The Eigentrust algorithm for reputation management in P2P networks

  title={The Eigentrust algorithm for reputation management in P2P networks},
  author={Sepandar D. Kamvar and Mario T. Schlosser and Hector Garcia-Molina},
  booktitle={WWW '03},
Peer-to-peer file-sharing networks are currently receiving much attention as a means of sharing and distributing information. [] Key Method We present a distributed and secure method to compute global trust values, based on Power iteration. By having peers use these global trust values to choose the peers from whom they download, the network effectively identifies malicious peers and isolates them from the network.In simulations, this reputation system, called EigenTrust, has been shown to significantly…

Figures and Tables from this paper

A Reputation-based Trust Management in Peer-to-Peer Network Systems
The model aims to help users to select the most reliable peers whose past behavior shows willingness to participate in a proper functioning of the P2P system and at the same time to anticipate possible attacks from malicious peers by limiting their access to the victim peer's resources.
A Trust Model for Identifying Malicious Behavior in P2P Networks
The main aim of the paper is to deploy a trust model for determining the trust value of peers with the notion of avoiding malicious ones, and to reduce the computation and communication overhead associated with other trust and reputation based models.
A Reputation Management Scheme for Peer-to-Peer Networks based on the EigenTrust Trust Management Algorithm
A method to evaluate the trustworthiness of each peer by explicitly taking into account the accuracy of mutual evaluations is proposed, an extension of the EigenTrust proposed by Kamvar et al.
Simulating the Human Factor in Reputation Management Systems for P2P Networks - An Agent based Model
It is shown, using agent based simulation, that reputation systems are effective only if there is a widespread cooperation by users in verifying authenticity of files during the download phase, while the size punishment derived by the reputation systems is less relevant.
A Reputation Management Scheme Improving the Trustworthiness of P2P Networks
A new reputation management scheme, called TrustRM (Trustworthy Reputation Management for resource sharing), which identifies peers who give false feedback as well as provide shared resources and peers with reliability by identifying malicious peers is proposed.
A Reputation based System to Overcome Malicious Behavior in Peer-to-Peer Networks
A reputation system that uses objective criteria to track each peer’s contribution in the system and allows peers to store their reputations locally is proposed, which will eventually root out malicious peers from the system.
HonestPeer: An enhanced EigenTrust algorithm for reputation management in P2P systems
  • H. Kurdi
  • Computer Science
    J. King Saud Univ. Comput. Inf. Sci.
  • 2015
Credibility based feedback for reputation computation in peer-to-peer file sharing network
  • Damche Dorji
  • Computer Science
    2016 13th International Joint Conference on Computer Science and Software Engineering (JCSSE)
  • 2016
The simulation results show that the proposed credibility based feedback for reputation computation (CredRep) for a distributed P2P file sharing environment can effectively detect free-riders and increase the probability of peers getting good quality resources.
Trust and Reputation Simulations in Peer-to-Peer Network
A trust and reputation algorithm called Binary String Algorithm (BSA) that will avoid malicious activity in P2P networks to a greater extent and makes users get the right file directly much more often than compared to no reputation system.


Choosing reputable servents in a P2P network
An approach to P2P security where servents can keep track, and share with others, information about the reputation of their peers is proposed, based on a distributed polling algorithm by which resource requestors can assess the reliability of perspective providers before initiating the download.
Managing trust in a peer-2-peer information system
It is expected that scalable methods for trust management are an important factor, if fully decentralized peer-to-peer systems should become the platform for more serious applications than simple file exchange.
Measurement study of peer-to-peer file sharing systems
This measurement study seeks to precisely characterize the population of end-user hosts that participate in Napster and Gnutella, and shows that there is significant heterogeneity and lack of cooperation across peers participating in these systems.
Valuation of Trust in Open Networks
A method for the valuation of trustworthiness which can be used to accept or reject an entity as being suitable for sensitive tasks is presented, an extension of the work of Yahalom, Klein and Beth.
Incentives for Combatting Freeriding on P2P Networks
This work addresses the freerider problem on P2P networks by proposing a specific participation metric, which a peer’s EigenTrust score is called, and proposes an incentive scheme that may be used in conjunction with any numerical participation metric.
Chord: A scalable peer-to-peer lookup service for internet applications
Results from theoretical analysis, simulations, and experiments show that Chord is scalable, with communication cost and the state maintained by each node scaling logarithmically with the number of Chord nodes.
The Sybil Attack
It is shown that, without a logically centralized authority, Sybil attacks are always possible except under extreme and unrealistic assumptions of resource parity and coordination among entities.
Semantic Overlay Networks
In a handful of years only, Peer-to-Peer systems have become an integral part of the Internet and are nowadays firmly established in various contexts, ranging from large-scale content distribution to Internet telephony or networking platforms.
Mapping the Gnutella Network
This work studied the topology and protocols of the public Gnutella network to evaluate costs and benefits of the peer-to-peer (P2P) approach and to investigate possible improvements that would allow better scaling and increased reliability in Gnutsella and similar networks.
Reputation systems
Systems T he Internet offers vast new opportunities to interact with total strangers. These interactions can be fun, informative, even profitable. But they also involve risk. Is the advice of a