Skip to main content

The Application of Collaborative Filtering for Trust Management in P2P Communities

  • Conference paper
Parallel and Distributed Processing and Applications (ISPA 2005)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 3758))

Abstract

The open and anonymous nature of P2P services opens the door to malicious peers who cause the loss of trust by providing corrupted data or harmful services. The introduction of a trust management system is one of the possible ways to combat this problem. This paper presents some new ideas for the design of a P2P trust management system. Its main contributions include: a recommendation-aggregating model based on collaborative filtering (CF), a polling protocol for trust queries and responses, and the use of identity-based cryptosystem to secure recommendations. Simulations show that our CF-based trust model performs pretty well even when malicious peers make the majority.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. CacheLogic, http://www.cachelogic.com/research/index.php

  2. Suryanarayana, G., Taylor, R.N.: A Survey of Trust Management and Resource Discovery Technologies in Peer-to-Peer Applications. Technical report, UC Irvine (2004)

    Google Scholar 

  3. Blaze, M., Feigenbaum, J., Lacy, J.: Decentralized Trust Management. In: Proc. of IEEE Conference on Security and Privacy, Oakland, CA (1996)

    Google Scholar 

  4. Blaze, M.: The KeyNote Trust Management System (Version 2). RFC 2704 (1999), http://www.crypto.com/papers/rfc2704.txt

  5. Khambatti, M., Ryu, K., Dasgupta, P.: Efficient Discovery of Implicitly formed Peer-to-Peer Communities. International Journal of Parallel and Distributed Systems and Networks 5(4), 155–164 (2002)

    Google Scholar 

  6. Pujol, J., Sanguesa, R., et al.: Extracting reputation in multi agent systems by means of social network topology. In: Proc. of First International Joint Conference on Autonomous Agents and Multi-Agent Systems, Bologana, Italy (2002)

    Google Scholar 

  7. Capkun, S., Buttyan, L., Hubaux, J.P.: Small worlds in security systems: an analysis of the PGP certificate graph. In: Proc. of ACM New Security paradigms Workshop 2002, Virginia, pp. 28–35 (2002)

    Google Scholar 

  8. Capkun, S., Buttyan, L., Hubaux, J.P.: Self-organized public-key management for mobile ad hoc networks. IEEE Transactions on Mobile Computing 2(1), 52–64 (2003)

    Article  Google Scholar 

  9. Richardson, M., Agrawal, R., Domingos, P.: Trust management for the semantic web. In: Fensel, D., Sycara, K., Mylopoulos, J. (eds.) ISWC 2003. LNCS, vol. 2870, pp. 351–368. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  10. Resnick, P., Zeckhauser, R., Friedman, E., et al.: Reputation Systems: Facilitating Trust in Internet Interactions. Communications of the ACM 43(12), 45–48 (2000)

    Article  Google Scholar 

  11. Aberer, K., Despotovic, Z.: Managing Trust in a Peer-2-Peer Information System. In: Proc. of CIKM 2001, Atlanta, Georgia, pp. 310–317 (2001)

    Google Scholar 

  12. Damiani, E., Vimercati, S.D.C., Paraboschi, S., et al.: Managing and Sharing Servents’ Reputations in P2P Systems. IEEE Transactions on Knowledge and Data Engineering 15(4), 840–854 (2003)

    Article  Google Scholar 

  13. Kamvar, S.D., Schlosser, M.T., Garcia-Molina, H.: The EigenTrust Algorithm for Reputation Management in P2P Networks. In: Proc. of WWW 2003, Budapest, Hungary (2003)

    Google Scholar 

  14. Xiong, L., Liu, L.: PeerTrust: Supporting reputation-based trust in peer-to-peer communities. IEEE Transactions on Knowledge and Data Engineering 16(7), 843–857 (2004)

    Article  Google Scholar 

  15. Buchegger, S., Boudec, J.Y.: A Robust Reputation System for P2P and Mobile Ad-hoc Networks. In: Proc. of P2PEcon 2004. Harvard University, Cambridge (2004)

    Google Scholar 

  16. Breese, J.S., Heckerman, D., Kadie, C.: Empirical analysis of predictive algorithms for collaborative filtering. Technical report, Microsoft Research (1998)

    Google Scholar 

  17. Sarwar, B.M., Karypis, G., Konstan, J.A., et al.: Application of dimensionality reduction in recommender system – a case study. In: Proc. ACM WebKDD 2000 Web Mining for E-Commerce Workshop, Boston, MA (2000)

    Google Scholar 

  18. Lai, K., Feldman, M., Stoica, I., et al.: Incentives for Cooperation in Peer-to-Peer Networks. In: Proc. of 1st Workshop on Economics of Peer-to-Peer Systems, UC Berkeley (2003)

    Google Scholar 

  19. Shamir, A.: Identity-based cryptosystems and signature schemes. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 47–53. Springer, Heidelberg (1985)

    Chapter  Google Scholar 

  20. Boneh, D., Franklin, M.: Identity-based encryption from the weil pairing. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 213–229. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

  21. Douceur, J.R.: The sybil attack. In: Druschel, P., Kaashoek, M.F., Rowstron, A. (eds.) IPTPS 2002. LNCS, vol. 2429, p. 251. Springer, Heidelberg (2002)

    Chapter  Google Scholar 

  22. Marti, S., Garcia-Molina, H.: Limited Reputation Sharing in P2P Systems. In: Proc. of ACM EC 2004, New York, pp. 91–101 (2004)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Zuo, M., Wang, K., Li, J. (2005). The Application of Collaborative Filtering for Trust Management in P2P Communities. In: Pan, Y., Chen, D., Guo, M., Cao, J., Dongarra, J. (eds) Parallel and Distributed Processing and Applications. ISPA 2005. Lecture Notes in Computer Science, vol 3758. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11576235_41

Download citation

  • DOI: https://doi.org/10.1007/11576235_41

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-29769-7

  • Online ISBN: 978-3-540-32100-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics