X2BT trusted reputation system:: A robust mechanism for P2P networks

被引:0
作者
Yu, Lan [1 ]
Susilo, Willy [1 ]
Safavi-Naini, Rei [1 ]
机构
[1] Univ Wollongong, Sch Informat Technol & Comp Sci, Ctr Informat Secur, Wollongong, NSW 2522, Australia
来源
CRYPTOLOGY AND NETWORK SECURITY, PROCEEDINGS | 2006年 / 4301卷
关键词
P2P; reputation system; XRep; X-2; Rep; and X-2BT Rep;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Over the past few years, Peer-to-Peer (P2P) networks have grown extensively and dramatically changed large-scale file transfer. One of the most popular P2P network is the BitTorrent system. BitTorrent can efficiently distribute large files by optimizing the use of network bandwidth and providing scalability. Due to the open and anonymous nature of P2P systems BitTorrent also provides an ideal environment for distribution of malicious, low quality, or doctored information. A number of reputation systems, including P2PRep with its successors XRep and X-2 Rep, had been proposed to address security weaknesses of Gnutella P2P file sharing networks. Although it has been claimed that these methods are also applicable to the other file sharing networks, it is not clear how to achieve this task. Moreover, some of the shortcomings of these reputation systems such as online-polling only and coldstart may be exploited by malicious attackers. In this paper, we propose a reputation system, called X2BT Rep, which is an extension of the X2 Rep and for BitTorrent network. We show that the proposed system improves the security and the quality of information distributed over P2P networks.
引用
收藏
页码:364 / +
页数:3
相关论文
共 31 条
[22]   An incentive model for voting based on information-hiding in P2P networks [J].
Yang, Bo-wei ;
Song, Guang-hua ;
Zheng, Yao .
JOURNAL OF ZHEJIANG UNIVERSITY-SCIENCE C-COMPUTERS & ELECTRONICS, 2010, 11 (12) :967-975
[23]   An EigenTrust-based Hybrid Trust Model in P2P File Sharing Networks [J].
Lu, Kun ;
Wang, Junlong ;
Xie, Ling ;
Zhen, Qilong ;
Li, Mingchu .
11TH INTERNATIONAL CONFERENCE ON FUTURE NETWORKS AND COMMUNICATIONS (FNC 2016) / THE 13TH INTERNATIONAL CONFERENCE ON MOBILE SYSTEMS AND PERVASIVE COMPUTING (MOBISPC 2016) / AFFILIATED WORKSHOPS, 2016, 94 :366-371
[24]   Fighting pollution attacks in P2P streaming [J].
Tauhiduzzaman, Md. ;
Wang, Mea .
COMPUTER NETWORKS, 2015, 79 :39-52
[25]   The application of collaborative filtering for trust management in P2P communities [J].
Zuo, M ;
Wang, K ;
Li, JH .
PARALLEL AND DISTRIBUTED PROCESSING AND APPLICATIONS, 2005, 3758 :383-394
[26]   BSU: A Biased Seed Unchoking Algorithm for P2P Systems [J].
Wei, Xianglin ;
Zhang, Guomin ;
Fan, Jianhua ;
Lu, Ziyi ;
Chen, Ming ;
Li, Ran .
JOURNAL OF INTERNET TECHNOLOGY, 2014, 15 (02) :273-284
[27]   A D-S evidence theory based fuzzy trust model in file-sharing P2P networks [J].
Tian, Chunqi ;
Yang, Baijian .
PEER-TO-PEER NETWORKING AND APPLICATIONS, 2014, 7 (04) :332-345
[28]   SyMon: A practical approach to defend large structured P2P systems against Sybil Attack [J].
Jyothi B. S. ;
Dharanipragada Janakiram .
Peer-to-Peer Networking and Applications, 2011, 4 :289-308
[29]   SyMon: A practical approach to defend large structured P2P systems against Sybil Attack [J].
Jyothi, B. S. ;
Janakiram, Dharanipragada .
PEER-TO-PEER NETWORKING AND APPLICATIONS, 2011, 4 (03) :289-308
[30]   With whom should I work? Ratings consideration for partner selection in a P2P supply chain network [J].
Li, Feng ;
Du, Timon C. ;
Wei, Ying .
TRANSPORTATION RESEARCH PART E-LOGISTICS AND TRANSPORTATION REVIEW, 2021, 152