Advertisement

A Critical Analysis of Latest Advances in Building Trusted P2P Networks Using Reputation Systems

  • Xavier Bonnaire
  • Erika Rosas
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 4832)

Abstract

Building trusted P2P networks is a very difficult task, due to the size of the networks, the high volatility of the nodes, and potential byzantine behaviors. Interest in this area of research is ever increasing, because of the popularity of P2P networks, and their capability to provide a high availability of resources and services. In the last years, reputation systems have shown to be a good solution to build trust in large scale networks. Many papers have been published on this subject, and having a complete understanding on how they work is not easy. In this paper, we make a critical analysis of the most relevant results about reputation systems in the last three years, and propose a classification to clearly discriminate their common advantages and specific problems.

Keywords

Free Rider Reputation System Late Advance Reputation Information Negative Discrimination 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Aberer, K., Hauswirth, M.: An overview of peer-to-peer information systems. In: WDAS 2002, pp. 171–188. Carleton Scientific, France (2002)Google Scholar
  2. 2.
    Rowstron, A., Druschel, P.: Pastry: Scalable, decentralized object location and routing for large-scale peer-to-peer systems. In: Guerraoui, R. (ed.) Middleware 2001. LNCS, vol. 2218, pp. 329–350. Springer, Heidelberg (2001)CrossRefGoogle Scholar
  3. 3.
    Stoica, I., Morris, R., Karger, D., Kaashoek, M., Balakrishnan, H.: Chord: A scalable peer-to-peer lookup service for internet applications. In: SIGCOMM 2001, pp. 149–160. ACM Press, New York (2001)CrossRefGoogle Scholar
  4. 4.
    Malkhi, D., Naor, M., Ratajczak, D.: Viceroy: a scalable and dynamic emulation of the butterfly. In: PODC 2002, pp. 183–192. ACM Press, New York (2002)CrossRefGoogle Scholar
  5. 5.
    Ripeanu, M.: Peer-to-peer architecture case study: Gnutella network. In: P2P 2001, Washington, DC, USA, p. 99. IEEE Computer Society Press, Los Alamitos (2001)Google Scholar
  6. 6.
    Liang, J., Kumar, R., Ross, K.: Understanding kazaA (2004)Google Scholar
  7. 7.
    Buchegger, S., Boudec, J.L.: A robust reputation system for p2p and mobile ad-hoc networks. In: P2PEcon 2004, Cambridge MA, USA (2004)Google Scholar
  8. 8.
    Dewan, P., Dasgupta, P.: Pride: peer-to-peer reputation infrastructure for decentralized environments. In: WWW Alt. 2004, pp. 480–481. ACM Press, New York (2004)CrossRefGoogle Scholar
  9. 9.
    Liang, Z., Shi, W.: PET: A PErsonalized trust model with reputation and risk evaluation for P2P resource sharing. In: HICSS 2005, Washington, DC, USA, p. 201. IEEE Computer Society Press, Los Alamitos (2005)Google Scholar
  10. 10.
    Selcuk, A., Uzun, E., Pariente, M.: A reputation-based trust management system for p2p networks. In: CCGRID 2004, Washington, DC, USA, pp. 251–258 (2004)Google Scholar
  11. 11.
    Lee, S., Kwon, O., Kim, J., Hong, S.: A reputation management system in structured peer-to-peer networks. In: WETICE 2005, Washington, DC, USA, pp. 362–367. IEEE Computer Society Press, Los Alamitos (2005)Google Scholar
  12. 12.
    Ravichandran, A., Yoon, J.: Trust management with delegation in grouped peer-to-peer communities. In: SACMAT 2006, pp. 71–80. ACM Press, New York (2006)CrossRefGoogle Scholar
  13. 13.
    Xiong, L., Liu, L.: Peertrust: Supporting reputation-based trust in peer-to-peer communities. IEEE Transactions on Knowledge and Data Engineering 16(7), 843–857 (2004)CrossRefGoogle Scholar
  14. 14.
    Yu, B., Singh, M., Sycara, K.: Developing trust in large-scale peer-to-peer systems. In: IEEE MAS&S2004, Philadelphia, Pennsylvania, USA, pp. 1–10 (2004)Google Scholar
  15. 15.
    Suryanarayana, G., Taylor, R.: A survey of trust management and resource discovery technologies in peer-to-peer applications. ISR Technical Report (2004)Google Scholar
  16. 16.
    Pittel, B.: On spreading a rumor. SIAM. J. Appl. Math. 47(1), 213–223 (1987)zbMATHCrossRefMathSciNetGoogle Scholar
  17. 17.
    Hughes, D., Coulson, G., Walkerdine, J.: Free riding on gnutella revisited: The bell tolls? IEEE Distributed Systems Online 6(6), 1 (2005)CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2007

Authors and Affiliations

  • Xavier Bonnaire
    • 1
  • Erika Rosas
    • 1
  1. 1.Departamento de Informática Universidad Técnica Federico Santa María - Avenida España 1680 - ValparaísoChile

Personalised recommendations