Abstract
Emerging peer to peer (P2P) applications have a requirement for decentralised access control. Computational trust systems address this, achieving security through collaboration. This paper surveys current work on overlay networks, trust and identity certification. Our focus is on the particular problem of distributing evidence for use in trust-based security decisions. We present a system we have implemented that solves this in a highly scalable way, and resists attacks such as false recommendations and collusion.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Abdul-Rahman, A., Hailes, S.: Using Recommendations for Managing Trust in Distributed Systems. In: Proceedings of the IEEE Intl. Conference on Communication, Malaysia (November 1997)
Aberer, K., Despotovic, Z.: Managing Trust in a Peer-2-Peer Information System. In: Proceedings of the 10th Intl. Conference on Information and Knowledge Management (2001)
Back, A.: Hashcash - A Denial of Service Counter-Measure, http://www.hashcash.org
Cahill, V., et al.: Using trust for secure collaboration in uncertain environments. IEEE Pervasive Computing 2(3), 52–61 (2003)
Castro, M., Druschel, P., Ganesh, A., Rowstron, A., Wallach, D.: Secure routing for structured peer-to-peer overlay networks. In: Proceedings of the 5th Usenix Symposium on Operating Systems Design and Implementation, Boston (December 2002)
Clarke, I., Sandberg, O., Wiley, B., Hong, T.: Freenet: A Distributed Anonymous Information Storage and Retrieval System. In: Proc. ICSI Workshop on Design Issues in Anonymity and Unobservability (2000)
Dabek, F., Kaashoek, F., Karger, D., Morris, R., Stoica, I.: Wide-area cooperative storage with CFS. In: Proc. 18th ACM Symposium on OS Principals (SOSP 2001) (October 2001)
Dimmock, N., Maddison, I.: Peer-to-Peer Collaborative Spam Detection. ACM Crossroads Magazine (December 2004)
Douceur, J.: The sybil attack. In: Druschel, P., Kaashoek, M.F., Rowstron, A. (eds.) IPTPS 2002. LNCS, vol. 2429, p. 251. Springer, Heidelberg (2002)
Friedman, E., Resnick, P.: The Social Cost of Cheap Pseudonyms. Journal of Economics and Management Strategy 10(2), 173–199 (2001)
Ingram, D.: Trust-based Filtering for Augmented Reality. In: Nixon, P., Terzis, S. (eds.) iTrust 2003. LNCS, vol. 2692, pp. 108–122. Springer, Heidelberg (2003)
Ingram, D.: The SCOP Events Library, http://www.srcf.ucam.org/~dmi1000/scop/index.html
Jøsang, A., Gray, E., Kinateder, M.: Analysing Topologies of Transitive Trust. In: Proc. Workshop Formal Aspects of Security and Trust (FAST) (September 2003)
Kamvar, S., Schlosser, M., Garcia-Molina, H.: The EigenTrust Algorithm for Reputation Management in P2P Networks. In: Proc. 12th Intl. WWW Conference (May 2003)
Maymounkov, P., Mazières, D.: Kademlia: A Peer-to-peer Information System Based on the XOR Metric. In: Druschel, P., Kaashoek, M.F., Rowstron, A. (eds.) IPTPS 2002. LNCS, vol. 2429, p. 53. Springer, Heidelberg (2002)
Rowstron, A., Druschel, P.: Pastry: Scalable, decentralized object location and routing for large-scale peer-to-peer systems. In: Guerraoui, R. (ed.) Middleware 2001. LNCS, vol. 2218, p. 329. Springer, Heidelberg (2001)
SECURE: Secure Environments for Collaboration among Ubiquitous Roaming Entities. EU Project IST-2001-32486 (December 2002), http://secure.dsg.cs.tcd.ie/
Sit, E., Morris, R.: Security Considerations for Peer-to-Peer Distributed Hash Tables. In: Druschel, P., Kaashoek, M.F., Rowstron, A. (eds.) IPTPS 2002. LNCS, vol. 2429, p. 261. Springer, Heidelberg (2002)
Stoica, I., Morris, R., Liben-Nowell, D., Karger, D., Kaashoek, M., Dabek, F., Balakrishnan, H.: Chord: A Scalable Peer-to-peer Lookup Service for Internet Applications. In: Proceedings of the ACM SIGCOMM Conference, San Diego (August 2001)
Watson, B.: Beyond Identity: Addressing Problems that Persist in an Electronic Mail System with Reliable Sender Identification. In: 1st Conference on Email and Anti-Spam, CEAS (2004)
Xiong, L., Liu, L.: Building Trust in Decentralized Peer-to-Peer Electronic Communities. In: 5th International Conference on Electronic Commerce Research (October 2002)
Yu, B., Singh, M.: An Evidential Model of Distributed Reputation Management. In: Proc. 1st Intl. Joint Conference on Autonomous Agents and MultiAgent Systems, Italy (July 2002)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Ingram, D. (2005). An Evidence Based Architecture for Efficient, Attack-Resistant Computational Trust Dissemination in Peer-to-Peer Networks. In: Herrmann, P., Issarny, V., Shiu, S. (eds) Trust Management. iTrust 2005. Lecture Notes in Computer Science, vol 3477. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11429760_19
Download citation
DOI: https://doi.org/10.1007/11429760_19
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-26042-4
Online ISBN: 978-3-540-32040-1
eBook Packages: Computer ScienceComputer Science (R0)