IPTPS '01 Revised Papers from the First International Workshop on Peer-to-Peer Systems
The Eigentrust algorithm for reputation management in P2P networks
WWW '03 Proceedings of the 12th international conference on World Wide Web
Managing and Sharing Servents' Reputations in P2P Systems
IEEE Transactions on Knowledge and Data Engineering
Understanding Trusted Computing: Will Its Benefits Outweigh Its Drawbacks?
IEEE Security and Privacy
A secure and reliable bootstrap architecture
SP '97 Proceedings of the 1997 IEEE Symposium on Security and Privacy
Spreading Activation Models for Trust Propagation
EEE '04 Proceedings of the 2004 IEEE International Conference on e-Technology, e-Commerce and e-Service (EEE'04)
Proceedings of the 11th ACM conference on Computer and communications security
Peer-to-peer access control architecture using trusted computing technology
Proceedings of the tenth ACM symposium on Access control models and technologies
Trusted P2P Transactions with Fuzzy Reputation Aggregation
IEEE Internet Computing
A Secure Trust Establishment Model
SUTC '06 Proceedings of the IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing -Vol 1 (SUTC'06) - Volume 01
Trust[ed | in] computing, signed code and the heat death of the internet
Proceedings of the 2006 ACM symposium on Applied computing
SECPERU '06 Proceedings of the Second International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing
A survey of trust in internet applications
IEEE Communications Surveys & Tutorials
Hi-index | 0.00 |
A number of P2P file sharing systems have tried to rate the level of contribution and participation of peers in order to avoid free-riding by selfish peers and increased performance and reliability of file sharing among all peers. However, the proposed software rating mechanisms (including the ones that use computational models of trust) are still flawed by the use of modified peer servent applications that bypass or trick the rating mechanism. In this paper, we propose to bind the peer servent application with the new hardware Trusted Platform Modules (TPM) that are going to be massively deployed. In doing so, it is not possible anymore to bypass or trick the computational trust and rating mechanisms associated with the peer servent application version and P2P file sharing can trustworthily use these mechanisms for increased reliability, fairness and performance. To validate our approach, we detail how the current specification of TPMs can be used in P2P file sharing to enforce trustworthy rating mechanisms.