The Effect of Behavior Change on Honesty Checking in Peer-to-Peer Systems

被引:0
|
作者
Azzedin, Farag [1 ]
Ridha, Ahmad [2 ]
机构
[1] King Fahd Univ Petr & Minerals, Dept Informat & Comp Sci, Dhahran 31261, Saudi Arabia
[2] Bogor Agr Univ, Comp Sci Dept, Bogor 16680, Indonesia
来源
SIXTH ANNUAL CONFERENCE ON PRIVACY, SECURITY AND TRUST, PROCEEDINGS | 2008年
关键词
Recommender filtering; Reputation systems; Peer-to-peer systems;
D O I
10.1109/PST.2008.34
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Reputation systems aim to reduce the risk of loss due to untrustworthy peers. This loss is aggravated by dishonest recommenders trying to pollute the recommendation network. The objective of an honesty checking mechanism is to detect dishonest recommenders. Existing honesty checking mechanisms assume that contradicting recommendations are due it) the dishonesty of the recommenders. However; such difference may be also due to the behavior change of the target peer. This paper shows the effect of such behavior change on the performance of existing honesty checking mechanisms. To the best of our knowledge, this is the first attempt at linking the behavior change to honesty checking.
引用
收藏
页码:145 / +
页数:3
相关论文
共 50 条
  • [31] Efficient, self-contained handling of identity in peer-to-peer systems
    Aberer, K
    Datta, A
    Hauswirth, M
    IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2004, 16 (07) : 858 - 869
  • [32] Gen Trust: A genetic trust management model for peer-to-peer systems
    Tahta, Ugur Eray
    Sen, Sevil
    Can, Ahmet Burak
    APPLIED SOFT COMPUTING, 2015, 34 : 693 - 704
  • [33] SOLUTIONS FOR ENABLING COMMUNICATION BETWEEN DIFFERENT PROPRIETARY PEER-TO-PEER SYSTEMS
    Pi, Renjie
    Tong, Junjie
    Xu, Ke
    ICEIS 2011: PROCEEDINGS OF THE 13TH INTERNATIONAL CONFERENCE ON ENTERPRISE INFORMATION SYSTEMS, VOL 1, 2011, : 580 - 585
  • [34] A contribution-based service differentiation scheme for peer-to-peer systems
    Mekouar, Loubna
    Iraqi, Youssef
    Boutaba, Raouf
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2009, 2 (02) : 146 - 163
  • [35] DynaPeer: A dynamic peer-to-peer based delivery scheme for VoD systems
    Souza, Leandro
    Cores, Fernando
    Yang, Xiaoyuan
    Ripoll, Ana
    EURO-PAR 2007 PARALLEL PROCESSING, PROCEEDINGS, 2007, 4641 : 769 - +
  • [36] Byzantine fault tolerant public key authentication in peer-to-peer systems
    Pathak, V
    Iftode, L
    COMPUTER NETWORKS, 2006, 50 (04) : 579 - 596
  • [37] PPAA: peer-to-peer anonymous authentication
    Tsang, Patrick P.
    Smith, Sean W.
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, PROCEEDINGS, 2008, 5037 : 55 - 74
  • [38] Peer-to-peer aggregation techniques dissected
    Ogston, Elth
    Jarvis, Stephen A.
    INTERNATIONAL JOURNAL OF PARALLEL EMERGENT AND DISTRIBUTED SYSTEMS, 2010, 25 (01) : 51 - 71
  • [39] Analyzing the Impact of Churn and Malicious Behavior on the Quality of Peer-to-Peer Web Search
    Atalla, Fabiano
    Miranda, Daniel
    Almeida, Jussara
    Goncalves, Marcos Andre
    Almeida, Virgilio
    APPLIED COMPUTING 2008, VOLS 1-3, 2008, : 1137 - 1144
  • [40] New scheduling policies for multiclass queueing networks: Applications to peer-to-peer systems
    Paschalidis, IC
    Su, C
    Caramanis, MC
    42ND IEEE CONFERENCE ON DECISION AND CONTROL, VOLS 1-6, PROCEEDINGS, 2003, : 1604 - 1609