Abstract
The peer-to-peer applications have recently seen an enormous success and spread over the Internet community which showed a dramatic change in the current client-server paradigm; that caused the appearance of some new concepts and protocols. One of the main new concepts introduced is the user anonymity which is in spite of being considered one of the main characteristics of the peer-to-peer paradigm it has introduced a serious security flaw due to the missing of trust between the participants in the system. This paper proposes an approach for peer-to-peer security, where the system participants can establish a trust relationship between each others based on their reputation gained by the participation in the system. The proposed technique relays on the concept of the recommendation cards. This paper discusses this technique and how to apply it to a peer-to-peer file sharing application.
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Abdul-Rahman, Hailes, S.: Supporting trust in virtual communities. In: Proceedings of the Hawaii International Conference on System Sciences, Maui, Hawaii, January 4-7 (2000)
Singh, A., Liu, L.: TrustMe: Anonymous management of Trust Relationships in Decentralized p2p systems. In: Proc. of IEEE Third International Conference on Peer-to-Peer Computing (P2P 2003), Linköping, Sweden, September 01 - 03 (2003)
Adar, E., Huberman, B.: Free riding on gnutella, Technical report, Xerox PARC (August 2000)
Damiani, E., di Vimercati, D.C., Paraboschi, S., Samarati, P., Violante, F.: A Reputation-Based Approach for choosing Reliable Resources in Peer-to-peer networks. In: Proceedings of the 9th ACM conference on computer and communication security, pp. 207–216. ACM Press, New York (2002)
Azzedin, F., Maheswaran, M.: Evolving and Managing Trust in Grid Computing Systems. In: IEEE Canadian Conference on Electrical and Computer Engineering (CCECE 2002) (May 2002)
Cornelli, F., Damiani, E., Ghorbani, A.: Implementing a Reputation Aware Gnutella Servent. In: Proceedings of the International Workshop on peer-to-peer Computing Pisa, Italy, May 24 (2002)
Cornelli, F., Damiani, E., De Capitani di Vimercati, S., Paraboschi, S., Samarati, P.: Choosing reputable servents in a P2P network. In: Proc. of the Eleventh International World Wide Web Conference, Honolulu, Hawaii (May 2002)
Freenet Homepage, http://freenet.sourceforge.net
Gnutella Homepage, http://gnutella.wego.com
Clarke: A decentralized information storage and retrieval system, Master’s thesis, university of Edinburgh (1999)
Clarke, Sandberg, O., Wiley, B., Hong, T.W.: Freenet: A distributed anonymous information storage and retrieval system. In: Proceedings of the ICSI workshop on design issues in anonymity and Unobservability, Berkeley, California (June 2000)
Stoica, R., Morries, D., Karger, M.F.: A scalable peer-to-peer lookup service for internet applications. In: Proc. of ACM SIGCOMM 2001 (August 2001)
Carter, J., Bitting, E., Ghorbani, A.: Reputation Formalization for an information-sharing Multi-peer System. Computational Intelligence 18(4), 515–534 (2002)
Douceur, J.: The sybil attack. In: Druschel, P., Kaashoek, M.F., Rowstron, A. (eds.) IPTPS 2002. LNCS, vol. 2429, p. 251. Springer, Heidelberg (2002)
Aberer, K., Desporovic, Z.: Managing trust in a peer-to-peer information system. In: Proc. of the Hawaii International Conference on System Sciences, Maui, Hawaii (January 2000)
Kazaa homepage, http://www.kazaa.com
Montaner, M., Lopez, B.: Opinion-based filtering through trust. In: Klusch, M., Ossowski, S., Shehory, O. (eds.) CIA 2002. LNCS (LNAI), vol. 2446, p. 164. Springer, Heidelberg (2002)
Schlosser, M.T., Condie, T.E., Kamvar, S.D.: Simulating A File-Sharing P2P Network. In: 1st Workshop on Semantics in Grid and P2P Networks, Budapest, Hungary, May 20 (2003)
Microsoft Network Messenger Homepage, http://messenger.msn.com
MiloJicic, D.S., Kalogeraki, V., Luckose, R.: peer-to-peer Computing, Tech Report:HPL-2002-57, available online at, http://www.hpl.hp.com/techreports/2002/HPL-2002-57.pdf
Napster Homepage, http://www.napster.com
Van Oorschot, P.C., Menezes, A.J., Vanstone, S.A.: Handbook of Applied Cryptography. CRC Press, Boca Raton (1996)
Dingledine, R., Molnar, D., Freedman, M.J.: The Free Haven project: Distributed anonymous storage service. In: Proceedings of the workshop on Design Issues in Anonymity and Unobservability (July 2000)
Kamvar, S., Schlosser, M., Garcia-Molina, H.: Eigenrep: Reputation management in p2p networks. In: Twelfth International World Wide Web conference (2003)
Marsh, S.: Formalizing trust as a computational concept, PhD. Thesis, university of Stirling (1994)
Saroiu, S., Gummadi, P.K., Gribble, S.D.: A measurement study of peer-to-peer file sharing systems. In: Proceedings of Multimedia Computing and Networking 2002 (MMCN 2002), San Jose, CA,USA (January 2002)
SETI@HOME: THE Search for Extraterrestrial Intelligence at Home, http://setiathome.berkely.edu/
Wang, Y., Vassileva, J.: Bayesian Network Trust Model in Peer-to-Peer Networks. In: Proceedings of second international workshop on peers and peer-to-peer computing, Melbourne, Australia (July 14, 2003)
Yahoo Messenger Homepage, http://www.yahoo.com
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Samuel, H.A., Dakroury, Y.H., Shahein, H.I. (2005). Recard: Using Recommendation Cards Approach for Building Trust in Peer-to-Peer Networks. In: Deng, R.H., Bao, F., Pang, H., Zhou, J. (eds) Information Security Practice and Experience. ISPEC 2005. Lecture Notes in Computer Science, vol 3439. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-31979-5_24
Download citation
DOI: https://doi.org/10.1007/978-3-540-31979-5_24
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-25584-0
Online ISBN: 978-3-540-31979-5
eBook Packages: Computer ScienceComputer Science (R0)