Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.5555/1267680.1267681guideproceedingsArticle/Chapter ViewAbstractPublication PagesnsdiConference Proceedingsconference-collections
Article

Experience with an object reputation system for peer-to-peer filesharing

Published: 08 May 2006 Publication History

Abstract

In this paper, we describe Credence, a decentralized object reputation and ranking system for large-scale peer-to-peer filesharing networks. Credence counteracts pollution in these networks by allowing honest peers to assess the authenticity of online content through secure tabulation and management of endorsements from other peers. Our system enables peers to learn relationships even in the absence of direct observations or interactions through a novel, flow-based trust computation to discover trustworthy peers. We have deployed Credence as an overlay on top of the Gnutella filesharing network, with more than 10,000 downloads of our client software to date. We describe the system design, our experience with its deployment, and results from a long-term study of the trust network built by users. Data from the live deployment shows that Credence's flow-based trust computation enables users to avoid undesirable content. Honest Credence clients can identify three quarters of the decoys encountered when querying the Gnutella network.

References

[1]
{1} S. Buchegger and J.-Y. L. Boudec. A Robust Reputation System for P2P and Mobile Ad-hoc Networks. In Workshop on the Economics of Peer-to-Peer Systems, Boston, MA, June 2004.]]
[2]
{2} M. Castro, P. Druschel, A. Ganesh, A. Rowstron, and D. S. Wallach. Secure Routing for Structured Peer-to-Peer Overlay Networks. In Symposium on Operating Systems Design and Implementation , Boston, MA, December 2002.]]
[3]
{3} N. Christin, A. S. Weigend, and J. Chuang. Content Availability, Pollution and Poisoning in File Sharing Peer-to-Peer Networks. In ACM Conference on Electronic Commerce, Vancouver, Canada, June 2005.]]
[4]
{4} F. Cornelli, E. Damiani, S. D. C. di Vimercati, S. Paraboschi, and P. Samarati. Choosing Reputable Servents in a P2P Network. In International World Wide Web Conference, Honolulu, HI, May 2002.]]
[5]
{5} N. Curtis, R. Safavi-Naini, and W. Susilo. X2Rep: Enhanced Trust Semantics for the XRep Protocol. In Applied Cryptography and Network Security, Yellow Mountain, China, June 2004.]]
[6]
{6} E. Damiani, S. D. C. di Vimercati, S. Paraboschi, P. Samarati, and F. Violante. A Reputation-Based Approach for Choosing Reliable Resources in Peer-to-Peer Networks. In ACM Conference on Computers and Communications Security, Washington, DC, October 2002.]]
[7]
{7} R. Dingledine, M. Freedman, and D. Molnar. The Free Haven Project: Distributed Anonymous Storage Service. In Workshop on Design Issues in Anonymity and Unobservability, Berkeley, CA, July 2000.]]
[8]
{8} J. R. Douceur. The Sybil Attack. In International Workshop on Peer-to-Peer Systems, Cambridge, MA, March 2002.]]
[9]
{9} D. Dumitriu, E. Knightly, A. Kuzmanovic, I. Stoica, and W. Zwaenepoel. Denial-of-Service Resilience in Peer-to-Peer File Sharing Systems. In ACM SIGMETRICS, Banff, Canada, June 2005.]]
[10]
{10} P. Gauthier, B. Bershad, and S. D. Gribble. Dealing with Cheaters in Anonymous Peer-to-Peer Networks. Technical Report 04-01-03, University of Washington, January 2004. Computer Science and Engineering.]]
[11]
{11} R. Guha, R. Kumar, P. Raghavan, and A. Tomkins. Propagation of Trust and Distrust. In International World Wide Web Conference, New York, NY, May 2004.]]
[12]
{12} M. Gupta, P. Judge, and M. Ammar. A Reputation System for Peer-to-Peer Networks. In ACM Intl. Workshop on Network and Operating System Support for Digital Audio and Video, Monterey, CA, June 2003.]]
[13]
{13} S. D. Kamvar, M. T. Schlosser, and H. Garcia-Molina. The Eigen-Trust Algorithm for Reputation Management in P2P Networks. In International World Wide Web Conference, Budapest, Hungary, May 2003.]]
[14]
{14} J. Liang, R. Kumar, Y. Xi, and K. W. Ross. Pollution in P2P File Sharing Systems. In IEEE INFOCOM, Miami, FL, March 2005.]]
[15]
{15} LimeWire. http://www.limewire.com/.]]
[16]
{16} T. Mennecke. New Breed of Corrupt Torrent Infiltrates BitTorrent, September 2005. http://slyck.com/news.php?story=296.]]
[17]
{17} MojoNation. http://www.mojonation.net/.]]
[18]
{18} L. Page, S. Brin, R. Motwani, and T. Winograd. The pagerank citation ranking: Bringing order to the web, 1998. Stanford Digital Libraries Working Paper.]]
[19]
{19} J. Pouwelse, P. Garbacki, D. Epema, and H. Sips. A Measurement Study of the BitTorrent Peer-to-Peer File-Sharing System. Technical Report PDS-2004-003, Delft University of Technology, April 2004.]]
[20]
{20} P. Resnick, N. Iacovou, M. Suchak, P. Bergstrom, and J. Riedl. GroupLens: An Open Architecture for Collaborative Filtering of Netnews. In ACM Conference on Computer Supported Cooperative Work, Chapel Hill, NC, October 1994.]]
[21]
{21} S. Saroiu, K. P. Gummadi, and S. D. Gribble. A Measurement Study of Peer-to-Peer File Sharing Systems. In Multimedia Computing and Networking, San Jose, CA, January 2002.]]
[22]
{22} R. Thommes and M. Coates. Epidemiological Models of Peer-to-Peer Viruses and Pollution. Technical report, McGill University, June 2005. Department of Electrical and Computer Engineering.]]
[23]
{23} V. Vishnumurthy, S. Chandrakumar, and E. G. Sirer. KARMA: A Secure Economic Framework for P2P Resource Sharing. In Workshop on the Economics of Peer-to-Peer Systems, Berkeley, CA, June 2003.]]
[24]
{24} K. Walsh and E. G. Sirer. Fighting Peer-to-Peer SPAM and Decoys with Object Reputation. In Workshop on the Economics of Peer-to-Peer Systems, Philadelphia, PA, August 2005.]]
[25]
{25} L. Xiong and L. Liu. PeerTrust: Supporting Reputation-Based Trust in Peer-to-Peer Communities. IEEE Transactions on Knowledge and Data Engineering, Special Issue on Peer-to-Peer Based Data Management, 16(7), July 2004.]]
[26]
{26} B. Yang and H. Garcia-Molina. PPay: Micropayments for Peer-to-Peer Systems. In ACM Conference on Computers and Communications Security, Washington, DC, October 2003.]]
[27]
{27} G. Zacharia, A. Moukas, and P. Maes. Collaborative Reputation Mechanisms in Electronic Marketplaces. In Hawaii International Conference on System Sciences, Maui, HI, January 1999.]]
[28]
{28} H. Zhang, A. Goel, R. Govindan, K. Mason, and B. V. Roy. Making Eigenvector-Based Reputation Systems Robust To Collusion. In Workshop on Algorithms and Models for the Web-Graph, Rome, Italy, October 2004.]]
[29]
{29} L. Zhou, F. B. Schneider, and R. van Renesse. COCA: A Secure Distributed On-line Certification Authority. ACM Transactions on Computer Systems, 20(4):329-368, 2002.]]

Cited By

View all

Recommendations

Comments

Information & Contributors

Information

Published In

cover image Guide Proceedings
NSDI'06: Proceedings of the 3rd conference on Networked Systems Design & Implementation - Volume 3
May 2006
54 pages

Sponsors

  • USENIX Assoc: USENIX Assoc

Publisher

USENIX Association

United States

Publication History

Published: 08 May 2006

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 15 Oct 2024

Other Metrics

Citations

Cited By

View all
  • (2018)PotluckACM SIGPLAN Notices10.1145/3296957.317318553:2(271-284)Online publication date: 19-Mar-2018
  • (2018)FoggyCacheProceedings of the 24th Annual International Conference on Mobile Computing and Networking10.1145/3241539.3241557(19-34)Online publication date: 15-Oct-2018
  • (2018)Incentivizing censorship measurements via circumventionProceedings of the 2018 Conference of the ACM Special Interest Group on Data Communication10.1145/3230543.3230568(533-546)Online publication date: 7-Aug-2018
  • (2018)PotluckProceedings of the Twenty-Third International Conference on Architectural Support for Programming Languages and Operating Systems10.1145/3173162.3173185(271-284)Online publication date: 19-Mar-2018
  • (2016)Transient guaranteesProceedings of the International Conference for High Performance Computing, Networking, Storage and Analysis10.5555/3014904.3015019(1-11)Online publication date: 13-Nov-2016
  • (2016)Resisting tag spam by leveraging implicit user behaviorsProceedings of the VLDB Endowment10.14778/3021924.302193910:3(241-252)Online publication date: 1-Nov-2016
  • (2016)GrandetProceedings of the Seventh ACM Symposium on Cloud Computing10.1145/2987550.2987562(196-209)Online publication date: 5-Oct-2016
  • (2016)A Numerical Approach for Assigning a Reputation to Users of an IoT FrameworkProcedia Computer Science10.1016/j.procs.2016.09.07398:C(455-460)Online publication date: 1-Oct-2016
  • (2016)A performance study of incentive schemes in peer-to-peer file-sharing systemsThe Journal of Supercomputing10.1007/s11227-016-1648-472:3(1152-1178)Online publication date: 1-Mar-2016
  • (2015)Reputation Systems Evaluation SurveyACM Computing Surveys10.1145/283537348:3(1-28)Online publication date: 9-Dec-2015
  • Show More Cited By

View Options

View options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media