Science China Information Sciences

, Volume 53, Issue 11, pp 2169–2184 | Cite as

A multiple user sharing behaviors based approach for fake file detection in P2P environments

  • Jing Jiang
  • YongJun Li
  • QinYuan Feng
  • Peng Huang
  • YaFei Dai
Research Papers
  • 60 Downloads

Abstract

File pollution is a problem that is threatening security and availability in peer-to-peer environments, and could eventually be fatal to the survival of these systems. Current methods of fake file detection, which are based on trust mechanisms or file characteristics, do not consider the problems such as interference of multiple user sharing behaviors, the difficulty in obtaining large amounts of raw data, and malicious fraud immediately after version publication. This is the first time that differences in the sharing habits of users and particularly long retention time for individual files have been detected, which impact fake file detection. This paper proposes a pollution prevention model based on multiple user sharing behaviors, which reduces interference in multiple user sharing behaviors and malicious fraud immediately after version publication. It designs a low-cost implementation mechanism for use in structured peer-to-peer networks, which automatically collects a large amount of user file-sharing information and alleviates difficulties in obtaining large quantities of raw data. A parameter configuration is also given in this paper. Simulation experiments use realistic system logs and prove that this approach detects fake files accurately and quickly, thus decreasing download times of fake files, effectively guaranteeing almost 100% real file downloads and resisting file pollution.

Keywords

peer-to-peer file pollution user sharing behavior 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Liang J, Kumar R, Xi Y, et al. Pollution in P2P file sharing system. In: IEEE INFOCOM 2005. Miami: IEEE Press, 2005. 1174–1185Google Scholar
  2. 2.
    Feng Q Y, Dai Y F. LIP: a lifetime and popularity based ranking approach to filter out fake files in P2P file sharing systems. In: IPTPS 2007, Bellevue, Washington, USA, 2007Google Scholar
  3. 3.
    Feng Q Y, Dai Y F. Survey of trust mechanism in P2P networks (in Chinese). Commun CCF, 2007, 3: 31–40Google Scholar
  4. 4.
    Dou W, Wang H M, Jia Y, et al. A recommendation-based peer-to-peer trust model (in Chinese). J Software, 2004, 15: 571–583MATHMathSciNetGoogle Scholar
  5. 5.
    Li J T, Jing Y N, Xiao X C, et al. A trust model based on similarity-weighted recommendation for P2P environments (in Chinese). J Software, 2007, 18: 157–167CrossRefGoogle Scholar
  6. 6.
    Sepandar D K, Mario T S, Hector G M. The Eigentrust algorithm for reputation management in P2P networks. In: www 2003. Budapest: ACM Press, 2003. 640–651Google Scholar
  7. 7.
    Zhou R F, Hwang K. PowerTrust: a robust and scalable reputation system for trusted peer-to-peer computing. IEEE Trans Paral Distr Syst, 2007, 18: 460–473CrossRefGoogle Scholar
  8. 8.
    Zhou R F, Hwang K, Cai M. GossipTrust for fast reputation aggregation in peer-to-peer networks. IEEE TKDE, 2008, 20: 1282–1295Google Scholar
  9. 9.
    Srivatsa M, Xiong L, Liu L. TrustGuard: countering vulnerabilities in reputation management for decentralized overlay networks. In: www 2005. New York: ACM Press, 2005. 422–431Google Scholar
  10. 10.
    Borges A, Almeida J, Campos S. Fighting pollution in P2P live streaming systems. In: ICME 2008. Hanover: IEEE Press, 2008. 481–484Google Scholar
  11. 11.
    Zhang H, Duan H X, Liu W. RRM: An incentive reputation model for promoting good behaviors in distributed systems. Sci China Ser F-Inf Sci, 2008, 51: 1871–1882CrossRefGoogle Scholar
  12. 12.
    Chen R C, Zhao X, Tang L Y, et al. CuboidTrust: a global reputation-based trust model in peer-to-peer networks. In: ATC 2007. Hong Kong: Lecture Notes in Computer Science, 2007, 4610. 203–215Google Scholar
  13. 13.
    Costa C, Almeida J. Reputation systems for fighting pollution in peer-to-peer file sharing systems. In: Peer-to-Peer Computing, 2007. Galway: IEEE Press, 2007. 53–60Google Scholar
  14. 14.
    Shin J, Kim T, Tak S. TrustRRep: an improved reputation management scheme for reliable resource sharing in peer-to-peer networks. In: APNOMS 2008. Beijing: Lecture Notes in Computer Science, 2008, 5297: 112–122Google Scholar
  15. 15.
    Walsh K, Sirer E G. Fighting peer-to-peer SPAM and decoys with object reputation. In: Workshop on the Economics of Peer-to-Peer Systems 2005. Philadelphia: ACM Press, 2005. 138–143Google Scholar
  16. 16.
    Walsh K, Sirer E G. Experience with a distributed object reputation system for peer-to-peer filesharing. In: NSDI 2006. San Jose: USENIX Press, 2006. 1–14Google Scholar
  17. 17.
    Zuo M, Ma Y H, Chbeir R, et al. Combating P2P file pollution with co-alerting. In: SITIS 2007. Shanghai: IEEE Press, 2007. 289–297Google Scholar
  18. 18.
    Cai Z H, Chen R C, Feng J Q, et al. A holistic mechanism against file pollution in peer-to-peer networks. In: SAC 2009. Hawaii: ACM Press, 2009. 28–34CrossRefGoogle Scholar
  19. 19.
    Pucha H, Andersen D G, Kaminsky M. Exploiting similarity for multi-source downloads using file handprints. In: NDSI 2007. Cambridge: USENIX Press, 2007. 15–18Google Scholar
  20. 20.
    Resnick P, Zeckhauser R. Trust among strangers in internet transactions: empirical analysis of eBay’s reputation system. Adv Appl Microeconom, 2002, 11: 127–157CrossRefGoogle Scholar
  21. 21.
    Li Y J, Dai Y F. Research on trust mechanism for peer-to-peer network (in Chinese). Chinese J Comput, 2010, 33: 390–405CrossRefGoogle Scholar
  22. 22.
    Adar E, Huberman B A. Free riding on Gnutella. First Monday, 2000, 5(10)Google Scholar
  23. 23.
    Hughes D, Coulson G, Walkerdine J. Freeriding on gnutella revisit: The bell tolls? IEEE Distrib Syst Online, 2005, 6: 182–192CrossRefGoogle Scholar
  24. 24.
    Yang M, Zhang Z, Li X M, et al. An empirical study of free-riding behavior in the Maze P2P file-sharing system. In: IPTPS 2005. New York: Peer-to-Peer Systems IV, 2005, 2640: 182–192Google Scholar
  25. 25.
    Huang G. STPC: a robust incentive mechanism for improving DHT-based peer-to-peer systems. Master thesis of computer science. Vancouver: University of British Columbia, 2003. 1–62Google Scholar
  26. 26.
    Chen G H, Li Z H. Peer-to-Peer Network: Structure, Application and Design (in Chinese). Beijing: Tsinghua University Press, 2007. 82–166Google Scholar
  27. 27.
    Fedotova N, Orzetti G, Veltri L, et al. Byzantine agreement for reputation management in DHT-based peer-to-peer networks. In: 15th International Conference on Telecommunications. St Petersburg: IEEE Press, 2008. 1–6CrossRefGoogle Scholar

Copyright information

© Science China Press and Springer-Verlag Berlin Heidelberg 2010

Authors and Affiliations

  • Jing Jiang
    • 1
  • YongJun Li
    • 1
  • QinYuan Feng
    • 1
  • Peng Huang
    • 1
  • YaFei Dai
    • 1
  1. 1.Department of Computer Science and TechnologyPeking UniversityBeijingChina

Personalised recommendations