Abstract
File pollution is a problem that is threatening security and availability in peer-to-peer environments, and could eventually be fatal to the survival of these systems. Current methods of fake file detection, which are based on trust mechanisms or file characteristics, do not consider the problems such as interference of multiple user sharing behaviors, the difficulty in obtaining large amounts of raw data, and malicious fraud immediately after version publication. This is the first time that differences in the sharing habits of users and particularly long retention time for individual files have been detected, which impact fake file detection. This paper proposes a pollution prevention model based on multiple user sharing behaviors, which reduces interference in multiple user sharing behaviors and malicious fraud immediately after version publication. It designs a low-cost implementation mechanism for use in structured peer-to-peer networks, which automatically collects a large amount of user file-sharing information and alleviates difficulties in obtaining large quantities of raw data. A parameter configuration is also given in this paper. Simulation experiments use realistic system logs and prove that this approach detects fake files accurately and quickly, thus decreasing download times of fake files, effectively guaranteeing almost 100% real file downloads and resisting file pollution.
Similar content being viewed by others
References
Liang J, Kumar R, Xi Y, et al. Pollution in P2P file sharing system. In: IEEE INFOCOM 2005. Miami: IEEE Press, 2005. 1174–1185
Feng Q Y, Dai Y F. LIP: a lifetime and popularity based ranking approach to filter out fake files in P2P file sharing systems. In: IPTPS 2007, Bellevue, Washington, USA, 2007
Feng Q Y, Dai Y F. Survey of trust mechanism in P2P networks (in Chinese). Commun CCF, 2007, 3: 31–40
Dou W, Wang H M, Jia Y, et al. A recommendation-based peer-to-peer trust model (in Chinese). J Software, 2004, 15: 571–583
Li J T, Jing Y N, Xiao X C, et al. A trust model based on similarity-weighted recommendation for P2P environments (in Chinese). J Software, 2007, 18: 157–167
Sepandar D K, Mario T S, Hector G M. The Eigentrust algorithm for reputation management in P2P networks. In: www 2003. Budapest: ACM Press, 2003. 640–651
Zhou R F, Hwang K. PowerTrust: a robust and scalable reputation system for trusted peer-to-peer computing. IEEE Trans Paral Distr Syst, 2007, 18: 460–473
Zhou R F, Hwang K, Cai M. GossipTrust for fast reputation aggregation in peer-to-peer networks. IEEE TKDE, 2008, 20: 1282–1295
Srivatsa M, Xiong L, Liu L. TrustGuard: countering vulnerabilities in reputation management for decentralized overlay networks. In: www 2005. New York: ACM Press, 2005. 422–431
Borges A, Almeida J, Campos S. Fighting pollution in P2P live streaming systems. In: ICME 2008. Hanover: IEEE Press, 2008. 481–484
Zhang H, Duan H X, Liu W. RRM: An incentive reputation model for promoting good behaviors in distributed systems. Sci China Ser F-Inf Sci, 2008, 51: 1871–1882
Chen R C, Zhao X, Tang L Y, et al. CuboidTrust: a global reputation-based trust model in peer-to-peer networks. In: ATC 2007. Hong Kong: Lecture Notes in Computer Science, 2007, 4610. 203–215
Costa C, Almeida J. Reputation systems for fighting pollution in peer-to-peer file sharing systems. In: Peer-to-Peer Computing, 2007. Galway: IEEE Press, 2007. 53–60
Shin J, Kim T, Tak S. TrustRRep: an improved reputation management scheme for reliable resource sharing in peer-to-peer networks. In: APNOMS 2008. Beijing: Lecture Notes in Computer Science, 2008, 5297: 112–122
Walsh K, Sirer E G. Fighting peer-to-peer SPAM and decoys with object reputation. In: Workshop on the Economics of Peer-to-Peer Systems 2005. Philadelphia: ACM Press, 2005. 138–143
Walsh K, Sirer E G. Experience with a distributed object reputation system for peer-to-peer filesharing. In: NSDI 2006. San Jose: USENIX Press, 2006. 1–14
Zuo M, Ma Y H, Chbeir R, et al. Combating P2P file pollution with co-alerting. In: SITIS 2007. Shanghai: IEEE Press, 2007. 289–297
Cai Z H, Chen R C, Feng J Q, et al. A holistic mechanism against file pollution in peer-to-peer networks. In: SAC 2009. Hawaii: ACM Press, 2009. 28–34
Pucha H, Andersen D G, Kaminsky M. Exploiting similarity for multi-source downloads using file handprints. In: NDSI 2007. Cambridge: USENIX Press, 2007. 15–18
Resnick P, Zeckhauser R. Trust among strangers in internet transactions: empirical analysis of eBay’s reputation system. Adv Appl Microeconom, 2002, 11: 127–157
Li Y J, Dai Y F. Research on trust mechanism for peer-to-peer network (in Chinese). Chinese J Comput, 2010, 33: 390–405
Adar E, Huberman B A. Free riding on Gnutella. First Monday, 2000, 5(10)
Hughes D, Coulson G, Walkerdine J. Freeriding on gnutella revisit: The bell tolls? IEEE Distrib Syst Online, 2005, 6: 182–192
Yang M, Zhang Z, Li X M, et al. An empirical study of free-riding behavior in the Maze P2P file-sharing system. In: IPTPS 2005. New York: Peer-to-Peer Systems IV, 2005, 2640: 182–192
Huang G. STPC: a robust incentive mechanism for improving DHT-based peer-to-peer systems. Master thesis of computer science. Vancouver: University of British Columbia, 2003. 1–62
Chen G H, Li Z H. Peer-to-Peer Network: Structure, Application and Design (in Chinese). Beijing: Tsinghua University Press, 2007. 82–166
Fedotova N, Orzetti G, Veltri L, et al. Byzantine agreement for reputation management in DHT-based peer-to-peer networks. In: 15th International Conference on Telecommunications. St Petersburg: IEEE Press, 2008. 1–6
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Jiang, J., Li, Y., Feng, Q. et al. A multiple user sharing behaviors based approach for fake file detection in P2P environments. Sci. China Inf. Sci. 53, 2169–2184 (2010). https://doi.org/10.1007/s11432-010-4087-5
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11432-010-4087-5