Skip to main content

Evaluation of P2P Search Algorithms for Discovering Trust Paths

  • Conference paper
Formal Methods and Stochastic Models for Performance Evaluation (EPEW 2007)

Part of the book series: Lecture Notes in Computer Science ((LNPSE,volume 4748))

Included in the following conference series:

Abstract

Distributed security models based on a ‘web of trust’ eliminate single points of failure and alleviate performance bottlenecks. However, such distributed approaches rely on the ability to find trust paths between participants, which introduces performance overhead. It is therefore of importance to develop trust path discovery algorithms that minimize such overhead. Since peer-to-peer (P2P) networks share various characteristics with the web of trust, P2P search algorithms can potentially be exploited to find trust paths. In this paper we systematically evaluate the application of P2P search algorithms to the trust path discovery problem. We consider the number of iterations required (as expressed by the TTL parameter) as well as the messaging overhead, for discovery of single as well as multiple trust paths. Since trust path discovery does not allow for resource replication (usual in P2P applications), we observe that trust path discovery is very sensitive to parameter choices in selective forwarding algorithms (such as K-walker), but is relatively fast when the underlying network topology is scale-free.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Patil, V., Shyamasundar, R.: Trust management for e-transactions. Sadhana 30(2- 3), 141–158 (2005)

    Article  MATH  MathSciNet  Google Scholar 

  2. Housley, R., Polk, W., Ford, W., Solo, D.: Internet X. 509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile. IETF RFC 3280 (April 2002)

    Google Scholar 

  3. Zimmerman, P.: PGP User’s Guide. Massachusetts Institute of Technology (May 1994)

    Google Scholar 

  4. Ellison, C.M., Frantz, B., Lampson, B., Rivest, R., Thomas, B.M., Ylonen, T.: SPKI Certificate Theory. Internet Engineering Task Force RFC 2693 (September 1999)

    Google Scholar 

  5. Rivest, R.L., Lampson, B.: SDSI – A simple distributed security infrastructure. In: Koblitz, N. (ed.) CRYPTO 1996. LNCS, vol. 1109, Springer, Heidelberg (1996)

    Google Scholar 

  6. Jøsang, A., Keser, C., Dimitrakos, T.: Can we manage trust? In: Herrmann, P., Issarny, V., Shiu, S.C.K. (eds.) iTrust 2005. LNCS, vol. 3477, pp. 93–107. Springer, Heidelberg (2005)

    Google Scholar 

  7. Skogsrud, H., Benatallah, B., Casati, F.: Model-driven trust negotiation for web services. In: IEEE Internet Computing, pp. 45–52. IEEE Computer Society Press, Los Alamitos (2003)

    Google Scholar 

  8. Spantzel, A.B., Squicciarini, A.C., Bertino, E.: Integrating federated identity management and trust negotiation. Technical Report 2005-46, CERIAS – Purdue University (2005)

    Google Scholar 

  9. Winslett, M., Yu, T., Seamons, K.E., Hess, A., Jacobson, J., Jarvis, R., Smith, B., Yu, L.: Negotiating trust on the web. In: IEEE Internet Computing. 6(6), pp. 30–37. IEEE Computer Society Press, Los Alamitos (2002)

    Google Scholar 

  10. Atif, Y.: Building trust in E-commerce. IEEE Internet Computing 6(1), 18–24 (2002)

    Article  Google Scholar 

  11. de Mello, E.R., da Silva Fraga, J., Santin, A.O.: O uso do spki/sdsi em redes p2p. In: I Workshop sobre Redes Peer-to-Peer (WP2P 2005), Fortaleza, CE - Brasil, XXIII Simpósio Brasileiro de Redes de Computadores (SBRC 2005) (2005)

    Google Scholar 

  12. Santin, A.O., da Silva Fraga, J., Siqueira, F., de Mello, E.R.: Federation web: A scheme to compound authorization chains on large-scale distributed systems. In: 22nd Symposium on Reliable Distributed Systems (SRDS 2003), Florence - Italy (2003)

    Google Scholar 

  13. Gkantsidis, C., Mihail, M., Saberi, A.: Random walks in peer-to-peer networks. In: INFOCOM (2004)

    Google Scholar 

  14. Lv, Q., Cao, P., Cohen, E., Li, K., Shenker, S.: Search and replication in unstructured peer-to-peer networks. In: Proceedings of the 16th international conference on Supercomputing, pp. 84–95 (2002)

    Google Scholar 

  15. Zhuang, Z., Liu, Y., Xiao, L., Ni, L.M.: Hybrid periodical flooding in unstructured peer-to-peer networks. In: ICPP, pp. 171–178. IEEE Computer Society Press, Los Alamitos (2003)

    Google Scholar 

  16. Penning, H.P.: Analysis of the strong set in the pgp web of trust (2006), http://www.cs.uu.nl/people/henkp/henkp/pgp/pathfinder/plot/

  17. Burrows, M., Abadi, M., Needham, R.: A logic of authentication. ACM Trans. on Computer Sys. 8(1), 18 (1990)

    Article  Google Scholar 

  18. Jøsang, A., Pope, S.: Semantic Constraints for Trust Transitivity. In: Research and Practice in Information Technology, vol. 43, ACS, Newcastle, Australia (2005)

    Google Scholar 

  19. Gnutella: The Gnutella Protocol Specification v0.4. Clip2 (2001)

    Google Scholar 

  20. Rowstron, A., Druschel, P.: Pastry: scalable, decentraized object location and routing for large-scale peer-to-peer systems. In: Proceedings of the 18th IFIP/ACM International Conference on Distributed Systems Platforms (Middleware) (November 2001)

    Google Scholar 

  21. Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Trans. Netw 11(1), 17–32 (2003)

    Article  Google Scholar 

  22. Chawathe, Y., Ratnasamy, S., Breslau, L., Lanham, N., Shenker, S.: Making gnutella-like P2P systems scalable. In: Proceedings of the ACM SIGCOMM 2003 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication, pp. 407–418. ACM Press, New York (2003)

    Chapter  Google Scholar 

  23. Jiang, H., Jin, S.: Exploiting dynamic querying like flooding techniques in unstructured peer-to-peer networks. In: ICNP, pp. 122–131. IEEE Computer Society Press, Los Alamitos (2005)

    Google Scholar 

  24. Yang, B., Garcia-Molina, H.: Improving search in peer-to-peer networks. In: ICDCS, pp. 5–14 (2002)

    Google Scholar 

  25. Kazaa media desktop (2001), http://www.kazaa.com

  26. Albert, R., Barabási, A.L.: Statistical mechanics of complex networks. Reviews of Modern Physics 74, 47 (2002)

    Article  MathSciNet  Google Scholar 

  27. Milgram, S.: The small world problem. Psychology Today 1, 61 (1967)

    Google Scholar 

  28. Capkun, S., Buttyan, L., Hubaux, J.P.: Small worlds in security systems: an analysis of the PGP certificate graph. In: Proceedings of the 2002 New Security Paradigms Workshop, September 2002, pp. 28–35 (2002)

    Google Scholar 

  29. Gnumap project (2002), http://home.comcast.net/~gregory.bray

  30. Peersim p2p simulator (2004), http://peersim.sourceforge.net

  31. Jesi, G.P.: Peersim howto: Build a new protocol for the peersim 1.0 simulator (December 2005)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Katinka Wolter

Rights and permissions

Reprints and permissions

Copyright information

© 2007 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

de Mello, E.R., van Moorsel, A., da Silva Fraga, J. (2007). Evaluation of P2P Search Algorithms for Discovering Trust Paths. In: Wolter, K. (eds) Formal Methods and Stochastic Models for Performance Evaluation. EPEW 2007. Lecture Notes in Computer Science, vol 4748. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-75211-0_9

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-75211-0_9

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-75210-3

  • Online ISBN: 978-3-540-75211-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics