NSPW '97 Proceedings of the 1997 workshop on New security paradigms
Chord: A scalable peer-to-peer lookup service for internet applications
Proceedings of the 2001 conference on Applications, technologies, architectures, and protocols for computer communications
Trust Based Incentive in P2P Network
CEC-EAST '04 Proceedings of the E-Commerce Technology for Dynamic E-Business, IEEE International Conference
Adaptive Peer-to-Peer Topologies
P2P '04 Proceedings of the Fourth International Conference on Peer-to-Peer Computing
Preferential walk: towards efficient and scalable search in unstructured peer-to-peer networks
WWW '05 Special interest tracks and posters of the 14th international conference on World Wide Web
Survey of research towards robust peer-to-peer networks: search methods
Computer Networks: The International Journal of Computer and Telecommunications Networking
Trust-aware Adaptive P2P Overlay Topology Based on Superpeer-partition
GCC '07 Proceedings of the Sixth International Conference on Grid and Cooperative Computing
Peer-to-Peer Networks Security
ICIMP '08 Proceedings of the 2008 The Third International Conference on Internet Monitoring and Protection
A Global Trust Model of P2P Network Based on Distance-Weighted Recommendation
NAS '09 Proceedings of the 2009 IEEE International Conference on Networking, Architecture, and Storage
Constructing efficient peer-to-peer overlay topologies by adaptive connection establishment
Computer Communications
Evaluation of P2P search algorithms for discovering trust paths
EPEW'07 Proceedings of the 4th European performance engineering conference on Formal methods and stochastic models for performance evaluation
Secure and privacy-aware searching in peer-to-peer networks
DPM'11 Proceedings of the 6th international conference, and 4th international conference on Data Privacy Management and Autonomous Spontaneus Security
Hi-index | 0.00 |
Studies on the large scale peer-to-peer (P2P) network like Gnutella have shown the presence of large number of free riders. Moreover, the open and decentralized nature of P2P network is exploited by malicious users who distribute unauthentic or harmful contents. Despite the existence of a number of trust management schemes for combating against free riding and distribution of malicious files, these mechanisms are not scalable due to their high computational, communication and storage overhead. Moreover they do not consider the quality-of-service (QoS) of the search. This paper presents a trust management scheme for P2P networks that utilizes topology adaptation to minimize distribution of spurious files. It also reduces search time since most of the queries are resolved within the community of trustworthy peers. Simulation results demonstrate that the proposed scheme provides efficient searching to good peers while penalizing the malicious peers by increasing their search times as the network topology stabilizes. The mechanism is also found to be robust even in presence of a large percentage of malicious peers.