Skip to main content
Log in

WTR: A Reputation Metric for Distributed Hash Tables Based on a Risk and Credibility Factor

  • Regular Paper
  • Published:
Journal of Computer Science and Technology Aims and scope Submit manuscript

Abstract

The growing number of popular peer to peer applications during the last five years has implied for researchers to focus on how to build trust in such very large scale distributed systems. Reputation systems have shown to be a very good solution to build trust in presence of malicious nodes. We propose in this paper a new metric for reputation systems on top of a Distributed Hash Table that uses a notion of risk to make the applications aware of certain behaviours of malicious nodes. We show that our metric is able to significantly reduce the number of malicious transactions, and that it also provides very strong resistance to several traditional attacks of reputations systems. We also show that our solution can easily scale, and can be adapted to various Distributed Hash Tables.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Similar content being viewed by others

References

  1. Lua E K, Crowcroft J, Pias M, Sharma R, Lim S. A survey and comparison of peer-to-peer overlay network schemes. IEEE Communications Surveys & Tutorials, 2005, 7: 72–93.

    Google Scholar 

  2. Zhao B, Kubiatowicz J, Joseph A. Tapestry: An infrastructure for fault-tolerant wide-area location and routing. Technical Report UCB/CSD-01-1141, UC Berkeley, April 2001.

  3. Stoica I, Morris R, Karger D, Kaashoek M, Balakrishnan H. Chord: A scalable peer-to-peer lookup service for Internet applications. In Proc. the 2001 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications (SIGCOMM2001), New York, USA, ACM Press, Aug. 27–31, 2001, pp.149–160.

  4. Antony I T Rowstron, Peter Druschel. Pastry: Scalable, decentralized object location, and routing for large-scale peer-to-peer systems. In Proc. the IFIP/ACM International Conference on Distributed Systems Platforms Heidelberg (Middleware 2001), London, UK, LNCS 2218, Springer-Verlag, November 12–16, 2001, pp.329–350.

  5. Douceur J. The sybil attack. In Proc. the First International Workshop on Peer-to-Peer Systems (IPTPS 2002), Cambridge, USA, LNCS 2429, Springer-Verlag, March 1–8, 2002, pp.251–260.

  6. Dewan P, Dasgupta P. Pride: Peer-to-peer reputation infrastructure for decentralized environments. In Proc. the 13th International World Wide Web Conference on Alternate Track Papers & Posters (WWW Alt. 2004), New York, USA, ACM Press, May 17–20, 2004, pp.480–481.

  7. Singh A, Liu L. TrustMe: Anonymous management of trust relationships in decentralized P2P. In Proc. the IEEE International Conference on Peer-to-Peer Computing (P2P 2003), Washington DC, USA, September 1–3, 2003, p.142.

  8. Xiong L, Liu L. PeerTrust: Supporting reputation-based trust for peer-to-peer electronic communities. IEEE Transactions on Knowledge and Data Engineering, 2004, 16(7): 843–857.

    Article  Google Scholar 

  9. Srivatsa M, Xiong L, Liu L. TrustGuard: Countering vulnerabilities in reputation management for decentralized overlay networks. In Proc. the 14th International Conference on World Wide Web (WWW2005), New York, USA, ACM Press, May 10–14, 2005, pp.422–431.

  10. Zhou R, Hwang F K. PowerTrust: A robust and scalable seputation system for trusted peer-to-peer computing. IEEE Transactions on Parallel and Distributed Systems, April 2007, 18(4): 460–473.

    Article  Google Scholar 

  11. Liang Z, Shi W. PET: A personalized trust model with reputation and risk evaluation for P2P resource sharing. In Proc. the 38th Annual Hawaii International Conference on System Sciences (HICSS 2005), Washington DC, USA, IEEE Computer Society, January 3{6, 2005, p.201.2.

  12. Bonnaire X, Rosas E. A critical analysis of latest advances in building trusted P2P networks using reputation systems. In the 8th International Conference on Web Information Systems Engineering (WISE 2007 Workshops), Nancy, France, LNCS 4832, Springer-Verlag, December 3–6, 2007, pp.130–141.

  13. Fedotova N, Bertucci M, Veltri L. Reputation management techniques in DHT-based peer-to-peer networks. In Proc. the Second International Conference on Internet and Web Applications and Services (ICIW 2007), Los Alamitos, USA, IEEE Computer Society, Sept. 16–19, 2007, p.4.

  14. Suryanarayana G, Taylor R. A survey of trust management and resource discovery technologies in peer-to-peer applications. ISR Technical Report UCI-ISR-04-6, University of California, Irvine, USA, 2004.

  15. Schlosser A, Voss M, Brückner L. On the simulation of global reputation systems. Journal of Arti¯cial Societies and Social Simulation, January 2005, 9(1): 4.

  16. Yu B, Singh M, Sycara K. Developing trust in large-scale peer-to-peer systems. In Proc. the IEEE First Symposium on Multi-Agent Security and Survivability (MAS&S 2004), Philadelphia, USA, August 30–31, 2004, pp.1–10.

  17. Kamvar S D, Schlosser M T, Garcia-Molina H. The Eigen-Trust algorithm for reputation management in P2P networks. In Proc. the 12th International Conference on World Wide Web, New York, USA, ACM Press, May 20–24, 2003, pp.640–651.

  18. Aberer K, Despotovic Z. Managing trust in a peer-2-peer information system. In Proc. the 10th Int. Conf. Information and Knowledge Management (CIKM2001), New York, USA, ACM Press, Nov. 5–10, 2001, pp.310–317.

  19. Lee S Y, Kwon O-H, Kim J, Hong S J. A reputation management system in structured peer-to-peer networks. In Proc. the 14th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprise (WETICE2005), Washington, DC, USA, IEEE Computer Society, June 13–15, 2005, pp.362–367.

  20. Damiani E, di Vimercati De C, Paraboschi S, Samarati P, Violante F. A reputation-based approach for choosing reliable resources in peer-to-peer networks. In Proc. the 9 th ACM Conference on Computer and Communications Security (CCS 2002), New York, USA, ACM Press, Nov. 18–22, 2002, pp.207–216.

  21. Mirkovic J, Martin J, Reiher P. A taxonomy of DDoS attacks and DDoS defense mechanisms. ACM SIGCOMM Computer Communication Review, 2004, 34: 39–53.

    Article  Google Scholar 

  22. Stallings W. SHA: The secure hash algorithm. Dr. Dobb's Journal of Software Tools, Apr. 1994, 19(4): 32–34.

    Google Scholar 

  23. Handschuh H. SHA Family (Secure Hash Algorithm). Encyclopedia of Cryptography and Security, Henk C A van Tilborg (ed.), Springer, 2005.

  24. Bonnaire X, Marin O. Recursive replication: A survival solution for structured P2P information systems to denial of service attacks. In Proc. the 1st International Workshop on Peer to Peer Networks (PPN2007), Vilamoura, Portugal, LNCS 4806, Springer-Verlag, Nov. 25–30, 2007, pp.931–940.

  25. Rosas E, Bonnaire X. From hazardous behaviours to a risk metric for reputation systems in peer to peer networks. In Proc. the First International Conference on Reputation: Theory and Technology (ICORE 2009), Paolucci M (ed.), Gargonza, Italy, March 18–20, 2009, pp.173–185.

  26. Maymounkov P, Maziµeres D. Kademlia: A peer-to-peer information system based on the XOR metric. In the First International Workshop on Peer-to-Peer Systems (IPTPS 2002), Peter Druschel, M Frans Kaashoek, Antony I T Rowstron (eds.), Cambridge, USA, LNCS 2429, Springer-Verlag, March 7–8, 2002, pp.53–65.

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Xavier Bonnaire.

Additional information

This work has been supported by an INRIA/CONICYT French-Chilean cooperation project under Grant No. INRIA0703.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Bonnaire, X., Rosas, E. WTR: A Reputation Metric for Distributed Hash Tables Based on a Risk and Credibility Factor. J. Comput. Sci. Technol. 24, 844–854 (2009). https://doi.org/10.1007/s11390-009-9276-6

Download citation

  • Revised:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11390-009-9276-6

Keywords

Navigation