Abstract
In a heterogeneous peer-to-peer network, different peers provide different qualities of service. It will be very helpful if a peer can identify which peers can provide better services than others. In this paper, we design a novel reputation model which enables any peer to calculate a reputation value for any other peer that reflects the quality of service provided by that peer, so as to differentiate peers providing good quality of service from those peers providing poor service. Furthermore, to overcome the problem of malicious recommenda-tions, we propose an auxiliary trust mechanism which calculates a trust value for each peer. Experimental results show that our reputation model achieves a fast convergence speed, and it is also robust against a large portion of malicious peers that provide fraud recommendations.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Meeker, M., Joseph, D.: State of the Internet – Web 2.0. In: Web 2.0 Conference, San Francisco (2006)
Jøsang, A., Ismail, R., Boyd, C.: A Survey of Trust and Reputation Systems for Online Service Provision. Decision Support Systems 43(2), 618–644 (2007)
Kamvar, S.D., Schlosser, M.T., Garcia-Molina, H.: The EigenTrust Algorithm for Reputation Management in P2P Networks. In: Proceedings of the Twelfth International World Wide Web Conference, Budapest, Hungary (2003)
Cornelli, F., Damiani, E., De Capitani, S.: Choosing Reputable Servents in a P2P Network. In: Proceedings of the 11th World Wide Web Conference, Hawaii, USA (2002)
Walsh, K., Sirer, E.G.: Fighting peer-to-peer SPAM and decoys with object reputation. In: Applications, Technologies, Architectures, and Protocols for Computer Communication, pp. 138–143 (2005)
Lee, S., Sherwood, R.: Cooperative peer groups in NICE. In: Proceedings of IEEE Infocom 2003, San Francisco, USA (2003)
Xiong, L., Liu, L.: A Reputation-Based Trust Model for Peer-to-Peer eCommerce Communities. In: IEEE International Conference on E-Commerce (CEC 2003), Newport Beach, CA, USA (2003)
Feng, Q., Dai, Y.: LIP: A LIfetime and Popularity Based Ranking Approach to Filter out Fake Files in P2P File Sharing Systems. Peking University (2006)
Aberer, K., Despotovic, Z.: Managing trust in a peer-2-peer information system. In: 10th Intl Conference on Information and Knowledge Management (CIKM), Atlanta, USA (2001)
Zhou, R., Hwang, K.: PowerTrust: A Robust and Scalable Reputation System for Trusted Peer-to-Peer Computing. IEEE Transactions on Parallel and Distributed Systems 18(4), 460–473 (2007)
Adar, E.: Free Riding on Gnutella (2000), http://www.hpl.hp.com/research/idl/papers/gnutella/gnutella.pdf
Feng, Q.-y., Dai, Y.-f.: P2P network trust mechanism review. Communication of CCF 3, 31–40 (2007)
Zhou, L., Zhang, L., McSherry, F., Immorlica, N., Costa, M., Chien, S.: A First Look at Peer-to-Peer Worms: Threats and Defenses. In: Castro, M., van Renesse, R. (eds.) IPTPS 2005. LNCS, vol. 3640, Springer, Heidelberg (2005)
Christin, N., Weigend, A.S., Chuang, J.: Content availability, pollution and poisoning in file sharing peer-to-peer networks. In: Proceedings of the 6th ACM conference on Electronic commerce (EC 2005), Vancouver, Canada, pp. 68–77 (2005)
Liang, J., Naoumov, N., Ross, K.W.: The Index Poisoning Attack in P2P File-Sharing Systems. In: Proceedings of IEEE Infocom 2006, Barcelona, Spain (2006)
Wilson, R.: Reputation in games and markets. In: Roth, A. (ed.) Game-theoretic models of bargaining, pp. 65–84. Cambridge University Press, New York (1985)
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 2008 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Chen, X., Zhao, K., Chu, X. (2008). SepRep: A Novel Reputation Evaluation Model in Peer-to-Peer Networks. In: Rong, C., Jaatun, M.G., Sandnes, F.E., Yang, L.T., Ma, J. (eds) Autonomic and Trusted Computing. ATC 2008. Lecture Notes in Computer Science, vol 5060. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-69295-9_9
Download citation
DOI: https://doi.org/10.1007/978-3-540-69295-9_9
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-69294-2
Online ISBN: 978-3-540-69295-9
eBook Packages: Computer ScienceComputer Science (R0)