Skip to main content

Building Trust and Security in Peer-to-Peer Systems

  • Chapter
Secure Data Management in Decentralized Systems

Part of the book series: Advances in Information Security ((ADIS,volume 33))

  • 659 Accesses

Abstract

The popularity and wide spread usage of peer-to-peer (P2P) systems has soared over the past several years. Throughout the evolution of P2P systems the definition of P2P has changed along with the software architecture of the various P2P applications. While the initial popular usage of P2P systems was for file sharing (more specifically the sharing of music files in mp3 format) [4] the problem domain that P2P systems address today cover the range from data sharing to collaboration to distributed computing and beyond. For the continued increased usage of P2P systems, the need for security and trust arises. This chapter covers evolution of P2P systems through the examination of Napster, Gnutella, KaZaa, and BitTorrent [9], system capabilities and shortcomings, and security needs, which highlights the need for trust in P2P systems. With this basis we then present our vision for trust and security followed by a literature review of trust in P2P systems. We then introduce and develop a Universal Trust Set as a foundation for building trustworthy environment, and then our approach for implementing the set, and the future of P2P systems where we will discuss other open issues that need addressing. We close this chapter with some concluding remarks.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 89.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 119.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Abdul-Rahman, A., and Hailes, S., 2000, Supporting trust in virtual communities. In: Proceedings of the 33rd Hawaii International Conference on Systems Sciences.

    Google Scholar 

  2. Aberer, K., and Despotovic, Z., 2001, Managing trust in a peer-2-peer information system, CIKM’01, Atlanta, Georgia.

    Google Scholar 

  3. acquisitionx.borgfind.com/

    Google Scholar 

  4. Alexander, Peter J. Peer-to-Peer File Sharing: The Case of the Music Recording Industry, Review of Industrial Organization. Springer Science and Business Media B.V., Issue: Volume 20, Number 2, March 2002

    Google Scholar 

  5. Assedin, F., and Mahewsaran, M., 2003, Trust modeling for peer-to-peer based computing systems, Proc. Intl. Parallel and Distributed Processing Symposium.

    Google Scholar 

  6. Bearly, T., Kumar, V., Expanding Trust Beyond Reputation in Peer-To-Peer Systems. In: Proceeding of 15th Intl. Workshop on Database and Expert Systems Applications (DEXA 2004). Vol 00, Zaragoza, Spain.

    Google Scholar 

  7. www.freepeers.com/products.htm

    Google Scholar 

  8. Bhargava, B., and Zhong, Y., 2002, Authorization Based Evidence and Trust, in Proceedings of International Conference on Data Warehousing and Knowledge Discovery (DAWAK’2002), LNCS, Vol. 2454, France.

    Google Scholar 

  9. BitTorrent-Wikipedia, 2003, http://en.wikipedia.org/wiki/Bittorrent.

    Google Scholar 

  10. Blaze, M., Lacy, J., London, T., and Reiter, M., 1994, Issues and Mechanisms for Trust-worthy Systems: Creating Transparent Mistrust. AT&T Technical Journal, 73(5).

    Google Scholar 

  11. CacheLogic press release, 2004, http://www.cachelogic.com/news/pr040715.php.

    Google Scholar 

  12. Castano, S., Fugini, M., Martella, G., and Samarati, P., 1994, Database Security, Addison Wesley & ACM Press, Reading, MA.

    Google Scholar 

  13. Castrol, Miguel, Peter Druschel2, Ayalvadi Ganeshl, Antony Rowstronl and Dan S. Wallach2, Secure routing for structured peer-to-peer overlay networks_Proc. of the 5th Usenix Symposium on Operating Systems Design and Implementation, Boston, MA, December 2002.

    Google Scholar 

  14. Chen, M., and Singh, J.P., 2001, Computing and using reputations of internet ratings, in Proceedings of 3rd ACM International Conference on E-Commerce.

    Google Scholar 

  15. Chen, R., and Yeager, W., 2000, Poblano: A Distributed Trust Model for Peer-to-Peer Networks, Sun Microsystems Technical Paper www.jxta.org/project/docs/trust.pdf.

    Google Scholar 

  16. Datta, A., Hauswirth, M., and Aberer, K., 2003, Beyond “web of trust”: Enabling P2P E-commerce. CEC.

    Google Scholar 

  17. en.wikipedia.org/wiki/Digital_signature

    Google Scholar 

  18. Douceur, J. 2002, The Sybil Attack, Proc. of First International Workshop on Peer-to-Peer Systems’ 02, Cambridge, MA.

    Google Scholar 

  19. Druschel, P., and Rowstron, A., 2001, PAST: A large scale, persistent peer-to-peer storage utility, HotOS VIII, Schloss Elmau, Germany.

    Google Scholar 

  20. FastTrack-Wikipedia; http://en.wikipedia.org/wiki/FastTrack.

    Google Scholar 

  21. taxster.fateback.com/gnotella.htm

    Google Scholar 

  22. Gnutella-Wikipedia, http://en.wikipedia.org/wiki/Gnutella.

    Google Scholar 

  23. Gnutella 0.6-Defining a standard, http://rfc-gnutella.sourceforge. net/developer/index.html.

    Google Scholar 

  24. en.wikipedia.org/wiki/Gtk-gnutella

    Google Scholar 

  25. Guha, R., Kumar, R., Raghavan, P., and Tomkins, A., 2004, Propagation of trust and distrust, WWW 2004, New York.

    Google Scholar 

  26. Guillarmod, F. Jacot, From FidoNet to Internet: the evolution of a national network”, Proceedings of INET’92, H. Ishida Editor.

    Google Scholar 

  27. Hara, T. and Madria, S. 2004. Dynamic Data Replication Schemes for Mobile Ad-hoc Network Based on Aperiodic Updates, to appear in DASFAA’04, Jeju, Korea, March, 2004, extended version is under communication in IEEE TMC.

    Google Scholar 

  28. Hauben, Michael. History of ARPANET, www.dei.isep.ipp.pt/docs/arpa.html

    Google Scholar 

  29. Honigsberg, Peter Jan The Evolution and Revolution of Napster University of San Fran-cisco Law Review, Vol. 36, 2002.

    Google Scholar 

  30. Kalepu, S., Krishnaswamy, S. and Loke, S. 2004, Reputation = Uer Ranking, Compliance, Verity, Proc. IEEE Intl Cong on Web Services.

    Google Scholar 

  31. Kamvar, S.D., Schlosser, M.T., and Garcia-Molina, H., 2003, The EigenTrust algorithm for reputation management in P2P networks, in Proc. 12th Intl WWW Conference.

    Google Scholar 

  32. Karl, A., et. al., 2002, Advanced peer-to-peer networking: The P-Grid systems and its applications, http://www.p-grid.org/Papers/TR-IC-2002-73.pdf.

    Google Scholar 

  33. KaZaA-Wikipedia, http://en.wikipedia.org/wiki/KaZaA.

    Google Scholar 

  34. Klemm, A., Lindemann, C, and Waldhorst, O., 2003, A special-purpose peer-to-peer file sharing system for mobile ad hoc networks, Proc. IEEE Semiannual Vehicular Technology Conference (VTC2003-Fall), Orlando, FL.

    Google Scholar 

  35. Kubiatowicz, J., Bindel, D., Chen, Y., Czerwinski, S., Eaton, P., Geels, D., Gummadi, R., Rhea, R., Weatherspoon, H., Weimer, W., Wells, C, and Zhao, B., 2000, OceanStore: An architecture for global-scale persistent storage, Proceedings of 9th International Conference On Architectural Support for Programming Languages and Op. Sys (ASPLOS 2000).

    Google Scholar 

  36. Kwansei, www.ksc.kwansei.ac.jp/researchfairO2/O3/website/history.htm, 2002.

    Google Scholar 

  37. www.limewire.com/english/content/home.shtml

    Google Scholar 

  38. Li, N., Winsborough, W.H., and Mitchell, J.C., Distributed credential chain discovery in trust management: extended abstract, ACM Conference on Computer and Communications Security, 2001

    Google Scholar 

  39. Liang J., Kumar R. and Ross K.W., 2004a, Understanding KaZaA, Working Paper.

    Google Scholar 

  40. Maher, D., Trust in the new information age,. AT&T Technical Journal, 73(5), 1994

    Google Scholar 

  41. Malaga R.A., 2001, Web-based reputation management systems: problems and suggested solutions, Electronic Commerce Research, 1(4).

    Google Scholar 

  42. Marsh, S. 1994, Formalising Trust as a Computational Concept, PhD Dissertation, University of Stirling.

    Google Scholar 

  43. Milojicic D. S., Kalogeraki V., Lukose R., Nagaraja K., Pruyne J., Richard B., Rollins S., and Xu, Z., 2002, Peer-to-Peer computing, HP Labs Technical Report, http://www.hpl.hp.com/techreports/2002/HPL-2002-57.pdf.

    Google Scholar 

  44. Nadeau, B., What is peer-to-peer networking? http://anet.sourceforge.net/docs/devel/intro/p2p.html, 2001.

    Google Scholar 

  45. Mac-P2P.com, 2003, Peer to Peer (P2P) Introduction and History, http://www.mac-p2p.com/p2p-history.

    Google Scholar 

  46. mutella.sourceforge.net/

    Google Scholar 

  47. Noam, Eli M (ed), Ithiel de Sola Pool, Technologies Without Boundaries, Cambridge, Mass.: Harvard University Press, 1990.

    Google Scholar 

  48. Patrick, A. 2002. Building Trustworthy Software Agents. IEEE Internet Computing, Nov–Dec 02, 46–53.

    Google Scholar 

  49. Portman, M. Sookavatana, P. Ardon, S. and Seneviratne, A. 2001. The Cost of Peer Dis-covery and Searching in the Gnutella Peer-to-peer File Sharing Protocol, In Proceedings to the IEEE International Conference on Networks, Vol. 1.

    Google Scholar 

  50. Ratnasamy, Sylvia, Paul Francis, Mark Handley, Richard Karp, and Scott Shenker. A scalable content-addressable network. In Proc. ACM SIGCOMM’01, San Diego, California, August 2001.

    Google Scholar 

  51. Resnick, P., Kuwabara, K., Zeckhauser, R., and Friedman, E., 2000, Reputation systems, Communications of the ACM, 43(12).

    Google Scholar 

  52. Rhea, S., Wells, C, Eaton, P., Geels, D., Zhao, B., Weatherspoon, H., and Kubiatowicz, J., 2001, Maintenance-free global data storage, Internet Computing, 5(4).

    Google Scholar 

  53. Rowstron, Antony and Peter Druschel. Pastry: Scalable, distributed object location and routing for large-scale peer-to-peer systems. In Proc. IFIP/ACM Middleware 2001, Heidelberg, Germany, November 2001.

    Google Scholar 

  54. De Santis, L., Scannapieco, M., and Catarci, X, 2003, A trust model for tightly coupled P2P systems. SEBD.

    Google Scholar 

  55. Schollmeier, R., 2001, A definition of peer-to-peer networking for the classification of peer-to-peer architecture and applications. Proc. 1st Int. Conf. On Peer-to-Peer Computing Linköping, Sweden, August 27–29, 2001.

    Google Scholar 

  56. Shirky, C, 2000, What’s P2P and what’s not, www.openp2p.com/pub/a/p2p/2000/ll/24/shirkyl-whatisp2p.html.

    Google Scholar 

  57. Simon, S., 1991, Peer-to-Peer Network Management in an IBM SNA Network, IEEE Network Magazine.

    Google Scholar 

  58. Sims, D., (ed), 2000, O’Reilly P2P directory www.openp2p.com/pub/q/p2p_category.

    Google Scholar 

  59. SourceForge, The Annotated Gnutella Protocol Specification v0.4, http://rfc-gnutella.sourceforge.net/developer/stable/index.html.

    Google Scholar 

  60. SourceForge, 2005, RFC-Gnutella 0.6, http://rfcgnutella.sourceforge.net/developer/testing/.

    Google Scholar 

  61. Vassileva, J., 2002, Supporting Peer-to-Peer User Communities, in Proc of Confederated Intl Conferences (CoopIS/DOA/ODBASE 2002), Irvine, California, USA, October 30–November 1, 2002, LNCS, Vol. 2519, Springer.

    Google Scholar 

  62. Wang, Y., and Vassileva, J., 2003, Trust and reputation in peer-to-peer networks, Proc Third Intl Conference on Peer-to-Peer Computing (P2P’03), Linköping, Sweden.

    Google Scholar 

  63. Xiong, L., and Ling Liu., 2004, PeerTrust: Supporting Reputation Based Trust for Peer-to-Peer Electronic Communities, IEEE Transactions on Knowledge and Data Engineering (TKDE), Special Issue on Peer-to-Peer Based Data Management, 16(7).

    Google Scholar 

  64. Yang, B., and Garcia-Molina, H., 2001, Comparing Hybrid Peer-to-Peer Systems, in Proceedings of 27th International Conference on Very Large Data Bases, Rome Italy.

    Google Scholar 

  65. Young, K., 1993, Look no Server (peer-to-peer networks), Network, 21(2).

    Google Scholar 

  66. Yu, B., and Singh, M.P., 2000, A Social Mechanism of Reputation Management in Elec-tronic Communities, in Proc of 7th Intl Conference on Cooperative Information Systems (Coopis’00), Israel.

    Google Scholar 

  67. Zhao, B., and Joseph, A., 2001, Tapestry: An infrastructure for fault-tolerant widearea location and routing, Computer Sc. Division, Univ. of California, Berkeley, TR UCB/CSD-01-1141.

    Google Scholar 

  68. Zhong, Y., Lu, Y., and Bhargava, B., 2003, Dynamic trust production based on interaction sequence, Technical Report CSD TR 03-006, Department of Computer Sciences, Purdue University.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2007 Springer Science+Business Media, LLC

About this chapter

Cite this chapter

Bearly, T., Kumar, V. (2007). Building Trust and Security in Peer-to-Peer Systems. In: Yu, T., Jajodia, S. (eds) Secure Data Management in Decentralized Systems. Advances in Information Security, vol 33. Springer, Boston, MA. https://doi.org/10.1007/978-0-387-27696-0_8

Download citation

  • DOI: https://doi.org/10.1007/978-0-387-27696-0_8

  • Publisher Name: Springer, Boston, MA

  • Print ISBN: 978-0-387-27694-6

  • Online ISBN: 978-0-387-27696-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics