Chord: A scalable peer-to-peer lookup service for internet applications
Proceedings of the 2001 conference on Applications, technologies, architectures, and protocols for computer communications
Managing trust in a peer-2-peer information system
Proceedings of the tenth international conference on Information and knowledge management
A reputation-based approach for choosing reliable resources in peer-to-peer networks
Proceedings of the 9th ACM conference on Computer and communications security
Kademlia: A Peer-to-Peer Information System Based on the XOR Metric
IPTPS '01 Revised Papers from the First International Workshop on Peer-to-Peer Systems
IPTPS '01 Revised Papers from the First International Workshop on Peer-to-Peer Systems
Pastry: Scalable, Decentralized Object Location, and Routing for Large-Scale Peer-to-Peer Systems
Middleware '01 Proceedings of the IFIP/ACM International Conference on Distributed Systems Platforms Heidelberg
The Eigentrust algorithm for reputation management in P2P networks
WWW '03 Proceedings of the 12th international conference on World Wide Web
Tapestry: An Infrastructure for Fault-tolerant Wide-area Location and
Tapestry: An Infrastructure for Fault-tolerant Wide-area Location and
TrustMe: Anonymous Management of Trust Relationships in Decentralized P2P Systems
P2P '03 Proceedings of the 3rd International Conference on Peer-to-Peer Computing
A taxonomy of DDoS attack and DDoS defense mechanisms
ACM SIGCOMM Computer Communication Review
PeerTrust: Supporting Reputation-Based Trust for Peer-to-Peer Electronic Communities
IEEE Transactions on Knowledge and Data Engineering
Pride: peer-to-peer reputation infrastructure for decentralized environments
Proceedings of the 13th international World Wide Web conference on Alternate track papers & posters
PET: A PErsonalized Trust Model with Reputation and Risk Evaluation for P2P Resource Sharing
HICSS '05 Proceedings of the Proceedings of the 38th Annual Hawaii International Conference on System Sciences - Volume 07
TrustGuard: countering vulnerabilities in reputation management for decentralized overlay networks
WWW '05 Proceedings of the 14th international conference on World Wide Web
Encyclopedia of Cryptography and Security
Encyclopedia of Cryptography and Security
A Reputation Management System in Structured Peer-to-Peer Networks
WETICE '05 Proceedings of the 14th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprise
Reputation Management Techniques in DHT-Based Peer-to-Peer Networks
ICIW '07 Proceedings of the Second International Conference on Internet and Web Applications and Services
PowerTrust: A Robust and Scalable Reputation System for Trusted Peer-to-Peer Computing
IEEE Transactions on Parallel and Distributed Systems
OTM'07 Proceedings of the 2007 OTM Confederated international conference on On the move to meaningful internet systems - Volume Part II
A critical analysis of latest advances in building trusted P2P networks using reputation systems
WISE'07 Proceedings of the 2007 international conference on Web information systems engineering
A survey and comparison of peer-to-peer overlay network schemes
IEEE Communications Surveys & Tutorials
Hi-index | 0.00 |
The growing number of popular peer to peer applications during the last five years has implied for researchers to focus on how to build trust in such very large scale distributed systems. Reputation systems have shown to be a very good solution to build trust in presence of malicious nodes. We propose in this paper a new metric for reputation systems on top of a Distributed Hash Table that uses a notion of risk to make the applications aware of certain behaviours of malicious nodes. We show that our metric is able to significantly reduce the number of malicious transactions, and that it also provides very strong resistance to several traditional attacks of reputations systems. We also show that our solution can easily scale, and can be adapted to various Distributed Hash Tables.