Managing trust in a peer-2-peer information system
Proceedings of the tenth international conference on Information and knowledge management
Choosing reputable servents in a P2P network
Proceedings of the 11th international conference on World Wide Web
Peer-to-Peer: Harnessing the Power of Disruptive Technologies
Peer-to-Peer: Harnessing the Power of Disruptive Technologies
The Eigentrust algorithm for reputation management in P2P networks
WWW '03 Proceedings of the 12th international conference on World Wide Web
A reputation system for peer-to-peer networks
NOSSDAV '03 Proceedings of the 13th international workshop on Network and operating systems support for digital audio and video
A survey of key management for secure group communication
ACM Computing Surveys (CSUR)
Measurement, modeling, and analysis of a peer-to-peer file-sharing workload
SOSP '03 Proceedings of the nineteenth ACM symposium on Operating systems principles
Limited reputation sharing in P2P systems
EC '04 Proceedings of the 5th ACM conference on Electronic commerce
PeerTrust: Supporting Reputation-Based Trust for Peer-to-Peer Electronic Communities
IEEE Transactions on Knowledge and Data Engineering
APNOMS '08 Proceedings of the 11th Asia-Pacific Symposium on Network Operations and Management: Challenges for Next Generation Network Operations and Service Management
Detecting malicious nodes in peer-to-peer streaming by peer-based monitoring
ACM Transactions on Multimedia Computing, Communications, and Applications (TOMCCAP)
Small-world network inspired trustworthy web service evaluation and management model
GPC'07 Proceedings of the 2nd international conference on Advances in grid and pervasive computing
Handling free riders in peer-to-peer systems
AP2PC'05 Proceedings of the 4th international conference on Agents and Peer-to-Peer Computing
Journal of Computer and System Sciences
Mobile Peer-to-Peer data dissemination in wireless ad-hoc networks
Information Sciences: an International Journal
A reliable scheduling method in equipment grid using provenance information
Information Systems Frontiers
Hi-index | 0.00 |
In this paper, we propose a reputation management scheme for partially decentralized peer-to-peer systems. The reputation scheme helps to build trust among peers based on their past experiences and feedback from other peers. Two selection advisor algorithms are proposed for helping peers to select the most trustworthy peer to download from. The proposed algorithms can detect malicious peers sending inauthentic files. The Malicious detector algorithm is also proposed to detect liar peers that send the wrong feedback to subvert the reputation system. The new concept of suspicious transactions is introduced and explained. Simulation results confirm the capability of the proposed algorithms to effectively detect malicious peers and isolate them from the system, hence reducing the amount of inauthentic uploads, increasing peers' satisfaction, and preserving network resources.