Skip to main content
Log in

A multiple user sharing behaviors based approach for fake file detection in P2P environments

  • Research Papers
  • Published:
Science China Information Sciences Aims and scope Submit manuscript

Abstract

File pollution is a problem that is threatening security and availability in peer-to-peer environments, and could eventually be fatal to the survival of these systems. Current methods of fake file detection, which are based on trust mechanisms or file characteristics, do not consider the problems such as interference of multiple user sharing behaviors, the difficulty in obtaining large amounts of raw data, and malicious fraud immediately after version publication. This is the first time that differences in the sharing habits of users and particularly long retention time for individual files have been detected, which impact fake file detection. This paper proposes a pollution prevention model based on multiple user sharing behaviors, which reduces interference in multiple user sharing behaviors and malicious fraud immediately after version publication. It designs a low-cost implementation mechanism for use in structured peer-to-peer networks, which automatically collects a large amount of user file-sharing information and alleviates difficulties in obtaining large quantities of raw data. A parameter configuration is also given in this paper. Simulation experiments use realistic system logs and prove that this approach detects fake files accurately and quickly, thus decreasing download times of fake files, effectively guaranteeing almost 100% real file downloads and resisting file pollution.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Liang J, Kumar R, Xi Y, et al. Pollution in P2P file sharing system. In: IEEE INFOCOM 2005. Miami: IEEE Press, 2005. 1174–1185

    Google Scholar 

  2. Feng Q Y, Dai Y F. LIP: a lifetime and popularity based ranking approach to filter out fake files in P2P file sharing systems. In: IPTPS 2007, Bellevue, Washington, USA, 2007

  3. Feng Q Y, Dai Y F. Survey of trust mechanism in P2P networks (in Chinese). Commun CCF, 2007, 3: 31–40

    Google Scholar 

  4. Dou W, Wang H M, Jia Y, et al. A recommendation-based peer-to-peer trust model (in Chinese). J Software, 2004, 15: 571–583

    MATH  MathSciNet  Google Scholar 

  5. Li J T, Jing Y N, Xiao X C, et al. A trust model based on similarity-weighted recommendation for P2P environments (in Chinese). J Software, 2007, 18: 157–167

    Article  Google Scholar 

  6. Sepandar D K, Mario T S, Hector G M. The Eigentrust algorithm for reputation management in P2P networks. In: www 2003. Budapest: ACM Press, 2003. 640–651

    Google Scholar 

  7. Zhou R F, Hwang K. PowerTrust: a robust and scalable reputation system for trusted peer-to-peer computing. IEEE Trans Paral Distr Syst, 2007, 18: 460–473

    Article  Google Scholar 

  8. Zhou R F, Hwang K, Cai M. GossipTrust for fast reputation aggregation in peer-to-peer networks. IEEE TKDE, 2008, 20: 1282–1295

    Google Scholar 

  9. Srivatsa M, Xiong L, Liu L. TrustGuard: countering vulnerabilities in reputation management for decentralized overlay networks. In: www 2005. New York: ACM Press, 2005. 422–431

    Google Scholar 

  10. Borges A, Almeida J, Campos S. Fighting pollution in P2P live streaming systems. In: ICME 2008. Hanover: IEEE Press, 2008. 481–484

    Google Scholar 

  11. Zhang H, Duan H X, Liu W. RRM: An incentive reputation model for promoting good behaviors in distributed systems. Sci China Ser F-Inf Sci, 2008, 51: 1871–1882

    Article  Google Scholar 

  12. Chen R C, Zhao X, Tang L Y, et al. CuboidTrust: a global reputation-based trust model in peer-to-peer networks. In: ATC 2007. Hong Kong: Lecture Notes in Computer Science, 2007, 4610. 203–215

    Google Scholar 

  13. Costa C, Almeida J. Reputation systems for fighting pollution in peer-to-peer file sharing systems. In: Peer-to-Peer Computing, 2007. Galway: IEEE Press, 2007. 53–60

    Google Scholar 

  14. Shin J, Kim T, Tak S. TrustRRep: an improved reputation management scheme for reliable resource sharing in peer-to-peer networks. In: APNOMS 2008. Beijing: Lecture Notes in Computer Science, 2008, 5297: 112–122

    Google Scholar 

  15. Walsh K, Sirer E G. Fighting peer-to-peer SPAM and decoys with object reputation. In: Workshop on the Economics of Peer-to-Peer Systems 2005. Philadelphia: ACM Press, 2005. 138–143

    Google Scholar 

  16. Walsh K, Sirer E G. Experience with a distributed object reputation system for peer-to-peer filesharing. In: NSDI 2006. San Jose: USENIX Press, 2006. 1–14

    Google Scholar 

  17. Zuo M, Ma Y H, Chbeir R, et al. Combating P2P file pollution with co-alerting. In: SITIS 2007. Shanghai: IEEE Press, 2007. 289–297

    Google Scholar 

  18. Cai Z H, Chen R C, Feng J Q, et al. A holistic mechanism against file pollution in peer-to-peer networks. In: SAC 2009. Hawaii: ACM Press, 2009. 28–34

    Chapter  Google Scholar 

  19. Pucha H, Andersen D G, Kaminsky M. Exploiting similarity for multi-source downloads using file handprints. In: NDSI 2007. Cambridge: USENIX Press, 2007. 15–18

    Google Scholar 

  20. Resnick P, Zeckhauser R. Trust among strangers in internet transactions: empirical analysis of eBay’s reputation system. Adv Appl Microeconom, 2002, 11: 127–157

    Article  Google Scholar 

  21. Li Y J, Dai Y F. Research on trust mechanism for peer-to-peer network (in Chinese). Chinese J Comput, 2010, 33: 390–405

    Article  Google Scholar 

  22. Adar E, Huberman B A. Free riding on Gnutella. First Monday, 2000, 5(10)

  23. Hughes D, Coulson G, Walkerdine J. Freeriding on gnutella revisit: The bell tolls? IEEE Distrib Syst Online, 2005, 6: 182–192

    Article  Google Scholar 

  24. Yang M, Zhang Z, Li X M, et al. An empirical study of free-riding behavior in the Maze P2P file-sharing system. In: IPTPS 2005. New York: Peer-to-Peer Systems IV, 2005, 2640: 182–192

    Google Scholar 

  25. Huang G. STPC: a robust incentive mechanism for improving DHT-based peer-to-peer systems. Master thesis of computer science. Vancouver: University of British Columbia, 2003. 1–62

    Google Scholar 

  26. Chen G H, Li Z H. Peer-to-Peer Network: Structure, Application and Design (in Chinese). Beijing: Tsinghua University Press, 2007. 82–166

    Google Scholar 

  27. Fedotova N, Orzetti G, Veltri L, et al. Byzantine agreement for reputation management in DHT-based peer-to-peer networks. In: 15th International Conference on Telecommunications. St Petersburg: IEEE Press, 2008. 1–6

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to YaFei Dai.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Jiang, J., Li, Y., Feng, Q. et al. A multiple user sharing behaviors based approach for fake file detection in P2P environments. Sci. China Inf. Sci. 53, 2169–2184 (2010). https://doi.org/10.1007/s11432-010-4087-5

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11432-010-4087-5

Keywords

Navigation