interactions in our system reduces to guaranteeing the confidentiality and authenticity of the various advertised reports For that purpose, we require that peer friends exchange symmetric keys, to be used for encrypting prospective reports We argue that this scheme does not affect the soundness of the overall system since any vote can be later denied by both friend parties (symmetric encryption lacks the non-repudiation property) V EXPERIMENTAL RESULTS We have implemented our approach using JADE solution [17] as the main infrastructure for exchanging messages between peers Our experiments aimed at analyzing three main performance metrics; namely, the effect of malicious peers, messaging costs and load balancing properties of the system Table I depicts our implementation setup A Effect of Malicious Peers 1) Individual Malicious attacks: In this scenario, malicious peers always provide high ratings for other malicious peers and low ratings for honest peers Figures 2(a) and 2(b) illustrate our results Our model performs well even if the majority of the peers in the network are malicious, when compared TABLE I SIMULATION SETUP Time to live for query messages 5 Total Number of Peers 1 Average number of files per Peer 8 File Replication Factor 245 Average # of friends per Peer (Min =, Max = 2) 1 Prob that a good peer returns inauthentic resource 2 Prob of a malicious peer returning authentic resource 3 Number of popular files attacked 4 Number of requests to attacked files 1 Number of Attack Rounds 4 # of experiments over which results are averaged 6 Malicious Collectives Size 5-2 Peers Number of Malicious Collectives 4 (w Gvu,w F v, w P vu ) (2, 35, 45) to the EigenTrust approach [9] In fact, malicious peers can not significantly affect peers relative aggregate ratings as perceived by other honest peers and their acquaintances in the network Note that our model is expected to even perform better as the network stabilizes (ie: all peers/friends have interacted with other peers), nevertheless, Figure 2(a) (1 peers, and 5 total requests) suggests that our approach is very robust even at the first stages of trust establishment 2) Changing Malicious Strategies: Here, we simulate a more challenging scenario where malicious peers respond up to f% with authentic content (refer to [9] for a similar scenario) In this manner, they attempt to increase their ratings by providing authentic downloads to some peers, while offering malicious content to other peers The simulation results for this scenario, featuring 2 % malicious peers in the network, are illustrated in Figure 2(c) Our results show that our approach 4
5 Total Downloads from peers Peer ID Fig 3 Peer Load Share in the Hybrid Reputation model We show the number of uploads per honest peer corresponding to 1 requests limits the number of authentic downloads to 87 % when malicious peers behave randomly (ie: f = 5 %), resulting in 16% improvement over EigenTrust [9] 3) Colluding Malicious Peers: This scenario comprised of three stages In the first stage, all peers interact normally, requesting for random files In the second stage, a resource r becomes very popular and malicious peers post a bad version of r, form a collective in order to attack all the offerers of r, while in the same time, increasing the reputation of the malicious peer responsible for the file The third and final stage of the model consists of a large number of requests for the popular file in question, by random peers As shown in Figure 2(d), honest peer s reputations are not affected by the colluding malicious peers, since the aggregate trust metric depends, to a large extent, on reliable parameters that are not vulnerable to malicious rumors 4) Effect of Malicious Friends: We simulate a scenario in which up to m % suspicious friends submit spurious opinions to promote the reputation of other malicious peers present in the network At all times, these malicious friends provide authentic content for the various requestors in order to maintain a high credibility metric in the P2P network Figure 2(e) shows that these deceiving opinions have limited impact on the total percentage of authentic downloads even when up to 4 % of the peer friends provide inauthentic opinions The use of the fault tolerant approach alleviates this attack by only using those friends opinions that do not differ from one another by some specified amount As the percentage of malicious friends increase beyond 5 %, the performance of the system significantly degrades We argue, however, that this is not likely to occur in reality since friendships often emerge from pre-existing interpersonal relationships B Messaging Costs In order to evaluate the messaging overhead of our model, we have evaluated the performance of our hybrid reputation model in a 7-redundant Super peer network, featuring 5 aggregators per cluster As shown in Figure 2(f), our scheme achieves much lower overhead when compared to other proposed protocols such as [4], [5] and [9] In fact, these protocols exhibit high stress in the network, since they require the requestor peer to poll all other peers C Load Balancing In our hybrid model, every peer shares a unique and particular aggregate rating with respect to other participants as the reputation value includes peer-local metrics This leads to the safeguarding of the load balancing properties initially pledged by the P2P model, when compared to other proposed schemes As seen from Figure 3, our scheme results in a relatively balanced load distribution across network peers VI CONCLUSION In this paper, we have presented a novel hybrid mechanism handling reputation in a Super Peer-based P2P network Our model is based on social theory implications for evaluating the credibility of anonymous members, where personal and friends experience is highly valued when compared to the rumors spread in the community This combination of local and global metrics reduces the effect of omnipresent rumors spread by dishonest peers We have also presented a framework that secures the process of ratings aggregation and calculation Our simulation results demonstrate that our approach severely limits inauthentic file downloads, when subject to individual/colluding malicious peers and features low messaging overhead and increased load balance when compared to other reputation management models REFERENCES [1] KaZaA: Available from [2] The Gnutella Protocol Specifications v4 Available from [3] S Marti and H Garcia-Molina, Taxonomy of trust: Categorizing P2P Reputation Systems, In Computer Networks, 26 [4] FCornelli, E Damiani, SDC di Vimercati, S Paraboschi, and P Samarati, Choosing Reputable Servents in a P2P Network, In Proceedings of WWW, 22 [5] S Chhabra, E Damiani, S De Capitani di Vimercati, S Paraboschi and P Samarati, A Protocol for Reputation Management in Super-Peer Networks, In Proceedings of DEXA, 24 [6] L Mekouar, Y Iraqi and R Boutaba, Peer to Peer s most wanted: Malicious Peers, In The International Journal of Computer and Telecommunications Networking archive Volume 5, Issue 4, (March 26) [7] B Yu, M P Singh, and K Sycara, Developing Trust in Large-Scale Peer-to-Peer Systems, In Proceedings of MAS&S, 24 [8] L Xiong, L Liu, PeerTrust: Supporting Reputation-Based Trust for Peer-to-Peer Electronic Communities, In IEEE Transactions on Knowledge and Data Engineering, 24 [9] SD Kamvar, M T Schlosser, and H Garcia-Molina, The EigenTrust Algorithm for Reputation Management in P2P Networks, In Proceedings of WWW, 23 [1] M Haque, S Ahamed, An Omnipresent Formal Trust Model for Pervasive Computing Environment, In COMPSAC, 27 [11] B Yu and M P Singh, Detecting deception in reputation management, In Proceedings of AAMAS, 23 [12] B Yang and H Garcia Molina, Designing a Super-Peer Network, In Proccedings of the ICDE, 23 [13] FaceBook: [14] Friendster: [15] PGP: wwwpgporg [16] T Dimitriou, G Karame and I Christou, SuperTrust: A Secure and Efficient Framework for Handling Trust in Super Peer Networks, To Appear In Proceedings of ICDCN, 27 [17] Jade: Java Agent DEvelopment Framework, Available from 5
A Reputation Management System in Structured Peer-to-Peer Networks
A Reputation Management System in Structured Peer-to-Peer Networks So Young Lee, O-Hoon Kwon, Jong Kim and Sung Je Hong Dept. of Computer Science & Engineering, Pohang University of Science and Technology
A Reputation Management and Selection Advisor Schemes for Peer-to-Peer Systems
A Reputation Management and Selection Advisor Schemes for Peer-to-Peer Systems Loubna Mekouar, Youssef Iraqi, and Raouf Boutaba University of Waterloo, Waterloo, Canada {lmekouar, iraqi, rboutaba}@bbcr.uwaterloo.ca
A reputation-based trust management in peer-to-peer network systems
A reputation-based trust management in peer-to-peer network systems Natalia Stakhanova, Sergio Ferrero, Johnny Wong, Ying Cai Department of Computer Science Iowa State University Ames, Iowa 50011 USA {
Super-Agent Based Reputation Management with a Practical Reward Mechanism in Decentralized Systems
Super-Agent Based Reputation Management with a Practical Reward Mechanism in Decentralized Systems Yao Wang, Jie Zhang, and Julita Vassileva Department of Computer Science, University of Saskatchewan,
Decoupling Service and Feedback Trust in a Peer-to-Peer Reputation System
Decoupling Service and Feedback Trust in a Peer-to-Peer Reputation System Gayatri Swamynathan, Ben Y. Zhao and Kevin C. Almeroth Department of Computer Science, UC Santa Barbara {gayatri, ravenben, almeroth}@cs.ucsb.edu
Simulating a File-Sharing P2P Network
Simulating a File-Sharing P2P Network Mario T. Schlosser, Tyson E. Condie, and Sepandar D. Kamvar Department of Computer Science Stanford University, Stanford, CA 94305, USA Abstract. Assessing the performance
R-Chain: A Self-Maintained Reputation Management System in P2P Networks
R-Chain: A Self-Maintained Reputation Management System in P2P Networks Lintao Liu, Shu Zhang, Kyung Dong Ryu, Partha Dasgupta Dept. of Computer Science & Engineering Arizona State University Tempe, AZ
A Reputation-Based Trust Management System for P2P Networks
A Reputation-Based Trust Management System for P2P Networks Ali Aydın Selçuk Ersin Uzun Mark Reşat Pariente Department of Computer Engineering Bilkent University Ankara, 68, Turkey E-mail: [email protected],
Dynamic Reputation Based Trust Management Using Neural Network Approach
www.ijcsi.org 161 Dynamic Reputation Based Trust Management Using Neural Network Approach Reza Azmi 1 Mahdieh Hakimi 2, and Zahra Bahmani 3 1 College of Engineering, Alzahra University 2 College of Engineering,
A Fuzzy Approach for Reputation Management using Voting Scheme in Bittorrent P2P Network
A Fuzzy Approach for Reputation Management using Voting Scheme in Bittorrent P2P Network Ansuman Mahapatra, Nachiketa Tarasia School of Computer Engineering KIIT University, Bhubaneswar, Orissa, India
Costs and Benefits of Reputation Management Systems
Costs and Benefits of Reputation Management Systems Roberto G. Cascella University of Trento Dipartimento di Ingegneria e Scienza dell Informazione Via Sommarive 14, I-381 Povo (TN), Italy [email protected]
Hedaquin: A reputation-based health data quality indicator
STM 2007 Hedaquin: A reputation-based health data quality indicator Ton van Deursen a,b, Paul Koster a, Milan Petković a a Philips Research Eindhoven, The Netherlands b Université du Luxembourg, Luxembourg
An Effective Risk Avoidance Scheme for the EigenTrust Reputation Management System
An Effective Risk Avoidance Scheme for the EigenTrust Reputation Management System Takuya Nishikawa and Satoshi Fujita Department of Information Engineering, Hiroshima University Kagamiyama 1-4-1, Higashi-Hiroshima,
Trust and Reputation Management in Distributed Systems
Trust and Reputation Management in Distributed Systems Máster en Investigación en Informática Facultad de Informática Universidad Complutense de Madrid Félix Gómez Mármol, Alemania ([email protected])
Trust and Reputation Management
Trust and Reputation Management Omer Rana School of Computer Science and Welsh escience Centre, Cardiff University, UK Omer Rana (CS, Cardiff, UK) CM0356/CMT606 1 / 28 Outline 1 Context Defining Trust
Trust and reputation in file-sharing Peer-to-Peer systems
TDDC03 Projects, Spring 2004 Trust and reputation in file-sharing Peer-to-Peer systems Peng Mu, Xianying Cheng Supervisor: Claudiu Duma Trust and reputation in file-sharing Peer-to-Peer systems Peng Mu,
Peer-to-peer Cooperative Backup System
Peer-to-peer Cooperative Backup System Sameh Elnikety Mark Lillibridge Mike Burrows Rice University Compaq SRC Microsoft Research Abstract This paper presents the design and implementation of a novel backup
Reputation Management in P2P Networks: The EigenTrust Algorithm
Reputation Management in P2P Networks: The EigenTrust Algorithm by Adrian Alexa supervised by Anja Theobald 1 Introduction Peer-to-Peer networks is a fast developing branch of Computer Science and many
ONLINE REPUTATION SYSTEMS
ONLINE REPUTATION SYSTEMS YUYE WANG 1 CPSC 557: Sensitive Information in a Wired World Professor: Joan Feigenbaum Date: 12 Nov, 2013 Identity Reput ation Trust 2 TRUST SYSTEM Trust system, guide people
RESEARCH ISSUES IN PEER-TO-PEER DATA MANAGEMENT
RESEARCH ISSUES IN PEER-TO-PEER DATA MANAGEMENT Bilkent University 1 OUTLINE P2P computing systems Representative P2P systems P2P data management Incentive mechanisms Concluding remarks Bilkent University
Implementation of P2P Reputation Management Using Distributed Identities and Decentralized Recommendation Chains
Implementation of P2P Reputation Management Using Distributed Identities and Decentralized Recommendation Chains P.Satheesh Associate professor Dept of Computer Science and Engineering MVGR college of
SIP Service Providers and The Spam Problem
SIP Service Providers and The Spam Problem Y. Rebahi, D. Sisalem Fraunhofer Institut Fokus Kaiserin-Augusta-Allee 1 10589 Berlin, Germany {rebahi, sisalem}@fokus.fraunhofer.de Abstract The Session Initiation
Enabling Public Auditing for Secured Data Storage in Cloud Computing
IOSR Journal of Engineering (IOSRJEN) e-issn: 2250-3021, p-issn: 2278-8719 Vol. 3, Issue 5 (May. 2013), V3 PP 01-05 Enabling Public Auditing for Secured Data Storage in Cloud Computing 1 Er.Amandeep Kaur,
Evaluation of different Open Source Identity management Systems
Evaluation of different Open Source Identity management Systems Ghasan Bhatti, Syed Yasir Imtiaz Linkoping s universitetet, Sweden [ghabh683, syeim642]@student.liu.se 1. Abstract Identity management systems
Prediction of DDoS Attack Scheme
Chapter 5 Prediction of DDoS Attack Scheme Distributed denial of service attack can be launched by malicious nodes participating in the attack, exploit the lack of entry point in a wireless network, and
PEER TO PEER FILE SHARING USING NETWORK CODING
PEER TO PEER FILE SHARING USING NETWORK CODING Ajay Choudhary 1, Nilesh Akhade 2, Aditya Narke 3, Ajit Deshmane 4 Department of Computer Engineering, University of Pune Imperial College of Engineering
Peer to peer networks: sharing between peers. Trond Aspelund
Peer to peer networks: sharing between peers Trond Aspelund Abstract In this literature survey we look at peer-to-peer networks. We first see how peer-to-peer networks distinguish themselves from the client/server
A NOVEL APPROACH FOR MULTI-KEYWORD SEARCH WITH ANONYMOUS ID ASSIGNMENT OVER ENCRYPTED CLOUD DATA
A NOVEL APPROACH FOR MULTI-KEYWORD SEARCH WITH ANONYMOUS ID ASSIGNMENT OVER ENCRYPTED CLOUD DATA U.Pandi Priya 1, R.Padma Priya 2 1 Research Scholar, Department of Computer Science and Information Technology,
Securing MANET Using Diffie Hellman Digital Signature Scheme
Securing MANET Using Diffie Hellman Digital Signature Scheme Karamvir Singh 1, Harmanjot Singh 2 1 Research Scholar, ECE Department, Punjabi University, Patiala, Punjab, India 1 [email protected] 2
Comments on "public integrity auditing for dynamic data sharing with multi-user modification"
University of Wollongong Research Online Faculty of Engineering and Information Sciences - Papers Faculty of Engineering and Information Sciences 2016 Comments on "public integrity auditing for dynamic
Trust based Peer-to-Peer System for Secure Data Transmission ABSTRACT:
Trust based Peer-to-Peer System for Secure Data Transmission ABSTRACT: Open nature of peer-to-peer systems exposes them to malicious activity. Building trust relationships among peers can mitigate attacks
International Journal of Scientific & Engineering Research, Volume 4, Issue 11, November-2013 349 ISSN 2229-5518
International Journal of Scientific & Engineering Research, Volume 4, Issue 11, November-2013 349 Load Balancing Heterogeneous Request in DHT-based P2P Systems Mrs. Yogita A. Dalvi Dr. R. Shankar Mr. Atesh
HLA BASED PUBLIC AUDITING ARCHITECTURE TO FIND MALICIOUS NODE IN AD HOC NETWORK - A REVIEW
HLA BASED PUBLIC AUDITING ARCHITECTURE TO FIND MALICIOUS NODE IN AD HOC NETWORK - A REVIEW Aejaz Ahmed 1, H C Sateesh Kumar 2 1 M.Tech student, Department of Telecommunication Engineering, DSCE, [email protected]
A Secure Online Reputation Defense System from Unfair Ratings using Anomaly Detections
A Secure Online Reputation Defense System from Unfair Ratings using Anomaly Detections Asha baby PG Scholar,Department of CSE A. Kumaresan Professor, Department of CSE K. Vijayakumar Professor, Department
Reputation Management Framework and its use as Currency in Large-Scale Peer-to-Peer Networks
1 Reputation Management Framework and its use as Currency in Large-Scale Peer-to-Peer Networks Rohit Gupta and Arun K. Somani Dependable Computing and Networking Laboratory Department of Electrical and
Secure cloud access system using JAR ABSTRACT:
Secure cloud access system using JAR ABSTRACT: Cloud computing enables highly scalable services to be easily consumed over the Internet on an as-needed basis. A major feature of the cloud services is that
Mitigation of Random Query String DoS via Gossip
Mitigation of Random Query String DoS via Gossip Stefano Ferretti, Vittorio Ghini Department of Computer Science, University of Bologna Bologna, Italy {sferrett, ghini}@cs.unibo.it arxiv:9.v2 [cs.cr] 2
A Secure & Efficient Data Integrity Model to establish trust in cloud computing using TPA
A Secure & Efficient Data Integrity Model to establish trust in cloud computing using TPA Mr.Mahesh S.Giri Department of Computer Science & Engineering Technocrats Institute of Technology Bhopal, India
CHAPTER 8 CONCLUSION AND FUTURE ENHANCEMENTS
137 CHAPTER 8 CONCLUSION AND FUTURE ENHANCEMENTS 8.1 CONCLUSION In this thesis, efficient schemes have been designed and analyzed to control congestion and distribute the load in the routing process of
An Optimization Model of Load Balancing in P2P SIP Architecture
An Optimization Model of Load Balancing in P2P SIP Architecture 1 Kai Shuang, 2 Liying Chen *1, First Author, Corresponding Author Beijing University of Posts and Telecommunications, [email protected]
Optimizing Congestion in Peer-to-Peer File Sharing Based on Network Coding
International Journal of Emerging Trends in Engineering Research (IJETER), Vol. 3 No.6, Pages : 151-156 (2015) ABSTRACT Optimizing Congestion in Peer-to-Peer File Sharing Based on Network Coding E.ShyamSundhar
How To Protect Your Data From Being Hacked On Security Cloud
F-SECURE SECURITY CLOUD Purpose, function and benefits October 2015 CONTENTS F-Secure Security Cloud in brief 2 Security Cloud benefits 3 How does Security Cloud work? 4 Security Cloud metrics 4 Security
SPY AGENT BASED SECURE DATA AGGREGATION IN WSN
ISSN: 2229-6948(ONLINE) ICTACT JOURNAL ON COMMUNICATION TECHNOLOGY, DECEMBER 214, VOLUME: 5, ISSUE: 4 SPY AGENT BASED SECURE DATA AGGREGATION IN WSN T. Lathies Bhasker 1 and G. Arul Jagan 2 1 Department
Enhancing Data Security in Cloud Storage Auditing With Key Abstraction
Enhancing Data Security in Cloud Storage Auditing With Key Abstraction 1 Priyadharshni.A, 2 Geo Jenefer.G 1 Master of engineering in computer science, Ponjesly College of Engineering 2 Assistant Professor,
Counteracting free riding in Peer-to-Peer networks q
Available online at www.sciencedirect.com Computer Networks 52 (2008) 675 694 www.elsevier.com/locate/comnet Counteracting free riding in Peer-to-Peer networks q Murat Karakaya *, _ Ibrahim Körpeoğlu,
How To Ensure Correctness Of Data In The Cloud
A MECHANICS FOR ASSURING DATA STORAGE SECURITY IN CLOUD COMPUTING 1, 2 Pratibha Gangwar, 3 Mamta Gadoria 1 M. Tech. Scholar, Jayoti Vidyapeeth Women s University, Jaipur, [email protected] 2 M. Tech.
Multicast vs. P2P for content distribution
Multicast vs. P2P for content distribution Abstract Many different service architectures, ranging from centralized client-server to fully distributed are available in today s world for Content Distribution
Wireless Sensor Networks Chapter 14: Security in WSNs
Wireless Sensor Networks Chapter 14: Security in WSNs António Grilo Courtesy: see reading list Goals of this chapter To give an understanding of the security vulnerabilities of Wireless Sensor Networks
Decentralized Peer-to-Peer Network Architecture: Gnutella and Freenet
Decentralized Peer-to-Peer Network Architecture: Gnutella and Freenet AUTHOR: Jem E. Berkes [email protected] University of Manitoba Winnipeg, Manitoba Canada April 9, 2003 Introduction Although
A Survey of Attack and Defense Techniques for Reputation Systems
A Survey of Attack and Defense Techniques for Reputation Systems KEVIN HOFFMAN Purdue University DAVID ZAGE Purdue University CRISTINA NITA-ROTARU Purdue University Reputation systems provide mechanisms
LOAD BALANCING WITH PARTIAL KNOWLEDGE OF SYSTEM
LOAD BALANCING WITH PARTIAL KNOWLEDGE OF SYSTEM IN PEER TO PEER NETWORKS R. Vijayalakshmi and S. Muthu Kumarasamy Dept. of Computer Science & Engineering, S.A. Engineering College Anna University, Chennai,
Reputation Management Framework and its use as Currency in Large-Scale Peer-to-Peer Networks
1 Reputation Management Framework and its use as Currency in Large-Scale Peer-to-Peer Networks Rohit Gupta and Arun K. Somani Dependable Computing and Networking Laboratory Department of Electrical and
The Role and uses of Peer-to-Peer in file-sharing. Computer Communication & Distributed Systems EDA 390
The Role and uses of Peer-to-Peer in file-sharing Computer Communication & Distributed Systems EDA 390 Jenny Bengtsson Prarthanaa Khokar [email protected] [email protected] Gothenburg, May
PEER-TO-PEER NETWORK
PEER-TO-PEER NETWORK February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without
Secure Large-Scale Bingo
Secure Large-Scale Bingo Antoni Martínez-Ballesté, Francesc Sebé and Josep Domingo-Ferrer Universitat Rovira i Virgili, Dept. of Computer Engineering and Maths, Av. Països Catalans 26, E-43007 Tarragona,
Security Considerations for Intrinsic Monitoring within IPv6 Networks: Work in Progress
Security Considerations for Intrinsic Monitoring within IPv6 Networks: Work in Progress Alan Davy and Lei Shi Telecommunication Software&Systems Group, Waterford Institute of Technology, Ireland adavy,[email protected]
MANAGED FILE TRANSFER: 10 STEPS TO SOX COMPLIANCE
WHITE PAPER MANAGED FILE TRANSFER: 10 STEPS TO SOX COMPLIANCE 1. OVERVIEW Do you want to design a file transfer process that is secure? Or one that is compliant? Of course, the answer is both. But it s
Peer-to-Peer Systems: "A Shared Social Network"
Peer-to-Peer Systems: "A Shared Social Network" Nguyen Hoang Anh Helsinki University of Technology [email protected] Abstract In the last few years, the success of the Napster online music sharing program
A Secure Decentralized Access Control Scheme for Data stored in Clouds
A Secure Decentralized Access Control Scheme for Data stored in Clouds Priyanka Palekar 1, Abhijeet Bharate 2, Nisar Anjum 3 1 SKNSITS, University of Pune 2 SKNSITS, University of Pune 3 SKNSITS, University
INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY
INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY A PATH FOR HORIZING YOUR INNOVATIVE WORK AN OVERVIEW OF MOBILE ADHOC NETWORK: INTRUSION DETECTION, TYPES OF ATTACKS AND
Secure Role-Based Access Control on Encrypted Data in Cloud Storage using Raspberry PI
Volume: 2, Issue: 7, 20-27 July 2015 www.allsubjectjournal.com e-issn: 2349-4182 p-issn: 2349-5979 Impact Factor: 3.762 Miss Rohini Vidhate Savitribai Phule Pune University. Mr. V. D. Shinde Savitribai
An Efficient Hybrid Data Gathering Scheme in Wireless Sensor Networks
An Efficient Hybrid Data Gathering Scheme in Wireless Sensor Networks Ayon Chakraborty 1, Swarup Kumar Mitra 2, and M.K. Naskar 3 1 Department of CSE, Jadavpur University, Kolkata, India 2 Department of
Associate Prof. Dr. Victor Onomza Waziri
BIG DATA ANALYTICS AND DATA SECURITY IN THE CLOUD VIA FULLY HOMOMORPHIC ENCRYPTION Associate Prof. Dr. Victor Onomza Waziri Department of Cyber Security Science, School of ICT, Federal University of Technology,
MANAGED FILE TRANSFER: 10 STEPS TO PCI DSS COMPLIANCE
WHITE PAPER MANAGED FILE TRANSFER: 10 STEPS TO PCI DSS COMPLIANCE 1. OVERVIEW Do you want to design a file transfer process that is secure? Or one that is compliant? Of course, the answer is both. But
SuperViz: An Interactive Visualization of Super-Peer P2P Network
SuperViz: An Interactive Visualization of Super-Peer P2P Network Anthony (Peiqun) Yu [email protected] Abstract: The Efficient Clustered Super-Peer P2P network is a novel P2P architecture, which overcomes
