Skip to main content
Top
Published in: Peer-to-Peer Networking and Applications 1/2009

01-03-2009

Reputation based friend-to-friend networks

Authors: Fotis Loukos, Helen D. Karatza

Published in: Peer-to-Peer Networking and Applications | Issue 1/2009

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Friend-to-Friend networks are a form of Peer-to-Peer networks that provide anonymity of the users who share data. Turtle is an example of such a network, where a peer only connects to real life friends. In this paper we propose an extension of Turtle for connecting to other nodes based on their reputation. Furthermore, we use trust management to dynamically adjust this reputation based on the honest or malicious behaviour of all connected peers. Using these techniques, a node is able to create links to other nodes and identify possible misbehaving friends. Finally, we present simulation results of a reputation based Turtle Friend-to-Friend network.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
4.
go back to reference Christensen C, Aina T, Stainforth D (2005) The challenge of volunteer computing with lengthy climate model simulations. In: Proc of the 1st IEEE conference on e-science and grid computing. IEEE, Piscataway, pp 8–15 Christensen C, Aina T, Stainforth D (2005) The challenge of volunteer computing with lengthy climate model simulations. In: Proc of the 1st IEEE conference on e-science and grid computing. IEEE, Piscataway, pp 8–15
5.
go back to reference Clarke I, Sandberg O, Wiley B, Hong TW (2000) Freenet: a distributed anonymous information storage and retrieval system. In: Proc. of the ICSI workshop on design issues in anonymity and unobservability. Springer, Heidelberg, pp 46–66 Clarke I, Sandberg O, Wiley B, Hong TW (2000) Freenet: a distributed anonymous information storage and retrieval system. In: Proc. of the ICSI workshop on design issues in anonymity and unobservability. Springer, Heidelberg, pp 46–66
6.
go back to reference Popescu BC, Crispo B, Tanenbaum AS (2004) Safe and private data sharing with turtle: friends team-up and beat the system. In: Proc of the 12th Cambridge international workshop on security protocols, Cambridge, 26–28 April 2004, pp 213–220 Popescu BC, Crispo B, Tanenbaum AS (2004) Safe and private data sharing with turtle: friends team-up and beat the system. In: Proc of the 12th Cambridge international workshop on security protocols, Cambridge, 26–28 April 2004, pp 213–220
7.
go back to reference Kamvar S, Schlosser M, Garcia-Molina H (2003) Eigenrep: reputation management in peer-to-peer networks. In: Proc. of the 12th international world wide web conference (WWW 2003), 20–24 May 2003, Budapest Kamvar S, Schlosser M, Garcia-Molina H (2003) Eigenrep: reputation management in peer-to-peer networks. In: Proc. of the 12th international world wide web conference (WWW 2003), 20–24 May 2003, Budapest
8.
go back to reference Gupta M, Judge P, Ammar M (2003) A reputation system for peer-to-peer networks. In: Proc of the 13th international workshop on network and operating systems support for digital audio and video. ACM, New York, pp 144–152CrossRef Gupta M, Judge P, Ammar M (2003) A reputation system for peer-to-peer networks. In: Proc of the 13th international workshop on network and operating systems support for digital audio and video. ACM, New York, pp 144–152CrossRef
9.
go back to reference Sarmenta LFG (2002) Sabotage-tolerance mechanisms for volunteer computing systems. Future Gener Comput Syst 18(4):561–572MATHCrossRef Sarmenta LFG (2002) Sabotage-tolerance mechanisms for volunteer computing systems. Future Gener Comput Syst 18(4):561–572MATHCrossRef
10.
11.
go back to reference Yao AC-C (1982) Protocols for secure computations (extended abstract). In: Proc of the 23rd annual ieee symposium on foundations of computer science (FOCS 1982). IEEE, Piscataway, pp 160–164CrossRef Yao AC-C (1982) Protocols for secure computations (extended abstract). In: Proc of the 23rd annual ieee symposium on foundations of computer science (FOCS 1982). IEEE, Piscataway, pp 160–164CrossRef
12.
go back to reference Lindell Y, Pinkas B (2004) A proof of Yao’s protocol for secure two-party computation. Tech rep, Cryptology ePrint Archive, Report 2004/175 Lindell Y, Pinkas B (2004) A proof of Yao’s protocol for secure two-party computation. Tech rep, Cryptology ePrint Archive, Report 2004/175
13.
go back to reference Schneier B (1996) Applied cryptography. Wiley, New York, tUB-HH: TIK-806 Schneier B (1996) Applied cryptography. Wiley, New York, tUB-HH: TIK-806
15.
go back to reference Douceur JR (2002) The sybil attack. In: Druschel P, Kaashoek MF, Rowstron AIT (eds) Proc of the international workshop on peer-to-peer systems (IPTPS02), Lecture Notes in Computer Science, vol 2429. Springer, Heidelberg, pp 251–260 Douceur JR (2002) The sybil attack. In: Druschel P, Kaashoek MF, Rowstron AIT (eds) Proc of the international workshop on peer-to-peer systems (IPTPS02), Lecture Notes in Computer Science, vol 2429. Springer, Heidelberg, pp 251–260
16.
go back to reference Dinger J, Hartenstein H (2006) Defending the sybil attack in p2p networks: taxonomy, challenges, and a proposal for self-registration. In: ARES, Vienna, 20–22 April 2006, pp 756–763 Dinger J, Hartenstein H (2006) Defending the sybil attack in p2p networks: taxonomy, challenges, and a proposal for self-registration. In: ARES, Vienna, 20–22 April 2006, pp 756–763
17.
go back to reference Diffie W, van Oorschot PC, Wiener MJ (1992) Authentication and authenticated key exchanges. Des Codes Cryptogr 2(2):107–125CrossRefMathSciNet Diffie W, van Oorschot PC, Wiener MJ (1992) Authentication and authenticated key exchanges. Des Codes Cryptogr 2(2):107–125CrossRefMathSciNet
18.
go back to reference Dellarocas C (2000) Immunizing online reputation reporting systems against unfair ratings and discriminatory behavior. In: Proc of the 2nd ACM conference on electronic commerce. ACM, New York, pp 150–157CrossRef Dellarocas C (2000) Immunizing online reputation reporting systems against unfair ratings and discriminatory behavior. In: Proc of the 2nd ACM conference on electronic commerce. ACM, New York, pp 150–157CrossRef
19.
go back to reference Lam SK, Riedl J (2004) Shilling recommender systems for fun and profit. In: WWW, New York, 17–20 May 2004, pp 393–402 Lam SK, Riedl J (2004) Shilling recommender systems for fun and profit. In: WWW, New York, 17–20 May 2004, pp 393–402
20.
go back to reference Zerfiridis K, Karatza H (2004) File distribution using a peer-to-peer network—a simulation study. J Syst Softw 73(1):31–44CrossRef Zerfiridis K, Karatza H (2004) File distribution using a peer-to-peer network—a simulation study. J Syst Softw 73(1):31–44CrossRef
21.
go back to reference Adar E, Huberman B (2000) Free riding on gnutella, vol 5(number 10). First Monday Adar E, Huberman B (2000) Free riding on gnutella, vol 5(number 10). First Monday
Metadata
Title
Reputation based friend-to-friend networks
Authors
Fotis Loukos
Helen D. Karatza
Publication date
01-03-2009
Publisher
Springer US
Published in
Peer-to-Peer Networking and Applications / Issue 1/2009
Print ISSN: 1936-6442
Electronic ISSN: 1936-6450
DOI
https://doi.org/10.1007/s12083-008-0019-1

Other articles of this Issue 1/2009

Peer-to-Peer Networking and Applications 1/2009 Go to the issue

Premium Partner