Abstract
The open and anonymous nature of P2P services opens the door to malicious peers who cause the loss of trust by providing corrupted data or harmful services. The introduction of a trust management system is one of the possible ways to combat this problem. This paper presents some new ideas for the design of a P2P trust management system. Its main contributions include: a recommendation-aggregating model based on collaborative filtering (CF), a polling protocol for trust queries and responses, and the use of identity-based cryptosystem to secure recommendations. Simulations show that our CF-based trust model performs pretty well even when malicious peers make the majority.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
CacheLogic, http://www.cachelogic.com/research/index.php
Suryanarayana, G., Taylor, R.N.: A Survey of Trust Management and Resource Discovery Technologies in Peer-to-Peer Applications. Technical report, UC Irvine (2004)
Blaze, M., Feigenbaum, J., Lacy, J.: Decentralized Trust Management. In: Proc. of IEEE Conference on Security and Privacy, Oakland, CA (1996)
Blaze, M.: The KeyNote Trust Management System (Version 2). RFC 2704 (1999), http://www.crypto.com/papers/rfc2704.txt
Khambatti, M., Ryu, K., Dasgupta, P.: Efficient Discovery of Implicitly formed Peer-to-Peer Communities. International Journal of Parallel and Distributed Systems and Networks 5(4), 155–164 (2002)
Pujol, J., Sanguesa, R., et al.: Extracting reputation in multi agent systems by means of social network topology. In: Proc. of First International Joint Conference on Autonomous Agents and Multi-Agent Systems, Bologana, Italy (2002)
Capkun, S., Buttyan, L., Hubaux, J.P.: Small worlds in security systems: an analysis of the PGP certificate graph. In: Proc. of ACM New Security paradigms Workshop 2002, Virginia, pp. 28–35 (2002)
Capkun, S., Buttyan, L., Hubaux, J.P.: Self-organized public-key management for mobile ad hoc networks. IEEE Transactions on Mobile Computing 2(1), 52–64 (2003)
Richardson, M., Agrawal, R., Domingos, P.: Trust management for the semantic web. In: Fensel, D., Sycara, K., Mylopoulos, J. (eds.) ISWC 2003. LNCS, vol. 2870, pp. 351–368. Springer, Heidelberg (2003)
Resnick, P., Zeckhauser, R., Friedman, E., et al.: Reputation Systems: Facilitating Trust in Internet Interactions. Communications of the ACM 43(12), 45–48 (2000)
Aberer, K., Despotovic, Z.: Managing Trust in a Peer-2-Peer Information System. In: Proc. of CIKM 2001, Atlanta, Georgia, pp. 310–317 (2001)
Damiani, E., Vimercati, S.D.C., Paraboschi, S., et al.: Managing and Sharing Servents’ Reputations in P2P Systems. IEEE Transactions on Knowledge and Data Engineering 15(4), 840–854 (2003)
Kamvar, S.D., Schlosser, M.T., Garcia-Molina, H.: The EigenTrust Algorithm for Reputation Management in P2P Networks. In: Proc. of WWW 2003, Budapest, Hungary (2003)
Xiong, L., Liu, L.: PeerTrust: Supporting reputation-based trust in peer-to-peer communities. IEEE Transactions on Knowledge and Data Engineering 16(7), 843–857 (2004)
Buchegger, S., Boudec, J.Y.: A Robust Reputation System for P2P and Mobile Ad-hoc Networks. In: Proc. of P2PEcon 2004. Harvard University, Cambridge (2004)
Breese, J.S., Heckerman, D., Kadie, C.: Empirical analysis of predictive algorithms for collaborative filtering. Technical report, Microsoft Research (1998)
Sarwar, B.M., Karypis, G., Konstan, J.A., et al.: Application of dimensionality reduction in recommender system – a case study. In: Proc. ACM WebKDD 2000 Web Mining for E-Commerce Workshop, Boston, MA (2000)
Lai, K., Feldman, M., Stoica, I., et al.: Incentives for Cooperation in Peer-to-Peer Networks. In: Proc. of 1st Workshop on Economics of Peer-to-Peer Systems, UC Berkeley (2003)
Shamir, A.: Identity-based cryptosystems and signature schemes. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 47–53. Springer, Heidelberg (1985)
Boneh, D., Franklin, M.: Identity-based encryption from the weil pairing. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 213–229. Springer, Heidelberg (2001)
Douceur, J.R.: The sybil attack. In: Druschel, P., Kaashoek, M.F., Rowstron, A. (eds.) IPTPS 2002. LNCS, vol. 2429, p. 251. Springer, Heidelberg (2002)
Marti, S., Garcia-Molina, H.: Limited Reputation Sharing in P2P Systems. In: Proc. of ACM EC 2004, New York, pp. 91–101 (2004)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Zuo, M., Wang, K., Li, J. (2005). The Application of Collaborative Filtering for Trust Management in P2P Communities. In: Pan, Y., Chen, D., Guo, M., Cao, J., Dongarra, J. (eds) Parallel and Distributed Processing and Applications. ISPA 2005. Lecture Notes in Computer Science, vol 3758. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11576235_41
Download citation
DOI: https://doi.org/10.1007/11576235_41
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-29769-7
Online ISBN: 978-3-540-32100-2
eBook Packages: Computer ScienceComputer Science (R0)