Skip to main content

A Reputation-Based System for Confidentiality Modeling in Peer-to-Peer Networks

  • Conference paper
Book cover Trust Management (iTrust 2006)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 3986))

Included in the following conference series:

Abstract

The secure transmission of messages via computer networks is, in many scenarios, considered to be a solved problem. However, a related problem, being almost as crucial, has been widely ignored: To whom to entrust information? We argue that confidentiality modeling is a question of trust. Therefore, the article at hand addresses this problem based on a reputation system. We consider a Peer-to-Peer network whose participants decide on whether or not to make information available to other nodes based on the author’s trust relationships. Documents are only forwarded to another node if, according to the sender’s local view, the recipient is considered to be sufficiently trustworthy. In contrast to most existing reputation systems, trust relationships are considered only with respect to a specific domain. Privacy is preserved by limiting the revelation of trust relationships.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Abdul-Rahman, A.: The PGP Trust Model. EDI Forum: The Journal of Electronic Commerce (April 1997)

    Google Scholar 

  2. Abdul-Rahman, A., Hailes, S.: Supporting trust in virtual communities. In: HICSS 2000: Proceedings of the 33rd Hawaii International Conference on System Sciences, Washington, DC, USA, vol. 6, p. 6007. IEEE Computer Society, Los Alamitos (2000)

    Google Scholar 

  3. Daignault, M., Shepherd, M., Marche, S., Watters, C.: Enabling trust online. In: Proceedings of the 3rd International Symposium on Electronic Commerce, pp. 3–12. IEEE, Los Alamitos (2002)

    Chapter  Google Scholar 

  4. Douceur, J.R.: The sybil attack. In: Druschel, P., Kaashoek, M.F., Rowstron, A. (eds.) IPTPS 2002. LNCS, vol. 2429, p. 251. Springer, Heidelberg (2002)

    Chapter  Google Scholar 

  5. Esser, H.: Institutionen: Soziologie: Spezielle Grundlagen, vol. 5. Campus Verlag, Frankfurt (2000)

    Google Scholar 

  6. Gambetta, D. (ed.): Can We Trust Trust? Basil Blackwell, Malden (1988)

    Google Scholar 

  7. Glaeser, E.L., Laibson, D.I., Scheinkman, J.A., Soutter, C.L.: Measuring trust. The Quarterly Journal of Economics 115(3), 811–846 (2000)

    Article  Google Scholar 

  8. Guha, R., Kumar, R., Raghavan, P., Tomkins, A.: Propagation of trust and distrust. In: WWW 2004: Proceedings of the 13th international conference on WorldWide Web, pp. 403–412. ACM Press, New York (2004)

    Google Scholar 

  9. Gupta, M., Judge, P., Ammar, M.: A reputation system for peer-to-peer networks. In: NOSSDAV 2003: Proceedings of the 13th international workshop on Networkand operating systems support for digital audio and video, pp. 144–152. ACM Press, New York (2003)

    Google Scholar 

  10. Jones, K.: Trust: Philosophical Aspects. In: International Encyclopedia of the Social and Behavioral Sciences, vol. 23, pp. 15917–15922. Elsevier, Amsterdam (2001)

    Chapter  Google Scholar 

  11. Kamvar, S.D., Schlosser, M.T., Garcia-Molina, H.: The Eigentrust algorithm for reputation management in P2P networks. In: WWW 2003: Proceedings of the 12th international conference on WorldWide Web, pp. 640–651. ACM Press, New York (2003)

    Google Scholar 

  12. Kinateder, M., Pearson, S.: A Privacy-Enhanced Peer-to-Peer Reputation System. In: Bauknecht, K., Tjoa, A.M., Quirchmayr, G. (eds.) EC-Web 2003. LNCS, vol. 2738, pp. 206–215. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  13. Leibowitz, N., Ripeanu, M., Wierzbicki, A.: Deconstructing the kazaa network. In: WIAPP 2003: Proceedings of the The Third IEEE Workshop on Internet Applications, Washington, DC, USA, p. 112. IEEE Computer Society, Los Alamitos (2003)

    Chapter  Google Scholar 

  14. Marsh, S.P.: Formalising Trust as a Computational Concept. PhD thesis, University of Stirling (1994)

    Google Scholar 

  15. Resnick, P., Zeckhauser, R.: Trust among strangers in internet transactions: Empirical analysis of ebay’s reputation system. In: Baye, M. (ed.) The Economics of The Internet and E-Commerce. Advances in Applied Microeconomics, vol. 11. Elsevier, Amsterdam (2002)

    Chapter  Google Scholar 

  16. Resnick, P., Zeckhauser, R., Friedman, E., Kuwabara, K.: Reputation systems. Commun. ACM 43(12), 45–48 (2000)

    Article  Google Scholar 

  17. Ripeanu, M.: Peer-to-peer architecture case study: Gnutella network. In: P2P 2001: Proceedings of the First International Conference on Peer-to-Peer Computing (P2P 2001), Washington, DC, USA, p. 99. IEEE Computer Society, Los Alamitos (2001)

    Google Scholar 

  18. Stallings, W.: Cryptography and Network Security: Principles and Practices, 3rd edn. Prentice Hall, Englewood Cliffs (2003)

    Google Scholar 

  19. Walsh, K., Sirer, E.G.: Fighting peer-to-peer spam and decoys with object reputation. In: P2PECON 2005: Proceeding of the 2005 ACM SIGCOMM workshop on Economics of peer-to-peer systems, pp. 138–143. ACM Press, New York (2005)

    Chapter  Google Scholar 

  20. Westin, A.F.: Privacy and freedom. Atheneum (1967)

    Google Scholar 

  21. Yu, B., Singh, M.P.: A social mechanism of reputation management in electronic communities. In: Cooperative Information Agents, pp. 154–165 (2000)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2006 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Sorge, C., Zitterbart, M. (2006). A Reputation-Based System for Confidentiality Modeling in Peer-to-Peer Networks. In: Stølen, K., Winsborough, W.H., Martinelli, F., Massacci, F. (eds) Trust Management. iTrust 2006. Lecture Notes in Computer Science, vol 3986. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11755593_27

Download citation

  • DOI: https://doi.org/10.1007/11755593_27

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-34295-3

  • Online ISBN: 978-3-540-34297-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics