Abstract
Peer-to-peer (P2P) systems allow users to share resources with little centralized control. Malicious users can abuse the system by contributing polluted resources. Moreover, selfish users may just connect for their own benefits without donating any resources. The concepts of reputation and currency give possible approaches to address these problems. However, to implement these ideas is non-trivial, due to the non-existence of a single trusted party. Existing works circumvent this by placing trust assumption on certain nodes of an overlay network. This work presents a new reputation system and a new currency system. Our designs are simple thanks to the full use of the trust assumption.
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Adar, E., Huberman, B.A.: Free Riding on Gnutella. First Monday 5(10) (October 2000), http://firstmonday.org/issues/issue5_10/adar
Back, A.: Hashcash - a Denial of Service Counter Measure, http://www.hashcash.org/papers/hashcash.pdf
Boneh, D., Gentry, C., Lynn, B., Shacham, H.: Aggregate and Verifiably Encrypted Signatures from Bilinear Maps. In: Biham, E. (ed.) EUROCRPYT 2003. LNCS, vol. 2656, pp. 416–432. Springer, Heidelberg (2003)
Castro, M., Druschel, P., Ganesh, A., Rowstron, A., Wallach, D.S.: Secure Routing for Structured Peer-to-Peer Overlay Networks. SIGOPS Operating Systems Review 36/SI, 299–314 (2002)
Cohen, B.: Incentives Build Robustness in BitTorrent. In: Workshop on Economics of Peer-to-peer Systems (2003)
Damiani, E., De Capitani di Vimercati, S., Paraboschi, S., Samarati, P., Violante, F.: A Reputation-based Approach for Choosing Reliable Resources in Peer-to-Peer Networks. Computer and Communications Security 2002 , 207–216 (2002)
Dwork, C., Goldberg, A., Naor, M.: On Memory-Bound Functions for Fighting Spam. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol. 2729, pp. 426–444. Springer, Heidelberg (2003)
Garcia, F.D., Hoepman, J.-H.: Off-line Karma: A Decentralized Currency for Peer-to-peer and Grid Applications. In: Ioannidis, J., Keromytis, A.D., Yung, M. (eds.) ACNS 2005. LNCS, vol. 3531, pp. 364–377. Springer, Heidelberg (2005)
Garcia-Martinez, A., Chuang, J.: A Cryptographic Reputation Scheme for Peer-to-peer Networks, http://citeseer.ist.psu.edu/550626.html
Gupta, M., Judge, P., Ammar, M.: A Reputation System for Peer-to-Peer Networks. In: NOSSDAV 2003. Network and Operating Systems Support for Digital Audio and Video, pp. 144–152 (2003)
Kamvar, S.D., Schlosser, M.T., Garcia-Molina, H.: The Eigentrust Algorithm for Reputation Management in P2P Networks. In: World Wide Web Conference 2003, pp. 640–651 (2003)
Kirk, P.: Gnutella, http://rfc-gnutella.sourceforge.net
Ratnasamy, S., Francis, P., Handley, M., Karp, R., Shenker, S.: A Scalable Content-Addressable Network. Computer Communication Review 31(4), 161–172
Rowstron, A., Druschel, P.: Pastry: Scalable, Distributed Object Location and Routing for Large-Scale Peer-to-peer Systems. In: Guerraoui, R. (ed.) Middleware 2001. LNCS, vol. 2218, pp. 329–350. Springer, Heidelberg (2001)
Stoica, I., Morris, R., Karger, D., Kaashoek, M.F., Balakrishnan, H.: Chord: A Scalable Peer-to-peer Lookup Service for Internet Applications. In: SIGCOMM 2001, pp. 149–160
Zhao, B.Y., Huang, L., Rhea, S.C., Stribling, J., Joseph, A.D., Kubiatowicz, J.D.: Tapestry: A Global-Scale Overlay for Rapid Service Deployment. IEEE J-SAC 22(1), 41–53 (2004)
KaZaA.com. The Guide - The Glossary: Participation Level, Available at http://www.kazaa.com/us/help/glossary/participation_ratio.htm
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 2007 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Chow, S.S.M. (2007). Running on Karma – P2P Reputation and Currency Systems. In: Bao, F., Ling, S., Okamoto, T., Wang, H., Xing, C. (eds) Cryptology and Network Security. CANS 2007. Lecture Notes in Computer Science, vol 4856. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-76969-9_10
Download citation
DOI: https://doi.org/10.1007/978-3-540-76969-9_10
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-76968-2
Online ISBN: 978-3-540-76969-9
eBook Packages: Computer ScienceComputer Science (R0)