Developing trust in large-scale peer-to-peer systems

被引:0
作者
Yu, B [1 ]
Singh, MP [1 ]
Sycara, K [1 ]
机构
[1] Carnegie Mellon Univ, Sch Comp Sci, Pittsburgh, PA 15213 USA
来源
2004 IEEE 1ST SYMPOSIUM ON MULTI-AGENT SECURITY & SURVIVABILITY | 2004年
关键词
P2P security; reputation mechanisms; trust;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In peer-to-peer (P2P) systems, peers often must inter- act with unknown or unfamiliar peers without the benefit of trusted third parties or authorities to mediate the interactions. A peer will need reputation mechanisms to incorporate the knowledge of others to decide whether to trust another party, in P2P systems. This paper discusses the design of reputation mechanisms and proposes a novel distributed reputation mechanisms to detect malicious or unreliable peers in P2P systems. It illustrates the process for rating gathering and aggregation and presents some experimental results to evaluate the proposed approach. Moreover, it considers how to effectively aggregate noisy (dishonest or inaccurate) ratings from independent or collusive peers using weighted majority techniques. Furthermore, it analyzes some possible attacks on reputation mechanisms and shows how to defend against such attacks.
引用
收藏
页码:1 / 10
页数:10
相关论文
共 26 条
[1]  
[Anonymous], 2002, P 1 INT WORKSH PEER
[2]  
[Anonymous], 2003, P ATAPCC KARLSR BW G
[3]  
[Anonymous], 1998, Proceedings of the 7th international conference on World Wide Web (WWW), DOI [10.1016/S0169-7552(98)00110-X, DOI 10.1016/S0169-7552(98)00110-X]
[4]  
[Anonymous], P AAMAS 03
[5]   Decentralized trust management [J].
Blaze, M ;
Feigenbaum, J ;
Lacy, J .
1996 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 1996, :164-173
[6]  
CAPKUN S, 2002, P ACM WORKSH NEW SEC
[7]  
Cornelli F, 2002, P 11 INT C WORLD WID, P376, DOI DOI 10.1145/511446.511496
[8]  
Damiani E, 2002, Proceedings of the 9th ACM conference on Computer and Communications Security, P207, DOI 10.1145/586110.586138
[9]  
Ellison CM, 1996, PROCEEDINGS OF THE SIXTH ANNUAL USENIX SECURITY SYMPOSIUM: FOCUSING ON APPLICATIONS OF CRYPTOGRAPHY, P67
[10]   The social cost of cheap pseudonyms [J].
Friedman, EJ ;
Resnick, P .
JOURNAL OF ECONOMICS & MANAGEMENT STRATEGY, 2001, 10 (02) :173-199