Skip to main content
Erschienen in: Peer-to-Peer Networking and Applications 1/2009

01.03.2009

Reputation based friend-to-friend networks

verfasst von: Fotis Loukos, Helen D. Karatza

Erschienen in: Peer-to-Peer Networking and Applications | Ausgabe 1/2009

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Friend-to-Friend networks are a form of Peer-to-Peer networks that provide anonymity of the users who share data. Turtle is an example of such a network, where a peer only connects to real life friends. In this paper we propose an extension of Turtle for connecting to other nodes based on their reputation. Furthermore, we use trust management to dynamically adjust this reputation based on the honest or malicious behaviour of all connected peers. Using these techniques, a node is able to create links to other nodes and identify possible misbehaving friends. Finally, we present simulation results of a reputation based Turtle Friend-to-Friend network.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
4.
Zurück zum Zitat Christensen C, Aina T, Stainforth D (2005) The challenge of volunteer computing with lengthy climate model simulations. In: Proc of the 1st IEEE conference on e-science and grid computing. IEEE, Piscataway, pp 8–15 Christensen C, Aina T, Stainforth D (2005) The challenge of volunteer computing with lengthy climate model simulations. In: Proc of the 1st IEEE conference on e-science and grid computing. IEEE, Piscataway, pp 8–15
5.
Zurück zum Zitat Clarke I, Sandberg O, Wiley B, Hong TW (2000) Freenet: a distributed anonymous information storage and retrieval system. In: Proc. of the ICSI workshop on design issues in anonymity and unobservability. Springer, Heidelberg, pp 46–66 Clarke I, Sandberg O, Wiley B, Hong TW (2000) Freenet: a distributed anonymous information storage and retrieval system. In: Proc. of the ICSI workshop on design issues in anonymity and unobservability. Springer, Heidelberg, pp 46–66
6.
Zurück zum Zitat Popescu BC, Crispo B, Tanenbaum AS (2004) Safe and private data sharing with turtle: friends team-up and beat the system. In: Proc of the 12th Cambridge international workshop on security protocols, Cambridge, 26–28 April 2004, pp 213–220 Popescu BC, Crispo B, Tanenbaum AS (2004) Safe and private data sharing with turtle: friends team-up and beat the system. In: Proc of the 12th Cambridge international workshop on security protocols, Cambridge, 26–28 April 2004, pp 213–220
7.
Zurück zum Zitat Kamvar S, Schlosser M, Garcia-Molina H (2003) Eigenrep: reputation management in peer-to-peer networks. In: Proc. of the 12th international world wide web conference (WWW 2003), 20–24 May 2003, Budapest Kamvar S, Schlosser M, Garcia-Molina H (2003) Eigenrep: reputation management in peer-to-peer networks. In: Proc. of the 12th international world wide web conference (WWW 2003), 20–24 May 2003, Budapest
8.
Zurück zum Zitat Gupta M, Judge P, Ammar M (2003) A reputation system for peer-to-peer networks. In: Proc of the 13th international workshop on network and operating systems support for digital audio and video. ACM, New York, pp 144–152CrossRef Gupta M, Judge P, Ammar M (2003) A reputation system for peer-to-peer networks. In: Proc of the 13th international workshop on network and operating systems support for digital audio and video. ACM, New York, pp 144–152CrossRef
9.
Zurück zum Zitat Sarmenta LFG (2002) Sabotage-tolerance mechanisms for volunteer computing systems. Future Gener Comput Syst 18(4):561–572MATHCrossRef Sarmenta LFG (2002) Sabotage-tolerance mechanisms for volunteer computing systems. Future Gener Comput Syst 18(4):561–572MATHCrossRef
10.
Zurück zum Zitat Parhami B (1994) Voting algorithms. IEEE Trans Reliab 43(4):617–629CrossRef Parhami B (1994) Voting algorithms. IEEE Trans Reliab 43(4):617–629CrossRef
11.
Zurück zum Zitat Yao AC-C (1982) Protocols for secure computations (extended abstract). In: Proc of the 23rd annual ieee symposium on foundations of computer science (FOCS 1982). IEEE, Piscataway, pp 160–164CrossRef Yao AC-C (1982) Protocols for secure computations (extended abstract). In: Proc of the 23rd annual ieee symposium on foundations of computer science (FOCS 1982). IEEE, Piscataway, pp 160–164CrossRef
12.
Zurück zum Zitat Lindell Y, Pinkas B (2004) A proof of Yao’s protocol for secure two-party computation. Tech rep, Cryptology ePrint Archive, Report 2004/175 Lindell Y, Pinkas B (2004) A proof of Yao’s protocol for secure two-party computation. Tech rep, Cryptology ePrint Archive, Report 2004/175
13.
Zurück zum Zitat Schneier B (1996) Applied cryptography. Wiley, New York, tUB-HH: TIK-806 Schneier B (1996) Applied cryptography. Wiley, New York, tUB-HH: TIK-806
15.
Zurück zum Zitat Douceur JR (2002) The sybil attack. In: Druschel P, Kaashoek MF, Rowstron AIT (eds) Proc of the international workshop on peer-to-peer systems (IPTPS02), Lecture Notes in Computer Science, vol 2429. Springer, Heidelberg, pp 251–260 Douceur JR (2002) The sybil attack. In: Druschel P, Kaashoek MF, Rowstron AIT (eds) Proc of the international workshop on peer-to-peer systems (IPTPS02), Lecture Notes in Computer Science, vol 2429. Springer, Heidelberg, pp 251–260
16.
Zurück zum Zitat Dinger J, Hartenstein H (2006) Defending the sybil attack in p2p networks: taxonomy, challenges, and a proposal for self-registration. In: ARES, Vienna, 20–22 April 2006, pp 756–763 Dinger J, Hartenstein H (2006) Defending the sybil attack in p2p networks: taxonomy, challenges, and a proposal for self-registration. In: ARES, Vienna, 20–22 April 2006, pp 756–763
17.
Zurück zum Zitat Diffie W, van Oorschot PC, Wiener MJ (1992) Authentication and authenticated key exchanges. Des Codes Cryptogr 2(2):107–125CrossRefMathSciNet Diffie W, van Oorschot PC, Wiener MJ (1992) Authentication and authenticated key exchanges. Des Codes Cryptogr 2(2):107–125CrossRefMathSciNet
18.
Zurück zum Zitat Dellarocas C (2000) Immunizing online reputation reporting systems against unfair ratings and discriminatory behavior. In: Proc of the 2nd ACM conference on electronic commerce. ACM, New York, pp 150–157CrossRef Dellarocas C (2000) Immunizing online reputation reporting systems against unfair ratings and discriminatory behavior. In: Proc of the 2nd ACM conference on electronic commerce. ACM, New York, pp 150–157CrossRef
19.
Zurück zum Zitat Lam SK, Riedl J (2004) Shilling recommender systems for fun and profit. In: WWW, New York, 17–20 May 2004, pp 393–402 Lam SK, Riedl J (2004) Shilling recommender systems for fun and profit. In: WWW, New York, 17–20 May 2004, pp 393–402
20.
Zurück zum Zitat Zerfiridis K, Karatza H (2004) File distribution using a peer-to-peer network—a simulation study. J Syst Softw 73(1):31–44CrossRef Zerfiridis K, Karatza H (2004) File distribution using a peer-to-peer network—a simulation study. J Syst Softw 73(1):31–44CrossRef
21.
Zurück zum Zitat Adar E, Huberman B (2000) Free riding on gnutella, vol 5(number 10). First Monday Adar E, Huberman B (2000) Free riding on gnutella, vol 5(number 10). First Monday
Metadaten
Titel
Reputation based friend-to-friend networks
verfasst von
Fotis Loukos
Helen D. Karatza
Publikationsdatum
01.03.2009
Verlag
Springer US
Erschienen in
Peer-to-Peer Networking and Applications / Ausgabe 1/2009
Print ISSN: 1936-6442
Elektronische ISSN: 1936-6450
DOI
https://doi.org/10.1007/s12083-008-0019-1

Weitere Artikel der Ausgabe 1/2009

Peer-to-Peer Networking and Applications 1/2009 Zur Ausgabe