Abstract
The popularity and wide spread usage of peer-to-peer (P2P) systems has soared over the past several years. Throughout the evolution of P2P systems the definition of P2P has changed along with the software architecture of the various P2P applications. While the initial popular usage of P2P systems was for file sharing (more specifically the sharing of music files in mp3 format) [4] the problem domain that P2P systems address today cover the range from data sharing to collaboration to distributed computing and beyond. For the continued increased usage of P2P systems, the need for security and trust arises. This chapter covers evolution of P2P systems through the examination of Napster, Gnutella, KaZaa, and BitTorrent [9], system capabilities and shortcomings, and security needs, which highlights the need for trust in P2P systems. With this basis we then present our vision for trust and security followed by a literature review of trust in P2P systems. We then introduce and develop a Universal Trust Set as a foundation for building trustworthy environment, and then our approach for implementing the set, and the future of P2P systems where we will discuss other open issues that need addressing. We close this chapter with some concluding remarks.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Abdul-Rahman, A., and Hailes, S., 2000, Supporting trust in virtual communities. In: Proceedings of the 33rd Hawaii International Conference on Systems Sciences.
Aberer, K., and Despotovic, Z., 2001, Managing trust in a peer-2-peer information system, CIKM’01, Atlanta, Georgia.
acquisitionx.borgfind.com/
Alexander, Peter J. Peer-to-Peer File Sharing: The Case of the Music Recording Industry, Review of Industrial Organization. Springer Science and Business Media B.V., Issue: Volume 20, Number 2, March 2002
Assedin, F., and Mahewsaran, M., 2003, Trust modeling for peer-to-peer based computing systems, Proc. Intl. Parallel and Distributed Processing Symposium.
Bearly, T., Kumar, V., Expanding Trust Beyond Reputation in Peer-To-Peer Systems. In: Proceeding of 15th Intl. Workshop on Database and Expert Systems Applications (DEXA 2004). Vol 00, Zaragoza, Spain.
www.freepeers.com/products.htm
Bhargava, B., and Zhong, Y., 2002, Authorization Based Evidence and Trust, in Proceedings of International Conference on Data Warehousing and Knowledge Discovery (DAWAK’2002), LNCS, Vol. 2454, France.
BitTorrent-Wikipedia, 2003, http://en.wikipedia.org/wiki/Bittorrent.
Blaze, M., Lacy, J., London, T., and Reiter, M., 1994, Issues and Mechanisms for Trust-worthy Systems: Creating Transparent Mistrust. AT&T Technical Journal, 73(5).
CacheLogic press release, 2004, http://www.cachelogic.com/news/pr040715.php.
Castano, S., Fugini, M., Martella, G., and Samarati, P., 1994, Database Security, Addison Wesley & ACM Press, Reading, MA.
Castrol, Miguel, Peter Druschel2, Ayalvadi Ganeshl, Antony Rowstronl and Dan S. Wallach2, Secure routing for structured peer-to-peer overlay networks_Proc. of the 5th Usenix Symposium on Operating Systems Design and Implementation, Boston, MA, December 2002.
Chen, M., and Singh, J.P., 2001, Computing and using reputations of internet ratings, in Proceedings of 3rd ACM International Conference on E-Commerce.
Chen, R., and Yeager, W., 2000, Poblano: A Distributed Trust Model for Peer-to-Peer Networks, Sun Microsystems Technical Paper www.jxta.org/project/docs/trust.pdf.
Datta, A., Hauswirth, M., and Aberer, K., 2003, Beyond “web of trust”: Enabling P2P E-commerce. CEC.
en.wikipedia.org/wiki/Digital_signature
Douceur, J. 2002, The Sybil Attack, Proc. of First International Workshop on Peer-to-Peer Systems’ 02, Cambridge, MA.
Druschel, P., and Rowstron, A., 2001, PAST: A large scale, persistent peer-to-peer storage utility, HotOS VIII, Schloss Elmau, Germany.
FastTrack-Wikipedia; http://en.wikipedia.org/wiki/FastTrack.
taxster.fateback.com/gnotella.htm
Gnutella-Wikipedia, http://en.wikipedia.org/wiki/Gnutella.
Gnutella 0.6-Defining a standard, http://rfc-gnutella.sourceforge. net/developer/index.html.
en.wikipedia.org/wiki/Gtk-gnutella
Guha, R., Kumar, R., Raghavan, P., and Tomkins, A., 2004, Propagation of trust and distrust, WWW 2004, New York.
Guillarmod, F. Jacot, From FidoNet to Internet: the evolution of a national network”, Proceedings of INET’92, H. Ishida Editor.
Hara, T. and Madria, S. 2004. Dynamic Data Replication Schemes for Mobile Ad-hoc Network Based on Aperiodic Updates, to appear in DASFAA’04, Jeju, Korea, March, 2004, extended version is under communication in IEEE TMC.
Hauben, Michael. History of ARPANET, www.dei.isep.ipp.pt/docs/arpa.html
Honigsberg, Peter Jan The Evolution and Revolution of Napster University of San Fran-cisco Law Review, Vol. 36, 2002.
Kalepu, S., Krishnaswamy, S. and Loke, S. 2004, Reputation = Uer Ranking, Compliance, Verity, Proc. IEEE Intl Cong on Web Services.
Kamvar, S.D., Schlosser, M.T., and Garcia-Molina, H., 2003, The EigenTrust algorithm for reputation management in P2P networks, in Proc. 12th Intl WWW Conference.
Karl, A., et. al., 2002, Advanced peer-to-peer networking: The P-Grid systems and its applications, http://www.p-grid.org/Papers/TR-IC-2002-73.pdf.
KaZaA-Wikipedia, http://en.wikipedia.org/wiki/KaZaA.
Klemm, A., Lindemann, C, and Waldhorst, O., 2003, A special-purpose peer-to-peer file sharing system for mobile ad hoc networks, Proc. IEEE Semiannual Vehicular Technology Conference (VTC2003-Fall), Orlando, FL.
Kubiatowicz, J., Bindel, D., Chen, Y., Czerwinski, S., Eaton, P., Geels, D., Gummadi, R., Rhea, R., Weatherspoon, H., Weimer, W., Wells, C, and Zhao, B., 2000, OceanStore: An architecture for global-scale persistent storage, Proceedings of 9th International Conference On Architectural Support for Programming Languages and Op. Sys (ASPLOS 2000).
Kwansei, www.ksc.kwansei.ac.jp/researchfairO2/O3/website/history.htm, 2002.
www.limewire.com/english/content/home.shtml
Li, N., Winsborough, W.H., and Mitchell, J.C., Distributed credential chain discovery in trust management: extended abstract, ACM Conference on Computer and Communications Security, 2001
Liang J., Kumar R. and Ross K.W., 2004a, Understanding KaZaA, Working Paper.
Maher, D., Trust in the new information age,. AT&T Technical Journal, 73(5), 1994
Malaga R.A., 2001, Web-based reputation management systems: problems and suggested solutions, Electronic Commerce Research, 1(4).
Marsh, S. 1994, Formalising Trust as a Computational Concept, PhD Dissertation, University of Stirling.
Milojicic D. S., Kalogeraki V., Lukose R., Nagaraja K., Pruyne J., Richard B., Rollins S., and Xu, Z., 2002, Peer-to-Peer computing, HP Labs Technical Report, http://www.hpl.hp.com/techreports/2002/HPL-2002-57.pdf.
Nadeau, B., What is peer-to-peer networking? http://anet.sourceforge.net/docs/devel/intro/p2p.html, 2001.
Mac-P2P.com, 2003, Peer to Peer (P2P) Introduction and History, http://www.mac-p2p.com/p2p-history.
mutella.sourceforge.net/
Noam, Eli M (ed), Ithiel de Sola Pool, Technologies Without Boundaries, Cambridge, Mass.: Harvard University Press, 1990.
Patrick, A. 2002. Building Trustworthy Software Agents. IEEE Internet Computing, Nov–Dec 02, 46–53.
Portman, M. Sookavatana, P. Ardon, S. and Seneviratne, A. 2001. The Cost of Peer Dis-covery and Searching in the Gnutella Peer-to-peer File Sharing Protocol, In Proceedings to the IEEE International Conference on Networks, Vol. 1.
Ratnasamy, Sylvia, Paul Francis, Mark Handley, Richard Karp, and Scott Shenker. A scalable content-addressable network. In Proc. ACM SIGCOMM’01, San Diego, California, August 2001.
Resnick, P., Kuwabara, K., Zeckhauser, R., and Friedman, E., 2000, Reputation systems, Communications of the ACM, 43(12).
Rhea, S., Wells, C, Eaton, P., Geels, D., Zhao, B., Weatherspoon, H., and Kubiatowicz, J., 2001, Maintenance-free global data storage, Internet Computing, 5(4).
Rowstron, Antony and Peter Druschel. Pastry: Scalable, distributed object location and routing for large-scale peer-to-peer systems. In Proc. IFIP/ACM Middleware 2001, Heidelberg, Germany, November 2001.
De Santis, L., Scannapieco, M., and Catarci, X, 2003, A trust model for tightly coupled P2P systems. SEBD.
Schollmeier, R., 2001, A definition of peer-to-peer networking for the classification of peer-to-peer architecture and applications. Proc. 1st Int. Conf. On Peer-to-Peer Computing Linköping, Sweden, August 27–29, 2001.
Shirky, C, 2000, What’s P2P and what’s not, www.openp2p.com/pub/a/p2p/2000/ll/24/shirkyl-whatisp2p.html.
Simon, S., 1991, Peer-to-Peer Network Management in an IBM SNA Network, IEEE Network Magazine.
Sims, D., (ed), 2000, O’Reilly P2P directory www.openp2p.com/pub/q/p2p_category.
SourceForge, The Annotated Gnutella Protocol Specification v0.4, http://rfc-gnutella.sourceforge.net/developer/stable/index.html.
SourceForge, 2005, RFC-Gnutella 0.6, http://rfcgnutella.sourceforge.net/developer/testing/.
Vassileva, J., 2002, Supporting Peer-to-Peer User Communities, in Proc of Confederated Intl Conferences (CoopIS/DOA/ODBASE 2002), Irvine, California, USA, October 30–November 1, 2002, LNCS, Vol. 2519, Springer.
Wang, Y., and Vassileva, J., 2003, Trust and reputation in peer-to-peer networks, Proc Third Intl Conference on Peer-to-Peer Computing (P2P’03), Linköping, Sweden.
Xiong, L., and Ling Liu., 2004, PeerTrust: Supporting Reputation Based Trust for Peer-to-Peer Electronic Communities, IEEE Transactions on Knowledge and Data Engineering (TKDE), Special Issue on Peer-to-Peer Based Data Management, 16(7).
Yang, B., and Garcia-Molina, H., 2001, Comparing Hybrid Peer-to-Peer Systems, in Proceedings of 27th International Conference on Very Large Data Bases, Rome Italy.
Young, K., 1993, Look no Server (peer-to-peer networks), Network, 21(2).
Yu, B., and Singh, M.P., 2000, A Social Mechanism of Reputation Management in Elec-tronic Communities, in Proc of 7th Intl Conference on Cooperative Information Systems (Coopis’00), Israel.
Zhao, B., and Joseph, A., 2001, Tapestry: An infrastructure for fault-tolerant widearea location and routing, Computer Sc. Division, Univ. of California, Berkeley, TR UCB/CSD-01-1141.
Zhong, Y., Lu, Y., and Bhargava, B., 2003, Dynamic trust production based on interaction sequence, Technical Report CSD TR 03-006, Department of Computer Sciences, Purdue University.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2007 Springer Science+Business Media, LLC
About this chapter
Cite this chapter
Bearly, T., Kumar, V. (2007). Building Trust and Security in Peer-to-Peer Systems. In: Yu, T., Jajodia, S. (eds) Secure Data Management in Decentralized Systems. Advances in Information Security, vol 33. Springer, Boston, MA. https://doi.org/10.1007/978-0-387-27696-0_8
Download citation
DOI: https://doi.org/10.1007/978-0-387-27696-0_8
Publisher Name: Springer, Boston, MA
Print ISBN: 978-0-387-27694-6
Online ISBN: 978-0-387-27696-0
eBook Packages: Computer ScienceComputer Science (R0)