Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/775152.775242acmconferencesArticle/Chapter ViewAbstractPublication PagesthewebconfConference Proceedingsconference-collections
Article

The Eigentrust algorithm for reputation management in P2P networks

Published: 20 May 2003 Publication History

Abstract

Peer-to-peer file-sharing networks are currently receiving much attention as a means of sharing and distributing information. However, as recent experience shows, the anonymous, open nature of these networks offers an almost ideal environment for the spread of self-replicating inauthentic files.We describe an algorithm to decrease the number of downloads of inauthentic files in a peer-to-peer file-sharing network that assigns each peer a unique global trust value, based on the peer's history of uploads. We present a distributed and secure method to compute global trust values, based on Power iteration. By having peers use these global trust values to choose the peers from whom they download, the network effectively identifies malicious peers and isolates them from the network.In simulations, this reputation system, called EigenTrust, has been shown to significantly decrease the number of inauthentic files on the network, even under a variety of conditions where malicious peers cooperate in an attempt to deliberately subvert the system.

References

[1]
K. Aberer and Z. Despotovic. Managing Trust in a Peer-2-Peer Information System. In Proceedings of the 10th International Conference on Information and Knowledge Management (ACM CIKM), New York, USA, 2001.]]
[2]
Advogato's Trust Metric (White Paper), http://www.advogato.org/trust-metric.html.]]
[3]
T. Aura, P. Nikander, and J. Leiwo. Dos-resistant authentication with client puzzles. In 8th International Workshop on Security Protocols, 2000.]]
[4]
T. Beth, M. Borcherding, and B. Klein. Valuation of trust in open networks. In Proc. 3rd European Symposium on Research in Computer Security - ESORICS '94, pages 3--18, 1994.]]
[5]
Captcha Project. http://www.captcha.net.]]
[6]
F. Cornelli, E. Damiani, S. D. C. D. Vimercati, S. Paraboschi, and S. Samarati. Choosing Reputable Servents in a P2P Network. In Proceedings of the 11th World Wide Web Conference, Hawaii, USA, May 2002.]]
[7]
A. Crespo and H. Garcia-Molina. Semantic Overlay Networks. Submitted for publication 2002.]]
[8]
J. Douceur. The Sybil Attack. In First IPTPS, March 2002.]]
[9]
eBay website. www.ebay.com.]]
[10]
T. H. Haveliwala and S. D. Kamvar. The second eigenvalue of the google matrix. Technical report, Stanford University, 2003.]]
[11]
S. D. Kamvar, M. T. Schlosser, and H. Garcia-Molina. Incentives for Combatting Freeriding on P2P Networks. Technical report, Stanford University, 2003.]]
[12]
L. Page, S. Brin, R. Motwani, and T. Winograd. The PageRank Citation Ranking: Bringing Order to the Web. Technical report, Stanford Digital Library Technologies Project, 1998.]]
[13]
S. Ratnasamy, P. Francis, M. Handley, R. Karp, and S. Shenker. A scalable content-addressable network. In Proceedings of ACM SIGCOMM, August 2001.]]
[14]
P. Resnick, R. Zeckhauser, E. Friedman, and K. Kuwabara. Reputation Systems. Communications of the ACM, 43(12):45--48, 2000.]]
[15]
M. Ripeanu and I. Foster. Mapping the Gnutella Network - Macroscopic Properties of Large-scale P2P Networks and Implications for System Design. In Internet Computing Journal 6(1), 2002.]]
[16]
S. Saroiu, P. K. Gummadi, and S. D. Gribble. A Measurement Study of Peer-to-Peer File Sharing Systems. In Proceedings of Multimedia Computing and Networking 2002 (MMCN '02), San Jose, CA, USA, January 2002.]]
[17]
M. T. Schlosser and S. D. Kamvar. Simulating P2P Networks. Technical report, Stanford University, 2003.]]
[18]
I. Stoica, R. Morris, D. Karger, M. F. Kaashoek, and H. Balakrishnan. Chord: A scalable peer-to-peer lookup service for internet applications. In Proceedings of the 2001 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications, pages 149--160. ACM Press, 2001.]]
[19]
VBS.Gnutella Worm. http://securityresponse.symantec.com/avcenter/venc/data/vbs.gnutella.html.]]
[20]
B. Yang, S. D. Kamvar, and H. Garcia-Molina. Secure Score Management for P2P Systems. Technical report, Stanford University, 2003.]]

Cited By

View all
  • (2024)Trust in Shapley: A Cooperative Quest for Global Trust in P2P NetworkProceedings of the 23rd International Conference on Autonomous Agents and Multiagent Systems10.5555/3635637.3662860(132-140)Online publication date: 6-May-2024
  • (2024)Real-Time Monitoring Systems That Provide M2M Communication between MachinesIEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences10.1587/transfun.2023EAP1049E107.A:7(1019-1026)Online publication date: 1-Jul-2024
  • (2024)Xylem: An Energy-efficient, Globally Redistributive, Financial Infrastructure Using Proof-by-LocationDistributed Ledger Technologies: Research and Practice10.1145/36536803:3(1-27)Online publication date: 9-Sep-2024
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
WWW '03: Proceedings of the 12th international conference on World Wide Web
May 2003
772 pages
ISBN:1581136803
DOI:10.1145/775152
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 20 May 2003

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. distributed eigenvector computation
  2. peer-to-peer
  3. reputation

Qualifiers

  • Article

Acceptance Rates

Overall Acceptance Rate 1,899 of 8,196 submissions, 23%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)215
  • Downloads (Last 6 weeks)17
Reflects downloads up to 17 Oct 2024

Other Metrics

Citations

Cited By

View all
  • (2024)Trust in Shapley: A Cooperative Quest for Global Trust in P2P NetworkProceedings of the 23rd International Conference on Autonomous Agents and Multiagent Systems10.5555/3635637.3662860(132-140)Online publication date: 6-May-2024
  • (2024)Real-Time Monitoring Systems That Provide M2M Communication between MachinesIEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences10.1587/transfun.2023EAP1049E107.A:7(1019-1026)Online publication date: 1-Jul-2024
  • (2024)Xylem: An Energy-efficient, Globally Redistributive, Financial Infrastructure Using Proof-by-LocationDistributed Ledger Technologies: Research and Practice10.1145/36536803:3(1-27)Online publication date: 9-Sep-2024
  • (2024)NCTM: A Novel Coded Transmission Mechanism for Short Video DeliveriesProceedings of the ACM Web Conference 202410.1145/3589334.3645387(2847-2858)Online publication date: 13-May-2024
  • (2024)Account credibility inference based on news-sharing networksEPJ Data Science10.1140/epjds/s13688-024-00450-913:1Online publication date: 31-Jan-2024
  • (2024)Practical Byzantine Fault Tolerance-Enhanced Blockchain-Enabled Data Sharing System: Latency and Age of Data Package AnalysisIEEE Transactions on Mobile Computing10.1109/TMC.2022.322330623:1(737-753)Online publication date: Jan-2024
  • (2024)Blockchain-Aided Decentralized Trust Management of Edge Computing: Toward Reliable Off-Chain and On-Chain TrustIEEE Network10.1109/MNET.2024.339927038:5(182-188)Online publication date: Sep-2024
  • (2024)An Adaptive and Modular Blockchain Enabled Architecture for a Decentralized MetaverseIEEE Journal on Selected Areas in Communications10.1109/JSAC.2023.334543242:4(893-904)Online publication date: Apr-2024
  • (2024)Multi-Factor Trust Management in Distributed Storage Networks based on Capacity and Behavior2024 9th International Conference on Fog and Mobile Edge Computing (FMEC)10.1109/FMEC62297.2024.10710228(228-236)Online publication date: 2-Sep-2024
  • (2024)The Waku Network as Infrastructure for dApps2024 IEEE International Conference on Decentralized Applications and Infrastructures (DAPPS)10.1109/DAPPS61106.2024.00012(31-32)Online publication date: 15-Jul-2024
  • Show More Cited By

View Options

Get Access

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media