Skip to main content

Secure and Privacy-Aware Searching in Peer-to-Peer Networks

  • Conference paper
Data Privacy Management and Autonomous Spontaneus Security (DPM 2011, SETOP 2011)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 7122))

Abstract

The existing peer-to-peer networks have several problems such as fake content distribution, free riding, white-washing, poor search scalability, lack of a robust trust model and absence of user privacy protection mechanism. Although, several trust management and semantic community-based mechanisms for combating free riding and distribution of malicious contents have been proposed by some researchers, most of these schemes lack scalability due to their high computational, communication and storage overhead. This paper presents a robust trust management scheme for P2P networks that utilizes topology adaptation by constructing an overlay of trusted peers where the neighbors are selected based on their trust ratings and content similarities. While increasing the search efficiency by intelligently exploiting the formation of semantic community structures by topology adaptation among the trustworthy peers, the scheme provides the users a very high level of privacy protection of their usage and consumption patterns of network resources. Simulation results demonstrate that the proposed scheme provides efficient searching to good peers while penalizing the malicious peers by increasing their search times as the network topology stabilizes.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Abdul-Rahman, A., Hailes, S.: A Distributed Trust Model. In: Proc. of the Workshop on New Security Paradigms, pp. 48–60 (1997)

    Google Scholar 

  2. Bloom, B.: Space-Time Trade-Offs in Hash Coding with Allowable Errors. Communications of the ACM 13(7), 422–426 (1970)

    Article  MATH  Google Scholar 

  3. Condie, T., Kamvar, S.D., Garcia-Molina, H.: Adaptive Peer-to-Peer Topologies. In: Proc. of the 4th Int. Conf. on Peer-to-Peer Computing (P2P 2004), pp. 53–62 (2004)

    Google Scholar 

  4. Crespo, A., Garcia-Molina, H.: Semantic Overlay Networks for P2P Systems. Technical Report, Stanford University (2002)

    Google Scholar 

  5. De Mello, E.R., Moorsel, A.V., Fraga, J.D.S.: Evaluation of P2P Search Algorithms for Discovering Trust Paths. In: Proc. of 4th European Performance Engineering Conf. on Formal Models and Stochastic Models for Performance Evaluation, pp. 112–124 (2007)

    Google Scholar 

  6. Ganeriwal, S., Srivastava, M.: Reputation-Based Framework for High Integrity Sensor Networks. In: Proc. of the 2nd ACM Workshop on Security of Ad Hoc and Sensor Networks (SAN 2004), pp. 66–77 (2004)

    Google Scholar 

  7. Guo, L., Yang, S., Guo, L., Shen, K., Lu, W.: Trust-Aware Adaptive P2P Overlay Topology Based on Super-Peer-Partition. In: Proc. of the 6th Int. Conf. on Grid and Cooperative Computing, pp. 117–124 (2007)

    Google Scholar 

  8. Jsang, A.: A Logic for Uncertain Probabilities. Int. Journal of Uncertainty, Fuzziness and Knowledge-Based Systems 9(3), 279–311 (2001)

    Google Scholar 

  9. Kamvar, S.D., Schlosser, M.T., Garcia-Molina, H.: The Eigen Trust Algorithm for reputation Management in p2P Networks. In: Proc. of the 12th Int. Conf. on World Wide Web, WWW 2003 (2002)

    Google Scholar 

  10. Li, X., Wang, J.: A Global Trust Model of P2P Network Based on Distance-Weighted Recommendation. In: Proc. of IEEE Int. Conf. of Networking, Architecture, and Storage, pp. 281–284 (2009)

    Google Scholar 

  11. Risson, J., Moors, T.: Survey of Research Towards Robust Peer-to-Peer Networks. Computer Networks 50(7), 3485–3521 (2006)

    Article  MATH  Google Scholar 

  12. Schafer, J., Malinks, K., Hanacek, P.: Peer-to-Peer Networks Security. In: Proc. of the 3rd Int. Conf. on Internet Monitoring and Protection (ICIMP), pp. 74–79 (2008)

    Google Scholar 

  13. Schlosser, M.T., Condie, T.E., Kamvar, S.D., Kamvar, A.D.: Simulating a P2P File-Sharing Network. In: Proc. of the 1st Workshop on Semantics in P2P and Grid Computing (2002)

    Google Scholar 

  14. Sen, J.: A Trust-Based Robust and Efficient Searching Scheme for Peer-to-Peer Networks. In: Soriano, M., Qing, S., López, J. (eds.) ICICS 2010. LNCS, vol. 6476, pp. 77–91. Springer, Heidelberg (2010)

    Chapter  Google Scholar 

  15. Shafer, G.: A Mathematical Theory of Evidence. Princeton University (1976)

    Google Scholar 

  16. Tain, H., Zou, S., Wang, W., Cheng, S.: Constructing Efficient Peer-to-Peer Overlay Topologies by Adaptive Connection Establishment. Computer Communication 29(17), 3567–3579 (2006)

    Article  Google Scholar 

  17. Tang, Y., Wang, H., Dou, W.: Trust Based Incentive in P2P Network. In: Proc. of the IEEE Int. Conf. on E-Commerce Technology for Dynamic E-Business, pp. 302–305 (2004)

    Google Scholar 

  18. Zhuge, H., Chen, X., Sun, X.: Preferential Walk: Towards Efficient and Scalable Search in Unstructured Peer-to-Peer Networks. In: Proc. of the 14th Int. Conf. on World Wide Web (WWW 2005), pp. 882–883 (2005)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Sen, J. (2012). Secure and Privacy-Aware Searching in Peer-to-Peer Networks. In: Garcia-Alfaro, J., Navarro-Arribas, G., Cuppens-Boulahia, N., de Capitani di Vimercati, S. (eds) Data Privacy Management and Autonomous Spontaneus Security. DPM SETOP 2011 2011. Lecture Notes in Computer Science, vol 7122. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-28879-1_6

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-28879-1_6

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-28878-4

  • Online ISBN: 978-3-642-28879-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics