Abstract
Studies on the large scale peer-to-peer (P2P) network like Gnutella have shown the presence of large number of free riders. Moreover, the open and decentralized nature of P2P network is exploited by malicious users who distribute unauthentic or harmful contents. Despite the existence of a number of trust management schemes for combating against free riding and distribution of malicious files, these mechanisms are not scalable due to their high computational, communication and storage overhead. Moreover they do not consider the quality- of-service (QoS) of the search. This paper presents a trust management scheme for P2P networks that utilizes topology adaptation to minimize distribution of spurious files. It also reduces search time since most of the queries are resolved within the community of trustworthy peers. Simulation results demonstrate that the proposed scheme provides efficient searching to good peers while penalizing the malicious peers by increasing their search times as the network topology stabilizes. The mechanism is also found to be robust even in presence of a large percentage of malicious peers.
Chapter PDF
Similar content being viewed by others
References
Risson, J., Moors, T.: Survey of Research Towards Robust Peer-to-Peer Networks. Computer Networks 50(7), 3485–3521 (2006)
Stoica, I., Morris, R., Karger, D., Kaashoek, M.F., Balakrishnan, H.: Chord: A Scalable Peer-to-Peer Lookup Service for Internet Application. In: Proc. of ACM SIGCOMM (2001)
Schafer, J., Malinks, K., Hanacek, P.: Peer-to-Peer Networks Security. In: Proc. of the 3rd Int. Conf. on Internet Monitoring and Protection (ICIMP), pp. 74–79 (2008)
Abdul-Rahman, A., Hailes, S.: A Distributed Trust Model. In: Proc. of the Workshop on New Security Paradigms, pp. 48–60 (1997)
Guo, L., Yang, S., Guo, L., Shen, K., Lu, W.: Trust-Aware Adaptive P2P Overlay Topology Based on Super-Peer-Partition. In: Proc. of the 6th Int. Conf. on Grid and Cooperative Computing, pp. 117–124 (2007)
Condie, T., Kamvar, S.D., Garcia-Molina, H.: Adaptive Peer-to-Peer Topologies. In: Proc. of the 4th Int. Conf. on Peer-to-Peer Computing (P2P 2004), pp. 53–62 (2004)
Tain, H., Zou, S., Wang, W., Cheng, S.: Constructing Efficient Peer-to-Peer Overlay Topologies by Adaptive Connection Establishment. Computer Communication 29(17), 3567–3579 (2006)
Zhuge, H., Chen, X., Sun, X.: Preferential Walk: Towards Efficient and Scalable Search in Unstructured Peer-to-Peer Networks. In: Proc. of the 14th Int. Conf. on World Wide Web (WWW 2005), Poster Session, pp. 882–883 (2005)
Adar, E., Huberman, B.A.: Free Riding on Gnutella. First Monday 5(10) (2000)
Tang, Y., Wang, H., Dou, W.: Trust Based Incentive in P2P Network. In: Proc. of the IEEE Int. Conf. on E-Commerce Technology for Dynamic E-Business, pp. 302–305 (2004)
De Mello, E.R., Moorsel, A.V., Fraga, J.D.S.: Evaluation of P2P Search Algorithms for Discovering Trust Paths. In: Wolter, K. (ed.) EPEW 2007. LNCS, vol. 4748, pp. 112–124. Springer, Heidelberg (2007)
Li, X., Wang, J.: A global Trust Model of P2P Network Based on Distance-Weighted Recommendation. In: Proc. of IEEE Int. Conf. of Networking, Architecture, and Storage, pp. 281–284 (2009)
Crespo, A., Garcia-Molina, H.: Semantic Overlay Networks for P2P Systems. Technical Report, Stanford University (2002)
Schlosser, M.T., Condie, T.E., Kamvar, S.D., Kamvar, A.D.: Simulating a P2P File-Sharing Network. In: Proc. of the 1st Workshop on Semantics in P2P and Grid Computing (2002)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2010 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Sen, J. (2010). A Trust-Based Robust and Efficient Searching Scheme for Peer-to-Peer Networks. In: Soriano, M., Qing, S., López, J. (eds) Information and Communications Security. ICICS 2010. Lecture Notes in Computer Science, vol 6476. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-17650-0_7
Download citation
DOI: https://doi.org/10.1007/978-3-642-17650-0_7
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-17649-4
Online ISBN: 978-3-642-17650-0
eBook Packages: Computer ScienceComputer Science (R0)