NSPW '97 Proceedings of the 1997 workshop on New security paradigms
Space/time trade-offs in hash coding with allowable errors
Communications of the ACM
A logic for uncertain probabilities
International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems
The Eigentrust algorithm for reputation management in P2P networks
WWW '03 Proceedings of the 12th international conference on World Wide Web
Trust Based Incentive in P2P Network
CEC-EAST '04 Proceedings of the E-Commerce Technology for Dynamic E-Business, IEEE International Conference
Adaptive Peer-to-Peer Topologies
P2P '04 Proceedings of the Fourth International Conference on Peer-to-Peer Computing
Reputation-based framework for high integrity sensor networks
Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks
Preferential walk: towards efficient and scalable search in unstructured peer-to-peer networks
WWW '05 Special interest tracks and posters of the 14th international conference on World Wide Web
Survey of research towards robust peer-to-peer networks: search methods
Computer Networks: The International Journal of Computer and Telecommunications Networking
Trust-aware Adaptive P2P Overlay Topology Based on Superpeer-partition
GCC '07 Proceedings of the Sixth International Conference on Grid and Cooperative Computing
Peer-to-Peer Networks Security
ICIMP '08 Proceedings of the 2008 The Third International Conference on Internet Monitoring and Protection
A Global Trust Model of P2P Network Based on Distance-Weighted Recommendation
NAS '09 Proceedings of the 2009 IEEE International Conference on Networking, Architecture, and Storage
Constructing efficient peer-to-peer overlay topologies by adaptive connection establishment
Computer Communications
Evaluation of P2P search algorithms for discovering trust paths
EPEW'07 Proceedings of the 4th European performance engineering conference on Formal methods and stochastic models for performance evaluation
A trust-based robust and efficient searching scheme for peer-to-peer networks
ICICS'10 Proceedings of the 12th international conference on Information and communications security
Hi-index | 0.00 |
The existing peer-to-peer networks have several problems such as fake content distribution, free riding, white-washing, poor search scalability, lack of a robust trust model and absence of user privacy protection mechanism. Although, several trust management and semantic community-based mechanisms for combating free riding and distribution of malicious contents have been proposed by some researchers, most of these schemes lack scalability due to their high computational, communication and storage overhead. This paper presents a robust trust management scheme for P2P networks that utilizes topology adaptation by constructing an overlay of trusted peers where the neighbors are selected based on their trust ratings and content similarities. While increasing the search efficiency by intelligently exploiting the formation of semantic community structures by topology adaptation among the trustworthy peers, the scheme provides the users a very high level of privacy protection of their usage and consumption patterns of network resources. Simulation results demonstrate that the proposed scheme provides efficient searching to good peers while penalizing the malicious peers by increasing their search times as the network topology stabilizes.