Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
article

A free-rider aware reputation system for peer-to-peer file-sharing networks

Published: 01 March 2011 Publication History

Abstract

Recently, Peer-to-Peer (P2P) networks have widely been used to file-sharing applications due to their decentralized architecture and reliability. The popularization of P2P networks also provides peers with ulterior motive an ideal environment to spread malicious files. In the past, many reputation systems have been proposed to differentiate malicious peers and to stop malicious file spreading. However, these reputation systems do not concern with reducing free riders in P2P networks. Free riders are peers who just download files but do not share anything to other peers. They significantly destroy the philosophy of P2P file-sharing networks. In this paper, we propose a free-rider aware reputation system for P2P file-sharing networks. Indeed, our reputation system can degrade the willing of free riders. Compared to most existing reputation systems, our reputation system provides an easy way to reduce malicious file spreading and free riding.

References

[1]
Aberer, K. (2001). P-Grid: A self-organizing access structure for P2P information systems. In Proceedings of the ninth international conference on cooperative information systems (pp. 179-194).
[2]
Aberer, K., & Despotovic, Z. (2001). Managing trust in a peer-2-peer information system. In Proceedings of the IX international conference on information and knowledge management (pp. 310-317).
[3]
Adar, E., & Huberman, B. (2000). Free Riding on Gnutella. Technical report, Xerox PARC, 10 August.
[4]
Amazon. <http://www.amazon.com>.
[5]
Arora, N., &amp; Shyamasundar, R. K. (2005). PGSP: A protocol for secure communication in peer-to-peer system. In Proceedings of wireless communications and networking conference(pp. 2094-2099).
[6]
Asvanund, A., Bagla, S., Kapadia, M.H., Krishnan, R., Smith, M.D., &amp; Telang, R. (2003). Intelligent club management in peer-to-peer networks. In Proceedings of the workshop on economics of peer to peer systems (pp. 562-570).
[7]
Braun, T., &amp; Kim, H. (2005). Efficient authentication and authorization of mobile users based on peer-to-peer network mechanisms. In Proceedings of the 38th Hawaii international conference on system sciences Vol. 9 (pp. 306.2).
[8]
Buchegger, S., &amp; Boudec, J.L. (2004). A robust reputation system for p2p and mobile ad hoc networks. In Second workshop on economics of P2P systems.
[9]
Castro, M., Druschel, P., Ganesh, A., Rowstron, A., &amp; Wallach, D.S. (2002). Secure routing for structured P2P overlay networks. In Proceedings of the 5th usenix symposium on operating systems design and implementation (pp. 299-314).
[10]
Cooperative learning in E-learning A peer assessment of student-centered using consistent fuzzy preference. Expert Systems with Applications. v36 i4. 8342-8349.
[11]
Clarke, I., Sandberg, O., Wiley, B., &amp; Hong, T. (2000). Freenet: A distributed anonymous information storage and retrieval system. In Proceedings of the ICSI workshop on design issues in anonymity and unobservability (pp. 46-66).
[12]
Cornelli, F., Damiani, E., Vimercati, S.D.C., Paraboschi, S., &amp; Samarati, P. (2002). Choosing reputable servents in a P2P network. In Proceedings of the eleventh international conference on World Wide Web (pp. 376-386).
[13]
Managing and sharing servants' reputations in P2P systems. IEEE Transactions on Knowledge and Data Engineering. v15 i4. 840-854.
[14]
Daswani, N., &amp; Garcia-Molina, H. (2002). Query-flood DoS attacks in Gnutella. In Proceedings of the ninth ACM conference on computer and communications security (pp. 181-192).
[15]
Dewan, P., &amp; Dasgupta, P. (2004). Securing reputation data in peer-to-peer networks. In Proceedings of international conference on parallel and distributed computing and systems (pp. 1-10).
[16]
Douceur, J. (2002). The sybil attack. In IPTPS02 workshop (pp. 251-260).
[17]
eBay. <http://www.ebay.com>.
[18]
Genome@home. <http://genomeathome.stanford.edu>.
[19]
Gnutella. <http://www.gnutella.com>.
[20]
Free riding on Gnutella revisited: The bell tolls?. IEEE Distributed Systems Online. v6 i6.
[21]
Kamvar, S.D., Schlosser, M.T., &amp; Garcia-Molina, H. (2003). The eigentrust algorithm for reputation management in P2P networks. In Proceedings of the twelfth international world wide web conference (pp. 640-651).
[22]
Kim, W., Graupner, S., &amp; Sahai, A. (2002). A secure platform for peer-to-peer computing in the internet. In Proceedings of the 35th annual Hawaii international conference on system sciences (pp. 3948-3957).
[23]
Lee, S.Y., Kwon, O.H., Kim, J., &amp; Hong, S.J. (2005). A reputation management system in structured peer-to-peer networks. In Proceedings of the 14th IEEE international workshops on enabling technologies: Infrastructure for collaborative enterprise (pp. 362-367).
[24]
Liu, X., &amp; Xiao, L. (2006). hiREP: Hierarchical reputation management for peer-to-peer systems. In Proceedings of the 2006 international conference on parallel processing (pp. 289-296).
[25]
MSN. <http://get.live.com/messenger>.
[26]
Napster. <http://www.napster.com>.
[27]
Rowstron, A., &amp; Druschel, P. (2001). Pastry: Scalable, distributed object location and routing for large-scale peer-to-peer systems. In Proceedings of the IFIP/ACM middleware (pp. 329-350).
[28]
Seti@home. <http://setiathome.berkeley.edu>.
[29]
Sieka, B., Kshemkalyani, A.D., &amp; Singhaly, M. (2004). On the security of polling protocols in peer-to-peer systems. In Proceedings of the fourth international conference on peer-to-peer computing (pp. 36-44).
[30]
Singh, A., &amp; Liu, L. (2003). TrustMe: Anonymous management of trust relationships in decentralized P2P systems, In Proceedings of the third IEEE international conference on P2P computing (pp. 142-149).
[31]
Security considerations for peer to peer distributed hash tables. In: Proceedings of the first International Workshop on Peer-to-Peer Systems, LNCS 2429. Springer. pp. 261-269.
[32]
Skype. <http://www.skype.com>.
[33]
Srivatsa, M., Xiong, L., &amp; Liu, L. (2005) Trustguard: Countering vulnerabilities in reputation management for decentralized overlay networks. In Proceedings of the 14th international world wide web conference (pp. 422-431).
[34]
Stoica, I., Morris, R., Karger, D., Kaashoek, M., &amp; Balakrishnan, H. (2001). Chord: A scalable peer-to-peer lookup service for internet applications. In Proceedings of the ACM SIGCOMM'01 (pp. 149-160).
[35]
Distributed computing power service coordination based on peer-to-peer grids architecture. Expert Systems with Applications. v36 i2. 3101-3118.
[36]
PeerTrust: Supporting reputation-based trust for peer-to-peer communities. IEEE Transactions on Knowledge and Data Engineering. v16 i7. 843-857.
[37]
PowerTrust: A robust and scalable reputation system for trusted peer-to-peer computing. IEEE Transactions on Parallel and Distributed Systems. v18 i4. 460-473.

Cited By

View all
  • (2022)Federated learning attack surface: taxonomy, cyber defences, challenges, and future directionsArtificial Intelligence Review10.1007/s10462-021-10098-w55:5(3569-3606)Online publication date: 1-Jun-2022
  • (2019)A formal model based on Game Theory for the analysis of cooperation in distributed service discoveryInformation Sciences: an International Journal10.1016/j.ins.2015.06.043326:C(59-70)Online publication date: 6-Jan-2019
  • (2019)Analysis for Behavioral Economics in Social NetworksInternational Journal of Parallel Programming10.1007/s10766-018-0559-947:4(686-708)Online publication date: 1-Aug-2019
  • Show More Cited By
  1. A free-rider aware reputation system for peer-to-peer file-sharing networks

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    Publisher

    Pergamon Press, Inc.

    United States

    Publication History

    Published: 01 March 2011

    Author Tags

    1. Contribution-oriented
    2. Free-riding
    3. Peer-to-peer network
    4. Reputation system
    5. Resource-sharing

    Qualifiers

    • Article

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)0
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 04 Oct 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2022)Federated learning attack surface: taxonomy, cyber defences, challenges, and future directionsArtificial Intelligence Review10.1007/s10462-021-10098-w55:5(3569-3606)Online publication date: 1-Jun-2022
    • (2019)A formal model based on Game Theory for the analysis of cooperation in distributed service discoveryInformation Sciences: an International Journal10.1016/j.ins.2015.06.043326:C(59-70)Online publication date: 6-Jan-2019
    • (2019)Analysis for Behavioral Economics in Social NetworksInternational Journal of Parallel Programming10.1007/s10766-018-0559-947:4(686-708)Online publication date: 1-Aug-2019
    • (2018)A Scheme of Resource Allocation and Stability for Peer-to-Peer File-Sharing NetworksInternational Journal of Applied Mathematics and Computer Science10.1515/amcs-2016-004926:3(707-719)Online publication date: 15-Dec-2018

    View Options

    View options

    Get Access

    Login options

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media