Skip to main content

Trusted Reputation Management Service for Peer-to-Peer Collaboration

  • Conference paper
Book cover On the Move to Meaningful Internet Systems: OTM 2008 (OTM 2008)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 5332))

  • 1122 Accesses

Abstract

The open and autonomous nature of peer-to-peer (P2P) systems invites the phenomenon of widespread decoys and free-riding. Reputation systems are constructed to ensure file authenticity and stimulate collaboration. We identify the authenticity, availability and privacy issues concerning the previous reputation management schemes. We propose to add integrity control for the reputation storage/computation processing in order to enhance the authenticity of the resultant reputation values; and present an integrity model to articulate necessary mechanisms and rules for integrity protection in a P2P reputation system. We design a fully-distributed and secure reputation management scheme, Trusted Reputation Management Service (TRMS). Employing Trusted Computing and Virtual Machine Technologies, a peer’s reputation values and specific transaction records can be stored, accessed and updated in a tamper-proof way by the Trusted Reputation Agent (TRA) on the same platform, which guarantees the authenticity of reputation values. Transaction partners exchange directly with each other for reputation values, services and transaction comments with no reliance on a remote third party, ensuring the availability of reputation and peers’ privacy.

Supported by the National High Technology Research and Development Program (“863” Program) of China under grants No.2007AA010601 and No.2006AA010201.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Liang, J., Kumar, R., Ross, K.W.: Pollution in P2P File sharing systems. In: 24th Annual Joint Conference of the IEEE Computer and Communications Societies, pp. 1174–1185. IEEE Press, New York (2005)

    Google Scholar 

  2. Kalafut, A., Acharya, A., Gupta, M.: A Study of Malware in Peer-to-Peer Networks. In: 6th ACM SIGCOMM conference on Internet measurement, pp. 327–332. ACM Press, New York (2006)

    Google Scholar 

  3. Adar, E., Huberman, B.A.: Free riding on Gnutella. First Monday 5(10), 2 (2000)

    Article  Google Scholar 

  4. Saroiu, S., Gummadi, P.K., Gribble, S.D.: A Measurement Study of Peer-to-Peer File Sharing Systems. In: Kienzle, M.G., Shenoy, P.J. (eds.) MMCN 2002. SPIE Press (2002)

    Google Scholar 

  5. Yang, M., Zhang, Z., Li, X., Dai, Y.: An Empirical Study of Free-Riding Behavior in the Maze P2P File-Sharing System. In: Castro, M., van Renesse, R. (eds.) IPTPS 2005. LNCS, vol. 3640, pp. 182–192. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  6. Pouwelse, J.A., Garbacki, P., Epema, D.H.J., Sips, H.J.: The Bittorrent P2P File-Sharing System: Measurements and Analysis. In: Castro, M., van Renesse, R. (eds.) IPTPS 2005. LNCS, vol. 3640, pp. 205–216. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  7. Resnick, P., Kuwabara, K., Zeckhauser, R., Friedman, E.: Reputation Systems. Commun. ACM 43(12), 45–48 (2000)

    Article  Google Scholar 

  8. Clark, D.D., Wilson, D.R.: A Comparison of Commercial and Military Computer Security Policies. In: IEEE Symposium on Security and Privacy, pp. 184–194. IEEE Press, New York (1987)

    Google Scholar 

  9. Zhou, R., Hwang, K.: PowerTrust: A Robust and Scalable Reputation System for Trusted Peer-to-Peer Computing. IEEE Trans. Parallel Distrib. Syst. 18(4), 460–473 (2007)

    Article  Google Scholar 

  10. Houser, D., Wooders, J.: Reputation in Auctions: Theory and Evidence from eBay. Journal of Economics & Management Strategy 15(2), 353–369 (2006)

    Article  Google Scholar 

  11. Damiani, E., di Vimercati, D.C., Paraboschi, S., Samarati, P., Violante, F.: A Reputation-Based Approach for Choosing Reliable Resources in Peer-to-Peer Networks. In: 9th ACM conference on Computer and Communications Security, pp. 207–216. ACM Press, New York (2002)

    Google Scholar 

  12. Kamvar, S.D., Schlosser, M.T., Garcia-Molina, H.: The Eigentrust Algorithm for Reputation Management in P2P Networks. In: 12th International Conference on World Wide Web, pp. 640–651. ACM Press, New York (2003)

    Google Scholar 

  13. Liu, X., Xiao, L.: hiREP: Hierarchical Reputation Management for Peer-to-Peer Systems. In: International Conference on Parallel Processing, pp. 289–296. IEEE Press, Washington (2006)

    Google Scholar 

  14. Stoica, I., Morris, R., Karger, D., Kaashoek, M., Balakrishnan, H.: Chord: A Scalable Peer-to-Peer Lookup Service for Internet Applications. In: Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications, pp. 149–160. ACM Press, New York (2001)

    Google Scholar 

  15. Srivatsa, M., Xiong, L., Liu, L.: TrustGuard: Countering Vulnerabilities in Reputation Management for Decentralized Overlay Networks. In: 14th International Conference on World Wide Web, pp. 422–431. ACM Press, New York (2005)

    Chapter  Google Scholar 

  16. Zhu, B., Setia, S., Jajodia, S.: Providing Witness Anonymity in Peer-to-Peer Systems. In: 13th ACM Conference on Computer and Communications Security, pp. 6–16. ACM Press, New York (2006)

    Google Scholar 

  17. Maruyama, H., Seliger, F., Nagaratnam, N.: Trusted Platform on Demand. IBM Research Report, RT0564 (2004)

    Google Scholar 

  18. Kinateder, M., Pearson, S.: A Privacy-Enhanced Peer-to-Peer Reputation System. In: Bauknecht, K., Tjoa, A.M., Quirchmayr, G. (eds.) EC-Web 2003. LNCS, vol. 2738, pp. 206–215. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  19. Sandhu, R., Zhang, X.: Peer-to-Peer Access Control Architecture Using Trusted Computing Technology. In: 10th ACM Symposium on Access Control Models and Technologies, pp. 147–158. ACM Press, New York (2005)

    Google Scholar 

  20. Zhang, X., Chen, S., Sandhu, R.: Enhancing Data Authenticity and Integrity in P2P Systems. IEEE Internet Computing 9(6), 42–49 (2005)

    Article  Google Scholar 

  21. Trusted Computing Group, http://www.trustedcomputinggroup.org

  22. Barham, P., Dragovic, B., Fraser, K., Hand, S., Harris, T., Ho, A., Neugebauer, R., Pratt, I., Warfield, A.: Xen and the Art of Virtualization. In: ACM Symposium on Operating Systems Principles, pp. 164–177. ACM Press, New York (2003)

    Google Scholar 

  23. Goldberg, R.P.: Survey of Virtual Machine Research. IEEE Computer 7(6), 34–45 (1974)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2008 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Deng, L., He, Y., Xu, Z. (2008). Trusted Reputation Management Service for Peer-to-Peer Collaboration. In: Meersman, R., Tari, Z. (eds) On the Move to Meaningful Internet Systems: OTM 2008. OTM 2008. Lecture Notes in Computer Science, vol 5332. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-88873-4_10

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-88873-4_10

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-88872-7

  • Online ISBN: 978-3-540-88873-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics