Trustworthiness of acquaintances in peer-to-peer overlay networks

被引:3
作者
Watanabe, Kenichi [1 ]
Enokido, Tomoya [2 ]
Takizawa, Makoto [3 ]
机构
[1] Department of Computers and Systems Engineering, Tokyo Denki University, Hiki-gun, Saitama 350-0394, Ishizaka, Hatoyama
[2] Faculty of Business Administration, Rissho University, Shinagawa-ku, Tokyo 141-8602
[3] Department of Computers and Information Science, Faculty of Science and Technology, Seikei University, Musashino-shi, Tokyo 180-8633
关键词
Access control; Acquaintance; Charge-based flooding algorithm; Peer-to-peer overlay network; QoS; Quality of service; Satisfiability; Trustworthiness;
D O I
10.1504/IJHPCN.2009.027466
中图分类号
学科分类号
摘要
Various types of applications manipulate objects distributed in Peer-to-Peer overlay networks. An acquaintance peer of a peer p is a peer whose service the peer p knows and with which the peer p can directly communicate. We discuss types of acquaintance relations among peers and how much a peer trusts each acquaintance peer. We define the trustworthiness of each acquaintance peer in terms of the acquaintance relations. We discuss a Charge-Based Flooding (CBF) algorithm to find target peers so that more trustworthy areas in Peer-to-Peer overlay networks are more deeply searched. We evaluate the CBF algorithm compared with a TTL-based algorithm. Copyright © 2009, Inderscience Publishers.
引用
收藏
页码:160 / 171
页数:11
相关论文
共 50 条
  • [31] Neighbour Peer Selection Scheme Based on Effective Capacity for Mobile Peer-to-Peer Streaming
    Xia Hailun
    Wang Ning
    Zeng Zhimin
    CHINA COMMUNICATIONS, 2013, 10 (05) : 89 - 98
  • [32] Toward a Quality-of-Service Framework for Peer-to-Peer Applications
    Gupta, Ankur
    Awasthi, Lalit K.
    INTERNATIONAL JOURNAL OF DISTRIBUTED SYSTEMS AND TECHNOLOGIES, 2010, 1 (03) : 1 - 23
  • [33] An efficient peer-to-peer and distributed scheduling for cloud and grid computing
    Rho, Seungmin
    Chang, Hangbae
    Kim, Sanggeun
    Lee, Yang Sun
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2015, 8 (05) : 863 - 871
  • [34] Protecting privacy during peer-to-peer exchange of medical documents
    Jens H. Weber-Jahnke
    Christina Obry
    Information Systems Frontiers, 2012, 14 : 87 - 104
  • [35] Research of Trust Model Based on Peer-to-Peer Network Security
    Kun, Huang
    Lu, Wang
    2013 INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY AND APPLICATIONS (ITA), 2013, : 126 - 129
  • [36] An efficient peer-to-peer and distributed scheduling for cloud and grid computing
    Seungmin Rho
    Hangbae Chang
    Sanggeun Kim
    Yang Sun Lee
    Peer-to-Peer Networking and Applications, 2015, 8 : 863 - 871
  • [37] A novel behavior-based peer-to-peer trust model
    Wang, T
    Lu, XL
    Duan, HC
    GRID AND COOPERATIVE COMPUTING - GCC 2005, PROCEEDINGS, 2005, 3795 : 947 - 952
  • [38] Toward an Understanding of the Processing Delay of Peer-to-Peer Relay Nodes
    Chen, Kuan-Ta
    Lou, Jing-Kai
    2008 IEEE INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS & NETWORKS WITH FTCS & DCC, 2008, : 410 - 419
  • [39] On Resource Provisioning in Hybrid Peer-to-Peer Live Streaming Systems
    Tewari, Saurabh
    Menon, Satish
    BMSB: 2009 IEEE INTERNATIONAL SYMPOSIUM ON BROADBAND MULTIMEDIA SYSTEMS AND BROADCASTING, VOLS 1 AND 2, 2009, : 351 - 356
  • [40] Protecting privacy during peer-to-peer exchange of medical documents
    Weber-Jahnke, Jens H.
    Obry, Christina
    INFORMATION SYSTEMS FRONTIERS, 2012, 14 (01) : 87 - 104