Secure Trust Model for Peer to Peer Network
Keywords:
Peer to Peer Systems, Trust Models, Trust Relationships, Reputation, Networking, Network SecurityAbstract
The peer to peer network has open nature which leads to exposure of various malicious activities. To eradicate these malicious activities, peers can build trust relationships among them. This paper presents distributed algorithm that enable a peer to reason about trustworthiness of other peers based on past interaction and recommendation. Using this algorithm peers will have their own adjacency trust network. Two modules of trust, service and recommendation are proposed to measure trustworthiness for providing services and giving recommendation. Interactions and recommendations are computed based on importance, recentness and peer satisfaction parameter. Also, while computing recommendation, recommender’s trustworthiness and confidence will be considered.
References
F. Cornelli, E. Damiani, S .D. C. di Vimercati, S. Paraboschi, and P. Samarati,” Choosing Reputable Servents in P2P Network,” Proc. 11th World Wide Web Conf. (WWW), 2002
A.A. Selcuk, E. Uzun, and M.R. Pariente, “A Reputation-Based Trust Management System for P2P Networks, ” Proc. IEEE/ ACM Forth Int’I Symp. Cluster Computing and the Grid (CCGRID) , 2004.
J. Kleinberg, “ The Small-World Phenomenon: An Algorithmic Perspective,” Proc. 32nd ACM Symp. Theory of Computing, 2000
S. Saroiu, P. Gummadi, and S. Gribble, “A Measurement Study of Peer-to-Peer File Sharing Systems, “Proc. Multimedia Computing and Networking, 2002.
M. Ripeanu, I. Foster, and A. Lamnitchi, “Mapping The Gnutella Network: Properties of Large-scale Peer-to-Peer Systems and Implications for System Design, “IEEE Internet Computing, Vol.6,no. 1,pp. 50-57, Jan. 2002
S. Saroiu, K. Gnummadi, R. Dunn, S.D. Gribble, and H.M. Levy, “An Analysis of Internet Content Delivery System, “ Proc. Fifth USENIX Symp. Operating System Design and Implementation (OSDI), 2002.
Y. Zhong, “Formation of Dynamic Trust and Uncertain Evidence for User Authorization,” PhD thesis, Dept. of Computer Science, Purdue Univ., 2004.
D.H. McKnight, “Conceptualizing Trust: A Typology and E-Commerce Customer relationships Model,” Proc. 34th Ann. Hawaii Int’I conf. System Science (HICSS) , 2001.
C. Dellarocas, “Immunizing Online Reputation Reporting Systems Against Unfair Ratings and Discriminatory Behavior,” Proc. Second ACM Conf. Electronic Commerce (EC), 2000.
S. Xiao and I. Benbasat,” The Formation of Trust and Distrust in Recommendation agents in Repeated Interactions: A process-tracing Analysis,” Proc. Fifth ACM Conf. Electronic Commerce (EC), 2003.
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors contributing to this journal agree to publish their articles under the Creative Commons Attribution 4.0 International License, allowing third parties to share their work (copy, distribute, transmit) and to adapt it, under the condition that the authors are given credit and that in the event of reuse or distribution, the terms of this license are made clear.
