Abstract
The existing peer-to-peer networks have several problems such as fake content distribution, free riding, white-washing, poor search scalability, lack of a robust trust model and absence of user privacy protection mechanism. Although, several trust management and semantic community-based mechanisms for combating free riding and distribution of malicious contents have been proposed by some researchers, most of these schemes lack scalability due to their high computational, communication and storage overhead. This paper presents a robust trust management scheme for P2P networks that utilizes topology adaptation by constructing an overlay of trusted peers where the neighbors are selected based on their trust ratings and content similarities. While increasing the search efficiency by intelligently exploiting the formation of semantic community structures by topology adaptation among the trustworthy peers, the scheme provides the users a very high level of privacy protection of their usage and consumption patterns of network resources. Simulation results demonstrate that the proposed scheme provides efficient searching to good peers while penalizing the malicious peers by increasing their search times as the network topology stabilizes.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Abdul-Rahman, A., Hailes, S.: A Distributed Trust Model. In: Proc. of the Workshop on New Security Paradigms, pp. 48–60 (1997)
Bloom, B.: Space-Time Trade-Offs in Hash Coding with Allowable Errors. Communications of the ACM 13(7), 422–426 (1970)
Condie, T., Kamvar, S.D., Garcia-Molina, H.: Adaptive Peer-to-Peer Topologies. In: Proc. of the 4th Int. Conf. on Peer-to-Peer Computing (P2P 2004), pp. 53–62 (2004)
Crespo, A., Garcia-Molina, H.: Semantic Overlay Networks for P2P Systems. Technical Report, Stanford University (2002)
De Mello, E.R., Moorsel, A.V., Fraga, J.D.S.: Evaluation of P2P Search Algorithms for Discovering Trust Paths. In: Proc. of 4th European Performance Engineering Conf. on Formal Models and Stochastic Models for Performance Evaluation, pp. 112–124 (2007)
Ganeriwal, S., Srivastava, M.: Reputation-Based Framework for High Integrity Sensor Networks. In: Proc. of the 2nd ACM Workshop on Security of Ad Hoc and Sensor Networks (SAN 2004), pp. 66–77 (2004)
Guo, L., Yang, S., Guo, L., Shen, K., Lu, W.: Trust-Aware Adaptive P2P Overlay Topology Based on Super-Peer-Partition. In: Proc. of the 6th Int. Conf. on Grid and Cooperative Computing, pp. 117–124 (2007)
Jsang, A.: A Logic for Uncertain Probabilities. Int. Journal of Uncertainty, Fuzziness and Knowledge-Based Systems 9(3), 279–311 (2001)
Kamvar, S.D., Schlosser, M.T., Garcia-Molina, H.: The Eigen Trust Algorithm for reputation Management in p2P Networks. In: Proc. of the 12th Int. Conf. on World Wide Web, WWW 2003 (2002)
Li, X., Wang, J.: A Global Trust Model of P2P Network Based on Distance-Weighted Recommendation. In: Proc. of IEEE Int. Conf. of Networking, Architecture, and Storage, pp. 281–284 (2009)
Risson, J., Moors, T.: Survey of Research Towards Robust Peer-to-Peer Networks. Computer Networks 50(7), 3485–3521 (2006)
Schafer, J., Malinks, K., Hanacek, P.: Peer-to-Peer Networks Security. In: Proc. of the 3rd Int. Conf. on Internet Monitoring and Protection (ICIMP), pp. 74–79 (2008)
Schlosser, M.T., Condie, T.E., Kamvar, S.D., Kamvar, A.D.: Simulating a P2P File-Sharing Network. In: Proc. of the 1st Workshop on Semantics in P2P and Grid Computing (2002)
Sen, J.: A Trust-Based Robust and Efficient Searching Scheme for Peer-to-Peer Networks. In: Soriano, M., Qing, S., López, J. (eds.) ICICS 2010. LNCS, vol. 6476, pp. 77–91. Springer, Heidelberg (2010)
Shafer, G.: A Mathematical Theory of Evidence. Princeton University (1976)
Tain, H., Zou, S., Wang, W., Cheng, S.: Constructing Efficient Peer-to-Peer Overlay Topologies by Adaptive Connection Establishment. Computer Communication 29(17), 3567–3579 (2006)
Tang, Y., Wang, H., Dou, W.: Trust Based Incentive in P2P Network. In: Proc. of the IEEE Int. Conf. on E-Commerce Technology for Dynamic E-Business, pp. 302–305 (2004)
Zhuge, H., Chen, X., Sun, X.: Preferential Walk: Towards Efficient and Scalable Search in Unstructured Peer-to-Peer Networks. In: Proc. of the 14th Int. Conf. on World Wide Web (WWW 2005), pp. 882–883 (2005)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Sen, J. (2012). Secure and Privacy-Aware Searching in Peer-to-Peer Networks. In: Garcia-Alfaro, J., Navarro-Arribas, G., Cuppens-Boulahia, N., de Capitani di Vimercati, S. (eds) Data Privacy Management and Autonomous Spontaneus Security. DPM SETOP 2011 2011. Lecture Notes in Computer Science, vol 7122. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-28879-1_6
Download citation
DOI: https://doi.org/10.1007/978-3-642-28879-1_6
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-28878-4
Online ISBN: 978-3-642-28879-1
eBook Packages: Computer ScienceComputer Science (R0)