Skip to main content

Extending Trust in Peer-to-Peer Networks

  • Conference paper
Advances in Databases and Information Systems (ADBIS 2009)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 5968))

  • 685 Accesses

Abstract

This paper presents a way of reducing the risk involved with downloading corrupt content from unknown (and hence untrusted) principals in a P2P network. This paper gives a brief overview of the need for trust in P2P networks, introduces a new notion called trust*, and shows how this may be used in place of the conventional notion of trust. Finally, we apply trust* to the Turtle P2P client and show how the integrity of downloaded content can be guaranteed without assuming that trust is transitive.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 74.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 99.00
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Aberer, K., Despotovic, Z.: Managing Trust in a Peer-2-Peer Information System. In: Proceedings of the Tenth International Conference on Information and Knowledge Management, pp. 310–317 (2001)

    Google Scholar 

  2. Christianson, B., Harbison, W.S.: Why Isn’t Trust Transitive? In: Proceedings of the International Workshop on Security Protocols, pp. 171–176. Springer, Heidelberg (1997)

    Google Scholar 

  3. Clarke, S., Christianson, B., Xiao, H.: Trust*: Using Local Guarantees to Extend the Reach of Trust. In: Proceedings of the Seventeenth International Workshop on Security Protocols (April 2009) (to appear)

    Google Scholar 

  4. Douceur, J.R.: The Sybil Attack. In: Druschel, P., Kaashoek, M.F., Rowstron, A. (eds.) IPTPS 2002. LNCS, vol. 2429, p. 251. Springer, Heidelberg (2002)

    Chapter  Google Scholar 

  5. Jiang, J., Bai, H., Wang, W.: Trust and Cooperation in Peer-to-Peer Systems. In: Li, M., Sun, X.-H., Deng, Q.-n., Ni, J. (eds.) GCC 2003. LNCS, vol. 3032, pp. 371–378. Springer, Heidelberg (2004)

    Google Scholar 

  6. Jøsang, A., Gray, E., Kinateder, M.: Analysing Topologies of Transitive Trust. In: Proceedings of the Workshop of Formal Aspects of Security and Trust, pp. 9–22 (2003)

    Google Scholar 

  7. Jøsang, A., Hayward, R., Pope, S.S.: Trust Network Analysis with Subjective Logic. In: ACSC 2006: Proceedings of the 29th Australasian Computer Science Conference. Australian Computer Society, Inc. (2006)

    Google Scholar 

  8. Koutrouli, E., Tsalgatidou, A.: Reputation-Based Trust Systems for P2P Applications: Design Issues and Comparison Framework. In: Fischer-Hübner, S., Furnell, S., Lambrinoudakis, C. (eds.) TrustBus 2006. LNCS, vol. 4083, pp. 152–161. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  9. Mondal, A., Kitsuregawa, M.: Privacy, Security and Trust in P2P environments: A Perspective. In: Bressan, S., Küng, J., Wagner, R. (eds.) DEXA 2006. LNCS, vol. 4080, pp. 682–686. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  10. North, M.J., Howe, T.R., Collier, N.T., Vos, J.R.: The Repast Simphony Development Environment. In: Proceedings of the Agent 2005 Conference on Generative Social Processes, Models, and Mechanisms (2005)

    Google Scholar 

  11. Popescu, B.C., Crispo, B., Tanenbaum, A.S.: Safe and Private Data Sharing with Turtle: Friends Team-up and Beat the System. In: Christianson, B., Crispo, B., Malcolm, J.A., Roe, M. (eds.) Security Protocols 2004. LNCS, vol. 3957, pp. 213–220. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  12. Selçuk, A.A., Uzun, E., Pariente, M.R.: A Reputation-Based Trust Management System for P2P Networks. In: CCGRID, pp. 251–258. IEEE Computer Society, Los Alamitos (2004)

    Google Scholar 

  13. Wallach, D.S.: A Survey of Peer-to-Peer Security Issues. In: Okada, M., Pierce, B.C., Scedrov, A., Tokuda, H., Yonezawa, A. (eds.) ISSS 2002. LNCS, vol. 2609, pp. 42–57. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2010 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Clarke, S., Christianson, B., Xiao, H. (2010). Extending Trust in Peer-to-Peer Networks. In: Grundspenkis, J., Kirikova, M., Manolopoulos, Y., Novickis, L. (eds) Advances in Databases and Information Systems. ADBIS 2009. Lecture Notes in Computer Science, vol 5968. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-12082-4_19

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-12082-4_19

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-12081-7

  • Online ISBN: 978-3-642-12082-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics