Reputation based friend-to-friend networks

  • Fotis Loukos
  • Helen D. Karatza


Friend-to-Friend networks are a form of Peer-to-Peer networks that provide anonymity of the users who share data. Turtle is an example of such a network, where a peer only connects to real life friends. In this paper we propose an extension of Turtle for connecting to other nodes based on their reputation. Furthermore, we use trust management to dynamically adjust this reputation based on the honest or malicious behaviour of all connected peers. Using these techniques, a node is able to create links to other nodes and identify possible misbehaving friends. Finally, we present simulation results of a reputation based Turtle Friend-to-Friend network.


Peer-to-peer network Friend-to-friend network Reputation Trust 


  1. 1.
    Napster (2008) Napster homepage.
  2. 2.
    Gnutella (2008) Gnutella homepage.
  3. 3.
    Kazaa (2008) Kazaa homepage.
  4. 4.
    Christensen C, Aina T, Stainforth D (2005) The challenge of volunteer computing with lengthy climate model simulations. In: Proc of the 1st IEEE conference on e-science and grid computing. IEEE, Piscataway, pp 8–15Google Scholar
  5. 5.
    Clarke I, Sandberg O, Wiley B, Hong TW (2000) Freenet: a distributed anonymous information storage and retrieval system. In: Proc. of the ICSI workshop on design issues in anonymity and unobservability. Springer, Heidelberg, pp 46–66Google Scholar
  6. 6.
    Popescu BC, Crispo B, Tanenbaum AS (2004) Safe and private data sharing with turtle: friends team-up and beat the system. In: Proc of the 12th Cambridge international workshop on security protocols, Cambridge, 26–28 April 2004, pp 213–220Google Scholar
  7. 7.
    Kamvar S, Schlosser M, Garcia-Molina H (2003) Eigenrep: reputation management in peer-to-peer networks. In: Proc. of the 12th international world wide web conference (WWW 2003), 20–24 May 2003, BudapestGoogle Scholar
  8. 8.
    Gupta M, Judge P, Ammar M (2003) A reputation system for peer-to-peer networks. In: Proc of the 13th international workshop on network and operating systems support for digital audio and video. ACM, New York, pp 144–152CrossRefGoogle Scholar
  9. 9.
    Sarmenta LFG (2002) Sabotage-tolerance mechanisms for volunteer computing systems. Future Gener Comput Syst 18(4):561–572MATHCrossRefGoogle Scholar
  10. 10.
    Parhami B (1994) Voting algorithms. IEEE Trans Reliab 43(4):617–629CrossRefGoogle Scholar
  11. 11.
    Yao AC-C (1982) Protocols for secure computations (extended abstract). In: Proc of the 23rd annual ieee symposium on foundations of computer science (FOCS 1982). IEEE, Piscataway, pp 160–164CrossRefGoogle Scholar
  12. 12.
    Lindell Y, Pinkas B (2004) A proof of Yao’s protocol for secure two-party computation. Tech rep, Cryptology ePrint Archive, Report 2004/175Google Scholar
  13. 13.
    Schneier B (1996) Applied cryptography. Wiley, New York, tUB-HH: TIK-806Google Scholar
  14. 14.
    Diffie W, Hellman ME (1976) New directions in cryptography. IEEE Trans Inf Theory IT 22(6):644–654MATHCrossRefMathSciNetGoogle Scholar
  15. 15.
    Douceur JR (2002) The sybil attack. In: Druschel P, Kaashoek MF, Rowstron AIT (eds) Proc of the international workshop on peer-to-peer systems (IPTPS02), Lecture Notes in Computer Science, vol 2429. Springer, Heidelberg, pp 251–260Google Scholar
  16. 16.
    Dinger J, Hartenstein H (2006) Defending the sybil attack in p2p networks: taxonomy, challenges, and a proposal for self-registration. In: ARES, Vienna, 20–22 April 2006, pp 756–763Google Scholar
  17. 17.
    Diffie W, van Oorschot PC, Wiener MJ (1992) Authentication and authenticated key exchanges. Des Codes Cryptogr 2(2):107–125CrossRefMathSciNetGoogle Scholar
  18. 18.
    Dellarocas C (2000) Immunizing online reputation reporting systems against unfair ratings and discriminatory behavior. In: Proc of the 2nd ACM conference on electronic commerce. ACM, New York, pp 150–157CrossRefGoogle Scholar
  19. 19.
    Lam SK, Riedl J (2004) Shilling recommender systems for fun and profit. In: WWW, New York, 17–20 May 2004, pp 393–402Google Scholar
  20. 20.
    Zerfiridis K, Karatza H (2004) File distribution using a peer-to-peer network—a simulation study. J Syst Softw 73(1):31–44CrossRefGoogle Scholar
  21. 21.
    Adar E, Huberman B (2000) Free riding on gnutella, vol 5(number 10). First MondayGoogle Scholar
  22. 22.
    Verizon Business (2008) Virus infected file sharing at kazaa. Acessed 29 December 2003

Copyright information

© Springer Science + Business Media, LLC 2008

Authors and Affiliations

  1. 1.Department of InformaticsAristotle University of ThessalonikiThessalonikiGreece

Personalised recommendations