Abstract
Over the past few years, Peer-to-Peer (P2P) networks have grown extensively and dramatically changed large-scale file transfer. One of the most popular P2P network is the BitTorrent system. BitTorrent can efficiently distribute large files by optimizing the use of network bandwidth and providing scalability. Due to the open and anonymous nature of P2P systems BitTorrent also provides an ideal environment for distribution of malicious, low quality, or doctored information. A number of reputation systems, including P2PRep with its successors XRep and X 2 Rep, had been proposed to address security weaknesses of Gnutella P2P file sharing networks. Although it has been claimed that these methods are also applicable to the other file sharing networks, it is not clear how to achieve this task. Moreover, some of the shortcomings of these reputation systems such as online-polling only and cold-start may be exploited by malicious attackers. In this paper, we propose a reputation system, called X 2BT Rep, which is an extension of the X 2 Rep and for BitTorrent network. We show that the proposed system improves the security and the quality of information distributed over P2P networks.
Keywords
- P2P
- Reputation System
- XRep
- X2Rep
- X2BTRep
This is a preview of subscription content, access via your institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Aberer, K., Despotovic, Z.: Managing trust in a peer-2-peer information system. Technical report (2001)
Adar, E., Huberman, B.: Free-riding on gnutella. First Monday 5(10) (October 2000)
Bhat, V.V.: Reputation management in peer-to-peer systems. Technical report, Department of Computer Sciences, University of Texas at Austin (December 2004), available at: http://www.cs.utexas.edu/vishwas/documents/Reputation.pdf
Client, A.-J.B.: Available at: http://azureus.sourceforge.net/
Cohen, B.: Incentives build robustness in bittorrent. In: Workshop on Economics of Peer-to-Peer Systems, Berkeley, CA, USA (May 2003)
Curtis, N., Safavi-Naini, R., Susilo, W.: \(\textrm{X}^\textrm{2}\)rep: Enhanced trust semantics for the xrep protocol. In: Jakobsson, M., Yung, M., Zhou, J. (eds.) ACNS 2004. LNCS, vol. 3089, pp. 205–219. Springer, Heidelberg (2004)
Damiani, E., di Vimercati, S.D.C., Paraboschi, S., Samarati, P., Violante, F.: A reputation-based approach for choosing reliable resources in peer-to-peer networks. In: Proceedings of the 9th ACM conference on Computer and Communications Security, November 2002, pp. 207–216 (2002)
Dellarocas, C.: Immunizing outline reputation reporting system against unfair rating and discriminatory behavior. In: 2nd ACM Conference on Electronic Commerce, pp. 150–157 (2000)
Dellarocas, C.: The digitization of word-of-mouth: Promise and challenges of online feedback mechanisms. Management Science 49(10), 1407–1424 (2003)
eDonkey protocol description. [Online] http://kent.dl.sourceforge.net/pdonkey/eDonkey-protocol-0.6.2.html
Eubanks, N.D.: Bittorrent: Digital river of the hacker culture. School of Information and Library Science, University of North Carolina at Chapel Hill (April 2005)
Izal, M., Urvoy-Keller, G., Biersack, E.W., Felber, P.A., Amra, A.A., Garces-Erice, L.: Dissecting bittorrent: five months in a torrent’s lifetime. In: Barakat, C., Pratt, I. (eds.) PAM 2004. LNCS, vol. 3015, pp. 1–11. Springer, Heidelberg (2004)
Karagiannis, T., Broido, A., Brownlee, N., Claffy, K., Faloutsos, M.: Is p2p dying or just hiding? In: Globecom 2004, Dallas, TX (November/December 2004)
Kong, J.: Formal notations of anonymity for peer-to-peer networks. Technical report, UCLA Computer Science Technical Report CSD-TR050016 (May 2005)
Lemos, R.: Bittorrent servers under attack, http://news.com.com/BitTorrent+servers+under+attack/2100-7349_3-5473754.html?part=rss&tag=5473754&subj=news.7349.5
K. media desktop. [Online] available at: http://www.kazaa.com/
Mennecke, T.: Bittorrent remains powerhouse network. Slyck News (January 31, 2005)
Napster.: [Online] available at: http://www.Napster.com/
Oram, A.: Peer-to-Peer: Harnessing the Power of Disruptive Technologies. O’Reilly & Associates Inc., Sebastopol (2001)
Parker, A.: The true picture of peer-to-peer filesharing. (2004) [Online] available at: http://www.cachelogic.com
Pasick, A.: Livewire - file-sharing network thrives beneath the radar. Yahoo Technology News, available at: http://in.tech.yahoo.com/041103/137/2ho4i.html
Patterson, J.O.: A matter of trust: Reputation management in peer-to-peer networks. Technical report (2003), available at: http://csci.mrs.umn.edu/Personal/pub/Patterson/SeminarIIPaperDevelopment/sem2_draft.doc
Pouwelse, J., Garbacki, P., Epema, D., Sips, H.: A measurement study of the bittorrent peer-to-peer file-sharing system. Elsevier Science, Amsterdam (2004)
G. protocol development. [Online] available at: http://rfc-gnutella.sf.net/
Qiu, D., Shrikant, R.: Modeling and performance analysis of bittorrent-like peer-to-peer networks. In: SIGCOMM (September 2004)
Resnick, P., Zeckhauser, R., Friedman, E., Kuwabara, K.: Reputation systems: Facilitating trust in internet interactions. Communications of the ACM 43(12) (2000)
O.B. website. [Online] available at: http://www.BitTorrent.com/
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2006 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Yu, L., Susilo, W., Safavi-Naini, R. (2006). X2BT Trusted Reputation System: A Robust Mechanism for P2P Networks. In: Pointcheval, D., Mu, Y., Chen, K. (eds) Cryptology and Network Security. CANS 2006. Lecture Notes in Computer Science, vol 4301. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11935070_26
Download citation
DOI: https://doi.org/10.1007/11935070_26
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-49462-1
Online ISBN: 978-3-540-49463-8
eBook Packages: Computer ScienceComputer Science (R0)
