Skip to main content

X2BT Trusted Reputation System: A Robust Mechanism for P2P Networks

  • Conference paper

Part of the Lecture Notes in Computer Science book series (LNSC,volume 4301)

Abstract

Over the past few years, Peer-to-Peer (P2P) networks have grown extensively and dramatically changed large-scale file transfer. One of the most popular P2P network is the BitTorrent system. BitTorrent can efficiently distribute large files by optimizing the use of network bandwidth and providing scalability. Due to the open and anonymous nature of P2P systems BitTorrent also provides an ideal environment for distribution of malicious, low quality, or doctored information. A number of reputation systems, including P2PRep with its successors XRep and X 2 Rep, had been proposed to address security weaknesses of Gnutella P2P file sharing networks. Although it has been claimed that these methods are also applicable to the other file sharing networks, it is not clear how to achieve this task. Moreover, some of the shortcomings of these reputation systems such as online-polling only and cold-start may be exploited by malicious attackers. In this paper, we propose a reputation system, called X 2BT Rep, which is an extension of the X 2 Rep and for BitTorrent network. We show that the proposed system improves the security and the quality of information distributed over P2P networks.

Keywords

  • P2P
  • Reputation System
  • XRep
  • X2Rep
  • X2BTRep

This is a preview of subscription content, access via your institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (Canada)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (Canada)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (Canada)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Aberer, K., Despotovic, Z.: Managing trust in a peer-2-peer information system. Technical report (2001)

    Google Scholar 

  2. Adar, E., Huberman, B.: Free-riding on gnutella. First Monday 5(10) (October 2000)

    Google Scholar 

  3. Bhat, V.V.: Reputation management in peer-to-peer systems. Technical report, Department of Computer Sciences, University of Texas at Austin (December 2004), available at: http://www.cs.utexas.edu/vishwas/documents/Reputation.pdf

  4. Client, A.-J.B.: Available at: http://azureus.sourceforge.net/

  5. Cohen, B.: Incentives build robustness in bittorrent. In: Workshop on Economics of Peer-to-Peer Systems, Berkeley, CA, USA (May 2003)

    Google Scholar 

  6. Curtis, N., Safavi-Naini, R., Susilo, W.: \(\textrm{X}^\textrm{2}\)rep: Enhanced trust semantics for the xrep protocol. In: Jakobsson, M., Yung, M., Zhou, J. (eds.) ACNS 2004. LNCS, vol. 3089, pp. 205–219. Springer, Heidelberg (2004)

    CrossRef  Google Scholar 

  7. Damiani, E., di Vimercati, S.D.C., Paraboschi, S., Samarati, P., Violante, F.: A reputation-based approach for choosing reliable resources in peer-to-peer networks. In: Proceedings of the 9th ACM conference on Computer and Communications Security, November 2002, pp. 207–216 (2002)

    Google Scholar 

  8. Dellarocas, C.: Immunizing outline reputation reporting system against unfair rating and discriminatory behavior. In: 2nd ACM Conference on Electronic Commerce, pp. 150–157 (2000)

    Google Scholar 

  9. Dellarocas, C.: The digitization of word-of-mouth: Promise and challenges of online feedback mechanisms. Management Science 49(10), 1407–1424 (2003)

    CrossRef  Google Scholar 

  10. eDonkey protocol description. [Online] http://kent.dl.sourceforge.net/pdonkey/eDonkey-protocol-0.6.2.html

  11. Eubanks, N.D.: Bittorrent: Digital river of the hacker culture. School of Information and Library Science, University of North Carolina at Chapel Hill (April 2005)

    Google Scholar 

  12. Izal, M., Urvoy-Keller, G., Biersack, E.W., Felber, P.A., Amra, A.A., Garces-Erice, L.: Dissecting bittorrent: five months in a torrent’s lifetime. In: Barakat, C., Pratt, I. (eds.) PAM 2004. LNCS, vol. 3015, pp. 1–11. Springer, Heidelberg (2004)

    CrossRef  Google Scholar 

  13. Karagiannis, T., Broido, A., Brownlee, N., Claffy, K., Faloutsos, M.: Is p2p dying or just hiding? In: Globecom 2004, Dallas, TX (November/December 2004)

    Google Scholar 

  14. Kong, J.: Formal notations of anonymity for peer-to-peer networks. Technical report, UCLA Computer Science Technical Report CSD-TR050016 (May 2005)

    Google Scholar 

  15. Lemos, R.: Bittorrent servers under attack, http://news.com.com/BitTorrent+servers+under+attack/2100-7349_3-5473754.html?part=rss&tag=5473754&subj=news.7349.5

  16. K. media desktop. [Online] available at: http://www.kazaa.com/

  17. Mennecke, T.: Bittorrent remains powerhouse network. Slyck News (January 31, 2005)

    Google Scholar 

  18. Napster.: [Online] available at: http://www.Napster.com/

  19. Oram, A.: Peer-to-Peer: Harnessing the Power of Disruptive Technologies. O’Reilly & Associates Inc., Sebastopol (2001)

    Google Scholar 

  20. Parker, A.: The true picture of peer-to-peer filesharing. (2004) [Online] available at: http://www.cachelogic.com

    Google Scholar 

  21. Pasick, A.: Livewire - file-sharing network thrives beneath the radar. Yahoo Technology News, available at: http://in.tech.yahoo.com/041103/137/2ho4i.html

  22. Patterson, J.O.: A matter of trust: Reputation management in peer-to-peer networks. Technical report (2003), available at: http://csci.mrs.umn.edu/Personal/pub/Patterson/SeminarIIPaperDevelopment/sem2_draft.doc

  23. Pouwelse, J., Garbacki, P., Epema, D., Sips, H.: A measurement study of the bittorrent peer-to-peer file-sharing system. Elsevier Science, Amsterdam (2004)

    Google Scholar 

  24. G. protocol development. [Online] available at: http://rfc-gnutella.sf.net/

  25. Qiu, D., Shrikant, R.: Modeling and performance analysis of bittorrent-like peer-to-peer networks. In: SIGCOMM (September 2004)

    Google Scholar 

  26. Resnick, P., Zeckhauser, R., Friedman, E., Kuwabara, K.: Reputation systems: Facilitating trust in internet interactions. Communications of the ACM 43(12) (2000)

    Google Scholar 

  27. O.B. website. [Online] available at: http://www.BitTorrent.com/

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and Permissions

Copyright information

© 2006 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Yu, L., Susilo, W., Safavi-Naini, R. (2006). X2BT Trusted Reputation System: A Robust Mechanism for P2P Networks. In: Pointcheval, D., Mu, Y., Chen, K. (eds) Cryptology and Network Security. CANS 2006. Lecture Notes in Computer Science, vol 4301. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11935070_26

Download citation

  • DOI: https://doi.org/10.1007/11935070_26

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-49462-1

  • Online ISBN: 978-3-540-49463-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics