Abstract
This paper presents a way of reducing the risk involved with downloading corrupt content from unknown (and hence untrusted) principals in a P2P network. This paper gives a brief overview of the need for trust in P2P networks, introduces a new notion called trust*, and shows how this may be used in place of the conventional notion of trust. Finally, we apply trust* to the Turtle P2P client and show how the integrity of downloaded content can be guaranteed without assuming that trust is transitive.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Aberer, K., Despotovic, Z.: Managing Trust in a Peer-2-Peer Information System. In: Proceedings of the Tenth International Conference on Information and Knowledge Management, pp. 310–317 (2001)
Christianson, B., Harbison, W.S.: Why Isn’t Trust Transitive? In: Proceedings of the International Workshop on Security Protocols, pp. 171–176. Springer, Heidelberg (1997)
Clarke, S., Christianson, B., Xiao, H.: Trust*: Using Local Guarantees to Extend the Reach of Trust. In: Proceedings of the Seventeenth International Workshop on Security Protocols (April 2009) (to appear)
Douceur, J.R.: The Sybil Attack. In: Druschel, P., Kaashoek, M.F., Rowstron, A. (eds.) IPTPS 2002. LNCS, vol. 2429, p. 251. Springer, Heidelberg (2002)
Jiang, J., Bai, H., Wang, W.: Trust and Cooperation in Peer-to-Peer Systems. In: Li, M., Sun, X.-H., Deng, Q.-n., Ni, J. (eds.) GCC 2003. LNCS, vol. 3032, pp. 371–378. Springer, Heidelberg (2004)
Jøsang, A., Gray, E., Kinateder, M.: Analysing Topologies of Transitive Trust. In: Proceedings of the Workshop of Formal Aspects of Security and Trust, pp. 9–22 (2003)
Jøsang, A., Hayward, R., Pope, S.S.: Trust Network Analysis with Subjective Logic. In: ACSC 2006: Proceedings of the 29th Australasian Computer Science Conference. Australian Computer Society, Inc. (2006)
Koutrouli, E., Tsalgatidou, A.: Reputation-Based Trust Systems for P2P Applications: Design Issues and Comparison Framework. In: Fischer-Hübner, S., Furnell, S., Lambrinoudakis, C. (eds.) TrustBus 2006. LNCS, vol. 4083, pp. 152–161. Springer, Heidelberg (2006)
Mondal, A., Kitsuregawa, M.: Privacy, Security and Trust in P2P environments: A Perspective. In: Bressan, S., Küng, J., Wagner, R. (eds.) DEXA 2006. LNCS, vol. 4080, pp. 682–686. Springer, Heidelberg (2006)
North, M.J., Howe, T.R., Collier, N.T., Vos, J.R.: The Repast Simphony Development Environment. In: Proceedings of the Agent 2005 Conference on Generative Social Processes, Models, and Mechanisms (2005)
Popescu, B.C., Crispo, B., Tanenbaum, A.S.: Safe and Private Data Sharing with Turtle: Friends Team-up and Beat the System. In: Christianson, B., Crispo, B., Malcolm, J.A., Roe, M. (eds.) Security Protocols 2004. LNCS, vol. 3957, pp. 213–220. Springer, Heidelberg (2006)
Selçuk, A.A., Uzun, E., Pariente, M.R.: A Reputation-Based Trust Management System for P2P Networks. In: CCGRID, pp. 251–258. IEEE Computer Society, Los Alamitos (2004)
Wallach, D.S.: A Survey of Peer-to-Peer Security Issues. In: Okada, M., Pierce, B.C., Scedrov, A., Tokuda, H., Yonezawa, A. (eds.) ISSS 2002. LNCS, vol. 2609, pp. 42–57. Springer, Heidelberg (2003)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2010 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Clarke, S., Christianson, B., Xiao, H. (2010). Extending Trust in Peer-to-Peer Networks. In: Grundspenkis, J., Kirikova, M., Manolopoulos, Y., Novickis, L. (eds) Advances in Databases and Information Systems. ADBIS 2009. Lecture Notes in Computer Science, vol 5968. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-12082-4_19
Download citation
DOI: https://doi.org/10.1007/978-3-642-12082-4_19
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-12081-7
Online ISBN: 978-3-642-12082-4
eBook Packages: Computer ScienceComputer Science (R0)