Running on Karma - P2P reputation and currency systems

被引:0
|
作者
Chow, Sherman S. M. [1 ]
机构
[1] NYU, Dept Comp Sci, Courant Inst Math Sci, New York, NY 10012 USA
来源
CRYPTOLOGY AND NETWORK SECURITY | 2007年 / 4856卷
关键词
decentralized systems; peer-to-peer; reputation; currency; micropayments; free riding; byzantine agreement;
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Peer-to-peer (P2P) systems allow users to share resources with little centralized control. Malicious users can abuse the system by contributing polluted resources. Moreover, selfish users may just connect for their own benefits without donating any resources. The concepts of reputation and currency give possible approaches to address these problems. However, to implement these ideas is non-trivial, due to the nonexistence of a single trusted party. Existing works circumvent this by placing trust assumption on certain nodes of an overlay network. This work presents a new reputation system and a new currency system. Our designs axe simple thanks to the full use of the trust assumption.
引用
收藏
页码:146 / 158
页数:13
相关论文
共 50 条
  • [1] Taxonomy of trust: Categorizing P2P reputation systems
    Marti, S
    Garcia-Molina, H
    COMPUTER NETWORKS, 2006, 50 (04) : 472 - 484
  • [2] Analytical evaluation of P2P reputation systems
    Lagesse, Brent
    INTERNATIONAL JOURNAL OF COMMUNICATION NETWORKS AND DISTRIBUTED SYSTEMS, 2012, 9 (1-2) : 82 - 96
  • [3] An independent reputation system for P2P networks
    Tayabovorn, Chaiyasit
    Maneewongvatana, Songrit
    ICEIS 2007: PROCEEDINGS OF THE NINTH INTERNATIONAL CONFERENCE ON ENTERPRISE INFORMATION SYSTEMS: SOFTWARE AGENTS AND INTERNET COMPUTING, 2007, : 249 - 252
  • [4] Credibility Based Reputation Calculation in P2P Networks
    Prasad, R. V. V. S. V.
    Srinivas, Vegi
    Kumari, V. Valli
    Raju, K. V. S. V. N.
    DISTRIBUTED COMPUTING AND INTERNET TECHNOLOGY, PROCEEDINGS, 2008, 5375 : 188 - +
  • [5] A Reputation-Based Resilient and Recoverable P2P Botnet
    Yin, Jie
    Cui, Xiang
    Li, Ke
    2017 IEEE SECOND INTERNATIONAL CONFERENCE ON DATA SCIENCE IN CYBERSPACE (DSC), 2017, : 275 - 282
  • [6] Propagation Model of Reputation in P2P Networks
    Sun, Hua
    Li, Li
    Yang, Wenzhong
    Qian, Yurong
    COMMUNICATIONS AND INFORMATION PROCESSING, PT 1, 2012, 288 : 368 - +
  • [7] Taxonomy of attacks and defense mechanisms in P2P reputation systems-Lessons for reputation system designers
    Koutrouli, Eleni
    Tsalgatidou, Aphrodite
    COMPUTER SCIENCE REVIEW, 2012, 6 (2-3) : 47 - 70
  • [8] A Power Peer-Based Reputation Scheme for Mobile P2P Systems
    Wu, Xu
    He, Jingsha
    Chang, Chia-Hu
    Xu, Fei
    ALGORITHMS AND ARCHITECTURES FOR PARALLEL PROCESSING, PROCEEDINGS, 2009, 5574 : 615 - +
  • [9] Reputation-Based Resource Allocation in P2P Systems of Rational Users
    Satsiou, Anna
    Tassiulas, Leandros
    IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2010, 21 (04) : 466 - 479
  • [10] A Reactive Approach for Detection of Collusion Attacks in P2P Trust and Reputation Systems
    Saini, Nitin Kumar
    Sihag, Vikas Kumar
    Yadav, Ramesh Chand
    SOUVENIR OF THE 2014 IEEE INTERNATIONAL ADVANCE COMPUTING CONFERENCE (IACC), 2014, : 312 - 317