A reputation-based approach for choosing reliable resources in peer-to-peer networks

@inproceedings{Damiani2002ARA,
  title={A reputation-based approach for choosing reliable resources in peer-to-peer networks},
  author={Ernesto Damiani and Sabrina De Capitani di Vimercati and Stefano Paraboschi and Pierangela Samarati and Fabio Violante},
  booktitle={CCS '02},
  year={2002}
}
Peer-to-peer (P2P) applications have seen an enormous success, and recently introduced P2P services have reached tens of millions of users. A feature that significantly contributes to the success of many P2P applications is user anonymity. However, anonymity opens the door to possible misuses and abuses, exploiting the P2P network as a way to spread tampered with resources, including Trojan Horses, viruses, and spam. To address this problem we propose a self-regulating system where the P2P… 

Figures from this paper

SupP 2 PRep : A Protocol for Reputation Management via Polling in P 2 P Networks with SuperPeers
TLDR
This paper extends previous work on P2PRep, a reputation management protocol for pure P2P networks, in the case of a distributed architecture with SuperPeers such as Gnutella 0.6 and KaZaA, and presents the design and implementation of reputation-aware servents and proposes the use of repeaters among SuperPeer to facilitate interaction between servents behind the firewalls.
A protocol for reputation management in super-peer networks
TLDR
This paper extends the previous work on P2PRep, a reputation management protocol for pure P2P networks, in the case of super-peer networks and presents the design and implementation of reputation-aware servants.
A Reputation based System to Overcome Malicious Behavior in Peer-to-Peer Networks
TLDR
A reputation system that uses objective criteria to track each peer’s contribution in the system and allows peers to store their reputations locally is proposed, which will eventually root out malicious peers from the system.
X2BT Trusted Reputation System: A Robust Mechanism for P2P Networks
TLDR
This paper proposes a reputation system, called X2BTRep, which is an extension of the X2Rep and for BitTorrent network and shows that the proposed system improves the security and the quality of information distributed over P2P networks.
P2P Reputation Management Using Distributed Identities and Decentralized Recommendation Chains
TLDR
A cryptographic protocol for ensuring secure and timely availability of the reputation data of a peer to other peers at extremely low costs and is coupled with self-certification and cryptographic mechanisms for identity management and countering Sybil attack.
A novel transfer protocol for reputation sharing on P2P networks
TLDR
The robustness and security of the polling protocol shows that it is resistant to several known attacks and can effectively solve the possible threat generated by the Gnutella protocol.
Detecting Reputation Variations in P 2 P Networks
TLDR
RMM provides resistance to attacks by colluding peers by continually monitoring the reputation level of each peer over a number of consecutive time periods or epochs and observes rapid changes in the reputation value of a node.
A reputation-based system model for P2P networks
TLDR
A model of P2P reputation system whose main concept is to create a separate P1P community called reputation community, which keeps the reputation data of various object types of other communities is proposed.
Managing resource and servent reputation in P2P networks
TLDR
This work proposes a remedy for this trust problem by introducing a new reputation management model that combines the unique features of applying reputations to both resources and servents, and dividing the servent reputations into contribution score and evaluation score to represent the servents' past behavior more accurately.
Reputation Management Techniques in DHT-Based Peer-to-Peer Networks
TLDR
This paper presents an analysis of applicability of some reputation evaluation techniques as protection from the malicious activity in DHT- based networks.
...
...

References

SHOWING 1-10 OF 24 REFERENCES
Choosing reputable servents in a P2P network
TLDR
An approach to P2P security where servents can keep track, and share with others, information about the reputation of their peers is proposed, based on a distributed polling algorithm by which resource requestors can assess the reliability of perspective providers before initiating the download.
Escrow services and incentives in peer-to-peer networks
TLDR
This work integrates a P2P file sharing service with an escrow service that reliably "pays" the party that is serving up the content and motivates users to serve up content of high quality and verifies that users only share legitimate content and not spam, viruses or content that is not part of the subscription.
Measurement study of peer-to-peer file sharing systems
TLDR
This measurement study seeks to precisely characterize the population of end-user hosts that participate in Napster and Gnutella, and shows that there is significant heterogeneity and lack of cooperation across peers participating in these systems.
Poblano A Distributed Trust Model for Peer-to-Peer Networks
On a decentralized network, like Peer-to-Peer (P2P), users can see from where the information arrives, as well communicate their opinions on both the information they have acquired, and the peers who
Managing trust in a peer-2-peer information system
TLDR
It is expected that scalable methods for trust management are an important factor, if fully decentralized peer-to-peer systems should become the platform for more serious applications than simple file exchange.
A Social Mechanism of Reputation Management in Electronic Communities
TLDR
This work proposes a social mechanism of reputation management, which aims at avoiding interaction with undesirable participants, and leads to a decentralized society in which agents help each other weed out undesirable players.
The Free Haven Project: Distributed Anonymous Storage Service
TLDR
A design for a system of anonymous storage which resists the attempts of powerful adversaries to find or destroy any stored data is presented, and a way to classify anonymous systems based on the kinds of anonymity provided is suggested.
The Role of Trust Management in Distributed Systems Security
TLDR
The concept of trust management is introduced, its basic principles are explained, and some existing trust-management engines are described, including PoHcyMaker and KeyNote, which allow for increased flexibility and expressibility, as well as standardization of modern, scalable security mechanisms.
The gnutella protocol specification v0.4 document revision 1.2
TLDR
Gnutella 2 is a protocol for distributed search that supports a traditional client/centralized server search paradigm, but Gnutella's distinction is its peer-to-peer, decentralized model.
The Social Cost of Cheap Pseudonyms
We consider the problems of societal norms for cooperation and reputation when it is possible to obtain cheap pseudonyms, something that is becoming quite common in a wide variety of interactions on
...
...