期刊文献+

WTR:A Reputation Metric for Distributed Hash Tables Based on a Risk and Credibility Factor 被引量:1

WTR:A Reputation Metric for Distributed Hash Tables Based on a Risk and Credibility Factor
原文传递
导出
摘要 The growing number of popular peer to peer applications during the last five years has implied for researchers to focus on how to build trust in such very large scale distributed systems. Reputation systems have shown to be a very good solution to build trust in presence of malicious nodes. We propose in this paper a new metric for reputation systems on top of a Distributed Hash Table that uses a notion of risk to make the applications aware of certain behaviours of malicious nodes. We show that our metric is able to significantly reduce the number of malicious transactions, and that it also provides very strong resistance to several traditional attacks of reputations systems. We also show that our solution can easily scale, and can be adapted to various Distributed Hash Tables. The growing number of popular peer to peer applications during the last five years has implied for researchers to focus on how to build trust in such very large scale distributed systems. Reputation systems have shown to be a very good solution to build trust in presence of malicious nodes. We propose in this paper a new metric for reputation systems on top of a Distributed Hash Table that uses a notion of risk to make the applications aware of certain behaviours of malicious nodes. We show that our metric is able to significantly reduce the number of malicious transactions, and that it also provides very strong resistance to several traditional attacks of reputations systems. We also show that our solution can easily scale, and can be adapted to various Distributed Hash Tables.
出处 《Journal of Computer Science & Technology》 SCIE EI CSCD 2009年第5期844-854,共11页 计算机科学技术学报(英文版)
基金 supported by an INRIA/CONICYT French-Chilean cooperation project under Grant No.INRIA0703
关键词 peer to peer reputation system risk evaluation peer to peer, reputation system, risk evaluation
  • 相关文献

参考文献26

  • 1Lua E K, Crowcroft J, Pias M, Sharma R, Lim S. A survey and comparison of peer-to-peer overlay network schemes. IEEE Communications Surveys & Tutorials, 2005, 7: 72-93.
  • 2Zhao B, Kubiatowicz J, Joseph A. Tapestry: An infrastructure for fault-tolerant wide-area location and routing. Technical Report UCB/CSD-01-1141, UC Berkeley, April 2001.
  • 3Stoica I, Morris R, Karger D, Kaashoek M, Balakrishnan H. Chord: A scalable peer-to-peer lookup service for Internet applications. In Proc. the 2001 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications (SIGCOMM 2001), New York, USA, ACM Press, Aug. 27-31, 2001, pp.149-160.
  • 4Antony I T Rowstron, Peter Druschel. Pastry: Scalable, decentralized object location, and routing for large-scale peer-to-peer systems. In Proc. the IFIP//ACM International Conference on Distributed Systems Platforms Heidelberg ( Middleware 2001), London, UK, LNCS 2218, Springer-Verlag, November 12-16, 2001, pp.329-350.
  • 5Douceur J. The sybil attack. In Proc. the First International Workshop on Peer-to-Peer Systems (IPTPS 2002), Cambridge, USA, LNCS 2429, Springer-Verlag, March 1-8, 2002, pp.251-260.
  • 6Dewan P, Dasgupta P. Pride: Peer-to-peer reputation infrastructure for decentralized environments. In Proc. the 13th International World Wide Web Conference on Alternate Track Papers & Posters (WWW Alt. 2004), New York, USA, ACM Press, May 17-20, 2004, pp.480-481.
  • 7Singh A, Liu L. TrustMe: Anonymous management of trust relationships in decentralized P2P. In Proc. the IEEE International Conference on Peer-to-Peer Computing ( P2P 2003), Washington DC, USA, September 1-3, 2003, p.142.
  • 8Xiong L, Liu L. PeerTrust: Supporting reputation-based trust for peer-to-peer electronic communities. IEEE Transactions on Knowledge and Data Engineering, 2004, 16(7): 843-857.
  • 9Srivatsa M, Xiong L, Liu L. TrustGuard: Countering vulnerabilities in reputation management for decentralized overlay networks. In Proc. the 14th International Conference on World Wide Web ( WWW 2005), New York, USA, ACM Press, May 10-14, 2005, pp.422-431.
  • 10Zhou R, Hwang F K. PowerTrust: A robust and scalable seputation system for trusted peer-to-peer computing. IEEE Transactions on Parallel and Distributed Systems, April 2007, 18(4): 460-473.

同被引文献15

  • 1李景涛,荆一楠,肖晓春,王雪平,张根度.基于相似度加权推荐的P2P环境下的信任模型[J].软件学报,2007,18(1):157-167. 被引量:115
  • 2李小勇,桂小林.大规模分布式环境下动态信任模型研究[J].软件学报,2007,18(6):1510-1521. 被引量:138
  • 3WANG J, SUN H J. A new evidential trust model for open communi- ties [J]. Computer Standards and Interfaces, 2009, 31 (5): 994-1001.
  • 4JSANG A, ISMAI R, BOYD C. A survey of trust and reputation sys- tems for online service provision[J]. Decision Support Systems, 2007, 43(2): 618-644.
  • 5KAMVAR S, SCHLOSSER M. EigenRep: reputation management in P2P networks[A]. Proceedings of the 12th International World Wide Web Conference[C]. 2003. 123-134.
  • 6HAQUE M, AHAMED S. Design, analysis, and deployment of omni- present formal trust model (FTM) with trust bootstrapping for pervasive environments[J]. Journal of Systems and Software. 2009, 83(2): 253-270.
  • 7Mohammad G U, Moharnmad Z, Sheikh I A. CAT: a context aware trust model for open and dynamic systems[A]. Proceedings of the 23rd Annual ACM Symposium on Applied Computing, SAC'08[C]. For- taleza, Ceara, Brazil, 2008, 2024-2029.
  • 8FELIX G M, GREGORIO M E Security threats scenarios in trust and reputation models for distributed systems[J]. Computers and Security, 2009, 28(7): 545-556.
  • 9鲍宇,曾国荪,曾连荪,陈波,王伟.P2P网络中防止欺骗行为的一种信任度计算方法[J].通信学报,2008,29(10):215-222. 被引量:10
  • 10苗光胜,冯登国,苏璞睿.P2P信任模型中基于行为相似度的共谋团体识别模型[J].通信学报,2009,30(8):9-20. 被引量:29

引证文献1

二级引证文献8

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部