PKI-Based Security for Peer-to-Peer Information Sharing
P2P '04 Proceedings of the Fourth International Conference on Peer-to-Peer Computing
P2P Scrabble. Can P2P Games Commence?
P2P '04 Proceedings of the Fourth International Conference on Peer-to-Peer Computing
WWW '05 Proceedings of the 14th international conference on World Wide Web
Trusted P2P Transactions with Fuzzy Reputation Aggregation
IEEE Internet Computing
A Grid Resource Management Approach Based on P2P Technology
HPCASIA '05 Proceedings of the Eighth International Conference on High-Performance Computing in Asia-Pacific Region
Taxonomy of trust: categorizing P2P reputation systems
Computer Networks: The International Journal of Computer and Telecommunications Networking - Management in peer-to-peer systems
Decentralized trust management for ad-hoc peer-to-peer networks
Proceedings of the 4th international workshop on Middleware for Pervasive and Ad-Hoc Computing (MPAC 2006)
Providing witness anonymity in peer-to-peer systems
Proceedings of the 13th ACM conference on Computer and communications security
Survey of research towards robust peer-to-peer networks: search methods
Computer Networks: The International Journal of Computer and Telecommunications Networking
Sabotage-tolerance and trust management in desktop grid computing
Future Generation Computer Systems
A Quantitative Comparison of Reputation Systems in the Grid
GRID '05 Proceedings of the 6th IEEE/ACM International Workshop on Grid Computing
PowerTrust: A Robust and Scalable Reputation System for Trusted Peer-to-Peer Computing
IEEE Transactions on Parallel and Distributed Systems
The MoR-Trust Distributed Trust Management System: Design and Simulation Results
Electronic Notes in Theoretical Computer Science (ENTCS)
SuperTrust: a secure and efficient framework for handling trust in super-peer networks
Proceedings of the twenty-sixth annual ACM symposium on Principles of distributed computing
INCA: qualitative reference framework for incentive mechanisms in P2P networks
International Journal of Computer Applications in Technology
Adaptive trust-based anonymous network
International Journal of Security and Networks
Featuring trust and reputation management systems for constrained hardware devices
Proceedings of the 1st international conference on Autonomic computing and communication systems
A new resource selection approach based on reputation driven Min-min algorithm in the grid economy
CHINA HPC '07 Proceedings of the 2007 Asian technology information program's (ATIP's) 3rd workshop on High performance computing in China: solution approaches to impediments for high performance computing
QoS-Oriented Reputation-Aware Query Scheduling in Data Grids
Euro-Par '08 Proceedings of the 14th international Euro-Par conference on Parallel Processing
Proceedings of the 5th ACM symposium on Performance evaluation of wireless ad hoc, sensor, and ubiquitous networks
Sybil proof anonymous reputation management
Proceedings of the 4th international conference on Security and privacy in communication netowrks
Towards an authentication service for Peer-to-Peer based Massively Multiuser Virtual Environments
International Journal of Advanced Media and Communication
Hiding Data Sources in P2P Networks
Proceedings of the 2005 conference on Applied Public Key Infrastructure: 4th International Workshop: IWAP 2005
Runtime Estimations, Reputation and Elections for Top Performing Distributed Query Scheduling
CCGRID '09 Proceedings of the 2009 9th IEEE/ACM International Symposium on Cluster Computing and the Grid
A survey of attack and defense techniques for reputation systems
ACM Computing Surveys (CSUR)
Taxonomy of trust: Categorizing P2P reputation systems
Computer Networks: The International Journal of Computer and Telecommunications Networking - Management in peer-to-peer systems
International Journal of Networking and Virtual Organisations
Detecting malicious nodes in peer-to-peer streaming by peer-based monitoring
ACM Transactions on Multimedia Computing, Communications, and Applications (TOMCCAP)
Integrating conflicting data: the role of source dependence
Proceedings of the VLDB Endowment
Towards Trustworthy Self-optimization for Distributed Systems
SEUS '09 Proceedings of the 7th IFIP WG 10.2 International Workshop on Software Technologies for Embedded and Ubiquitous Systems
A unified security backplane for trust and reputation systems in decentralized networks
INFOCOM'09 Proceedings of the 28th IEEE international conference on Computer Communications Workshops
On desideratum for B2C E-commerce reputation systems
Journal of Computer Science and Technology - Special section on trust and reputation management in future computing systmes and applications
WTR: a reputation metric for distributed hash tables based on a risk and credibility factor
Journal of Computer Science and Technology - Special section on trust and reputation management in future computing systmes and applications
A market-based approach to managing the risk of peer-to-peer transactions
Computer Networks: The International Journal of Computer and Telecommunications Networking
Towards pre-standardization of trust and reputation models for distributed and heterogeneous systems
Computer Standards & Interfaces
Implementing DRM over peer-to-peer networks with broadcast encryption
PCM'07 Proceedings of the multimedia 8th Pacific Rim conference on Advances in multimedia information processing
Peer enterprises: possibilities, challenges and some ideas towards their realization
OTM'07 Proceedings of the 2007 OTM Confederated international conference on On the move to meaningful internet systems - Volume Part II
SuperTrust - a secure and efficient framework for handling trust in super peer networks
ICDCN'08 Proceedings of the 9th international conference on Distributed computing and networking
Managing data for evaluating trust in unstructured peer-to-peer networks
GPC'08 Proceedings of the 3rd international conference on Advances in grid and pervasive computing
Providing witness anonymity under peer-to-peer settings
IEEE Transactions on Information Forensics and Security
TRIMS, a privacy-aware trust and reputation model for identity management systems
Computer Networks: The International Journal of Computer and Telecommunications Networking
A free-rider aware reputation system for peer-to-peer file-sharing networks
Expert Systems with Applications: An International Journal
CONCUR'10 Proceedings of the 21st international conference on Concurrency theory
Achieving optimal privacy in trust-aware social recommender systems
SocInfo'10 Proceedings of the Second international conference on Social informatics
Incorporating trust into the BDI architecture
International Journal of Artificial Intelligence and Soft Computing
Trust your social network according to satisfaction, reputation and privacy
Proceedings of the Third International Workshop on Reliability, Availability, and Security
DPM'10/SETOP'10 Proceedings of the 5th international Workshop on data privacy management, and 3rd international conference on Autonomous spontaneous security
A pairing based cryptographic anonymous authentication scheme
Proceedings of the 5th International Conference on Ubiquitous Information Management and Communication
Minimising anonymity loss in anonymity networks under DoS attacks
ICICS'11 Proceedings of the 13th international conference on Information and communications security
TIDE: measuring and evaluating trustworthiness and credibility of enterprises in digital ecosystem
Proceedings of the International Conference on Management of Emergent Digital EcoSystems
Recard: using recommendation cards approach for building trust in peer-to-peer networks
ISPEC'05 Proceedings of the First international conference on Information Security Practice and Experience
Cluster computing on the fly: P2P scheduling of idle cycles in the internet
IPTPS'04 Proceedings of the Third international conference on Peer-to-Peer Systems
SONR: A reliable reputation system of self-organized network
Journal of Network and Computer Applications
A time-frame based trust model for p2p systems
ICISC'06 Proceedings of the 9th international conference on Information Security and Cryptology
Addressing common vulnerabilities of reputation systems for electronic commerce
Journal of Theoretical and Applied Electronic Commerce Research
Information Systems and e-Business Management
Toward a Quality-of-Service Framework for Peer-to-Peer Applications
International Journal of Distributed Systems and Technologies
Modeling Decentralized Reputation-Based Trust for Initial Transactions in Digital Environments
ACM Transactions on Internet Technology (TOIT)
Data fusion: resolving conflicts from multiple sources
WAIM'13 Proceedings of the 14th international conference on Web-Age Information Management
Hi-index | 0.00 |
Decentralized Peer to Peer (P2P) networks offer both opportunities and threats. Its open and decentralized nature makes it extremely susceptible to malicious users spreading harmful content like viruses, trojans or, even just wasting valuable resources of the network. In order to minimize such threats, the use of community-based reputations as trust measurements is fast becoming a de-facto standard. The idea is to dynamically assign each peer a trust rating based on its performance in the network and store it at a suitable place. Any peer wishing to interact with another peer can make an informed decision based on such a rating.An important challenge in managing such trust relationships is to design a protocol to secure the placement and access of these trust ratings. Surprisingly, all the related work in this area either support very limited anonymity or assume anonymity to be an undesired feature and neglect it.In this paper, we motivate the importance of anonymity, especially in such trust based systems. We then present TrustMe驴 a secure and anonymous underlying protocol for trust management. The protocol provides mutual anonymity for both the trust host and the trust querying peer. Through a series of simulation-based experiments, we show that the TrustMe protocol is extremely secure in the face of a variety of possible attacks and present a thorough analysis of the protocol.