Advertisement

A Secure and Efficient Searching Scheme for Trusted Nodes in a Peer-to-Peer Network

  • Jaydip Sen
Part of the Lecture Notes in Computer Science book series (LNCS, volume 6694)

Abstract

The existing search mechanisms for peer-to-peer (P2P) networks have several problems such as fake content distribution, free riding, white-washing and poor search scalability. Although, researchers have proposed several trust management and semantic community-based mechanisms for combating free riding and distribution of malicious contents, most of these schemes lack scalability due to their high computational, communication and storage overhead. This paper presents a trust management scheme for P2P networks that utilizes topology adaptation by constructing an overlay of trusted peers where the neighbors are selected based on their trust ratings and content similarities. It also increases the search efficiency by taking advantage of the implicit semantic community structures formed as a result of topology adaptation since most of the queries are resolved within the community of trustworthy peers. Simulation results demonstrate that the proposed scheme provides efficient searching to good peers while penalizing the malicious peers by increasing their search times.

Keywords

P2P network topology adaptation trust management semantic community malicious peer 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Risson, J., Moors, T.: Survey of Research Towards Robust Peer-to-Peer Networks. Computer Networks 50(7), 3485–3521 (2006)CrossRefzbMATHGoogle Scholar
  2. 2.
    Schafer, J., Malinks, K., Hanacek, P.: Peer-to-Peer Networks Security. In: Proc. of the 3rd Int. Conf. on Internet Monitoring and Protection (ICIMP), pp. 74–79 (2008)Google Scholar
  3. 3.
    de Mello, E.R., van Moorsel, A., da Silva Fraga, J.: Evaluation of P2P Search Algorithms for Discovering Trust Paths. In: Wolter, K. (ed.) EPEW 2007. LNCS, vol. 4748, pp. 112–124. Springer, Heidelberg (2007)CrossRefGoogle Scholar
  4. 4.
    Li, X., Wang, J.: A Global Trust Model of P2P Network Based on Distance-Weighted Recommendation. In: Proc. of IEEE Int. Conf. of Networking, Architecture and Storage, pp. 281–284 (2009)Google Scholar
  5. 5.
    Condie, T., Kamvar, S.D., Garcia-Molina, H.: Adaptive Peer-to-Peer Topologies. In: Proc. of the 4th Int. Conf. on Peer-to-Peer Computing (P2P 2004), pp. 53–62 (2004)Google Scholar
  6. 6.
    Tain, H., Zou, S., Wang, W., Cheng, S.: Constructing Efficient Peer-to-Peer Overlay Topologies by Adaptive Connection Establishment. Computer Communication 29(17), 3567–3579 (2006)CrossRefGoogle Scholar
  7. 7.
    Crespo, A., Garcia-Molina, H.: Semantic Overlay Networks for P2P Systems. Technical Report, Stanford University (2002)Google Scholar
  8. 8.
    Schlosser, M.T., Condie, T.E., Kamvar, S.D., Kamvar, A.D.: Simulating a P2P File-Sharing Network. In: Proc. of the 1st Workshop on Semantics in P2P and Grid Computing (2002)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2011

Authors and Affiliations

  • Jaydip Sen
    • 1
  1. 1.TCS Innovation LabsTata Consultancy Services Ltd., Bengal Intelligent ParkKolkataIndia

Personalised recommendations