A scalable content-addressable network
Proceedings of the 2001 conference on Applications, technologies, architectures, and protocols for computer communications
A reputation-based approach for choosing reliable resources in peer-to-peer networks
Proceedings of the 9th ACM conference on Computer and communications security
Chord: a scalable peer-to-peer lookup protocol for internet applications
IEEE/ACM Transactions on Networking (TON)
Kademlia: A Peer-to-Peer Information System Based on the XOR Metric
IPTPS '01 Revised Papers from the First International Workshop on Peer-to-Peer Systems
Pastry: Scalable, Decentralized Object Location, and Routing for Large-Scale Peer-to-Peer Systems
Middleware '01 Proceedings of the IFIP/ACM International Conference on Distributed Systems Platforms Heidelberg
The Eigentrust algorithm for reputation management in P2P networks
WWW '03 Proceedings of the 12th international conference on World Wide Web
Efficient Multicast Packet Authentication Using Signature Amortization
SP '02 Proceedings of the 2002 IEEE Symposium on Security and Privacy
PeerTrust: Supporting Reputation-Based Trust for Peer-to-Peer Electronic Communities
IEEE Transactions on Knowledge and Data Engineering
Content availability, pollution and poisoning in file sharing peer-to-peer networks
Proceedings of the 6th ACM conference on Electronic commerce
Fluid modeling of pollution proliferation in P2P networks
SIGMETRICS '06/Performance '06 Proceedings of the joint international conference on Measurement and modeling of computer systems
SybilGuard: defending against sybil attacks via social networks
Proceedings of the 2006 conference on Applications, technologies, architectures, and protocols for computer communications
Fighting pollution dissemination in peer-to-peer networks
Proceedings of the 2007 ACM symposium on Applied computing
Experience with an object reputation system for peer-to-peer filesharing
NSDI'06 Proceedings of the 3rd conference on Networked Systems Design & Implementation - Volume 3
Reputation Systems for Fighting Pollution in Peer-to-Peer File Sharing Systems
P2P '07 Proceedings of the Seventh IEEE International Conference on Peer-to-Peer Computing
Ensuring content integrity for untrusted peer-to-peer content distribution networks
NSDI'07 Proceedings of the 4th USENIX conference on Networked systems design & implementation
Research on the immune strategy for the polluted file propagation in structured P2P networks
Computers and Electrical Engineering
Hi-index | 0.00 |
Content pollution is pervasive in the current peer-to-peer file sharing systems. Many previous reputation models have been proposed to address this problem, however, such models strongly rely on the participants' feedback. In this paper, we bring forward a new holistic mechanism which integrates the reputation model, inherent file-source-based information and the statistical data reflecting the diffusion state to defend against pollution attack. First, we deploy a redundancy mechanism to assure that the file requester receives the correct indices that accord with the information published by the file provider. Second, we complement the reputation information with the diffusion data to help the file requester select the authentic file for downloading. Finally, we introduce a block-oriented probabilistic verification protocol to help the file requester discern the polluted files during the downloading with a low cost. We perform a simulation which shows that our holistic mechanism can perform very well and converge to a high accuracy rapidly, even in a highly malicious environment.