Impact of Feedback on Trust in P2P Networks

Size: px
Start display at page:

Download "Impact of Feedback on Trust in P2P Networks"

Transcription

1 82 JOURNAL OF NETWORKS, VOL. 7, NO. 8, AUGUST 22 Impact of Feedback on Trust in P2P Networks Zhihua Huang ),2), Songnian Lu ), Aixin Zhang 3), Jie Gu ) ) Department of Electronic Engineering, Shanghai Jiao Tong University, Shanghai, China 2) School of Information Science and Engineering, Xinjiang University, Urumqi, China 3) School of Information Security Engineering, Shanghai Jiao Tong University, Shanghai, China zhihua.huang.cn@gmail.com, {snlu,axzhang,ee gujie}@sjtu.edu.cn Abstract Feedback plays an important role in P2P trust systems. Existing trust systems usually assume that most of normal peers have idealized feedback behaviors, that is, peers can provide honest feedback after download immediately. However, studies show that feedback sparsity and delay widely exist in a real P2P network. Unfortunately, their effect on trust systems has received little attention in previous researches. In this paper, we propose a feedback model considering feedback ratio and feedback delay to analyze the effect. We find that most trust systems have poor reliability when the number of feedbacks is small in a decentralized P2P network. We propose an implicit feedback mechanism based on the retention time of files to remove the impact of user feedback on trust systems. Simulation results show that trust systems using implicit feedback can not only effectively isolate normal peers from malicious peers but also provide differential services for normal peers with different behaviors. Index Terms P2P network, trust, feedback sparsity, feedback delay, implicit feedback, performance evaluation I. INTRODUCTION In the open and self-organizing peer-to-peer (P2P) environment, peers act as clients and request services from other peers as well as servers and provide services to other peers. As there is no central authority for identity and content authentication, selfish peers may act in their interests not offering their resources for sharing [], and malicious peers may easily inject unauthentic or malicious contents into the networks [2]. These misbehaviors greatly reduce the overall performance of P2P system. In recent years, a number of trust systems such as EigenTrust [3], PowerTrust [4], PeerTrust [5], have been proposed to protect P2P networks against the increasing misbehaviors of peers. In these systems, each peer is supposed to provide feedback to system after transaction. The effectiveness of trust mechanisms depends on sufficient honest feedbacks provided by peers [6]. However, in a real P2P network, not all pees provide feedback as expected. Liang et al. [2] find that even if KaZaA provides incentive mechanism for feedback, the number of users providing feedback is surprisingly little. As the cost of time and effort is needed for feedback, many users would not like to be involved. Lee et al. [7] find that some users do even not timely check the quality of the downloaded content. Unfortunately, most of trust mechanisms focus on This work was supported by the National 973 Program of China under Grant No. 2CB7343. studying trust algorithms based on the idealized feedback assumption. The characteristic of user feedback in a real P2P network has often been ignored. We raise two issues. Are the existing trust systems still effective when the idealized assumptions do not hold? How to evaluate the quality of transaction if most of users do not provide feedback? For the first issue, we model the real feedback behaviors of normal peers in P2P trust systems and analyze the performances of several typical global and personalized trust systems based on the feedback model. We find feedback sparsity and delay may significantly reduce the effectiveness and reliability of almost all trust systems. For the second issue, we propose an implicit feedback mechanism based on the retention time of the downloaded file, removing the effect of user feedback on trust systems. Under this way, the rater rates the other peers based on the duration that he remains the files downloaded from them in the shared folder. Using implicit feedback as the input data of trust systems, we reassess the performance of the trust systems above in the same environment. The results show that the implicit feedback can make the trust systems play their roles better than explicit feedback. Furthermore, implicit feedback mechanism can encourage peers to behave as expected by system by providing differential services for various peers. Our contributions include three folds: ) We model feedback behavior in a real P2P network and analyze the performance of several typical trust systems based on the feedback model. 2) We propose an implicit feedback mechanism based on the retention time of the downloaded file, removing the effect of explicit feedback on trust systems. 3) We compare the performance of trust systems based on implicit feedback and explicit feedback in the decentralized P2P network by simulation and get some interesting conclusions. The remaining parts of the paper are organized as follows. In section 2, we review several typical trust algorithms in the decentralized P2P network and propose a feedback model. In section 3, we propose an implicit feedback mechanism for P2P file sharing systems. In section 4, we analyze the impact of feedback sparsity and delay on explicit feedback-based trust systems in a uniform simulation environment. Furthermore, we also compare the performances of trust systems using explicit doi:34/jnw

2 JOURNAL OF NETWORKS, VOL. 7, NO. 8, AUGUST feedback and implicit feedback. Finally, we conclude the paper in Section 5. II. FEEDBACK-BASED TRUST MECHANISMS In the decentralized P2P networks, since there is no central entity to manage trust, peers have to cooperate to collect feedbacks, compute and store trust values. Generally, the trust value is calculated as a function of integrating multiple factors such as feedback, file size, bandwidth, and the time of interaction, etc. Since our emphasis is to analyze the impact of feedback on trust systems, for simplicity, the other factors are not taken into account in this paper. That is to say, feedback is the unique input data of the trust systems. Assuming that a peer always provides a binary feedback whenever an interaction occurs, let sat ij and usat ij represent the number of the positive and negative feedbacks about peer j given by peer i respectively, the direct trust DT ij placed in peer j by peer i can be computed by summing the number of positive feedbacks and negative feedbacks separately, and to keep a total score as the positive score minus the negative score [3]. To ensure the trust value is between - and, the direct trust can be normalized as DT ij (t) = sat ij(t) usat ij (t) sat ij (t) + usat ij (t) In a large scale P2P network with millions of peers, each peer has limited interactions with other peers, so each peer can only know the trust values of few peers based on individual experiences. Recommendation and reputation algorithms are usually used to infer trusts in stranger peers. Many recommendation and reputation systems have been proposed [8]. Because of space limitation we only analyze several representative trust systems. A. Several decentralized trust systems Depending on the information source of trust, we can classify trust systems into global trust and personalized trust. ) Global trust systems In the global trust systems, each peer has a global reputation which is computed by the local trust values assigned to it by other peers, weighted by the global reputations of the assigning peers. In all global reputation systems proposed, EigenTrust, PowerTrust, and PeerTrust are the three most famous algorithms. EigenTrust [3] presents a global trust method to minimize the impact of malicious peers on the performance of a P2P system. It is supposed that all peers provide feedback after transaction and the peer who provides authentic content always provides honest feedback. Eigentrust can effectively identify malicious peers and isolates them from the network when all users provide feedbacks. Some pretrusted peers are needed for ensuring the reliability of trust. () PowerTrust [4] analyzes the feedback properties of ebay reputation system and points out that the number of feedbacks received by peers follows the powerlaw distribution. They prove that the feedbacks of P2P reputation systems have the same properties. The peers with a large number of feedbacks are selected as power peers to replace the pre-trusted peers in Eigentrust. The operational efficiency comes mainly from the reliable power peers. PeerTrust [5] computes a peer s reputation based on the number of transactions, the size of each transaction, the number of feedbacks, and the credibility of feedback. The credibility of feedback may be measured by two ways: ) a function of the trust value of the feedback provider; 2) the personalized similarity of the feedback provider and the trust requester in rating other peers. We only analyze the second way in this paper. To encourage peers to provide feedback, PeerTrust takes the feedback ratio as one of the recommendation factors. The trust systems above build trust based on the public opinion. In the decentralized P2P networks, computing peers global reputation is complicated and expensive and involves a lot of communication and calculation. Some personalized trust mechanisms have been proposed. 2) Personalized trust systems In the personalized trust systems, the trust placed by a peer in the other peers is built on the direct experience or the opinions from a group of other peers selected by the peer. Liang et al. [9] model the decentralized trust by the following equation: T = β DT + ( β) RT (2) where T denotes the personalized trust value, DT denotes the trust based on self-experience information, RT denotes the recommendation trust from other peers. Generally, the direct experience plays a more important role than the indirect experience in trust systems. We set β =.7. Several different recommendation algorithms are compared in the same context and platform. They find that the simple average aggregation and beta reputation algorithms perform better than the complex algorithms when there are a considerable number of bad raters in the system. Therefore, we only select the following three algorithms for feedback analysis. We simply describe these algorithms, and the detailed introduction may refer to the original literatures. Liang et al. [] propose an average aggregation algorithm (AV G) to compute the recommendation. Let DT kj denote peer k s rating towards peer j, s denote the number of peers who rated peer j, RT ij denote the value of aggregation ratings to peer j in peer i, RT ij can be expressed as follow: s k= RT ij = DT kj (3) s Wang et al. [] propose a half weighted algorithm (HALF ) to compute recommendation. Let A i is the set of acquaintance peers and S i is the set of stranger peers for

3 84 JOURNAL OF NETWORKS, VOL. 7, NO. 8, AUGUST 22 peer i, w a and w s denote the weight of acquaintance recommendation and stranger recommendation respectively, W ik is the weight about the rating from the acquaintance peer k, RT ij can be expressed as RT ij = w a k A i W ik DT kj k A i W ik + w s W ik is updated by the equation: x S i DT xj S i (4) W ik = α W o ik + ( α) e α (5) where W ik denotes the new trust value placed by peer i in peer k, Wik o denotes the old trust value, α is the learning rate, e α is the new evidence value. Here we simplify W ik as DT ik, that is, the rating of an acquaintance of peer i is weighted by peer i s direct trust in it. Intuitively, the opinion of the acquaintance peers are more credible than that of the stranger peers. Josang et al. [2] use beta probability density function to combine rating and derive reputation (BET A). Let pr and nr denote the number of positive and negative ratings on peer j respectively, the recommendation trust in peer j can be expressed as RT ij = pr + pr + nr + All trust mechanisms above take feedbacks as the input data of the trust systems. When all normal users immediately provide honest feedback after transaction, the effectiveness of trust systems has been verified. However, Liang [2] and Lee [7] point out the idealized feedback assumption is not true in a real P2P network. It is necessary to analyze the performances of trust mechanisms under the real feedback behaviors. Next, we model the real feedback behavior through feedback ratio and feedback delay. B. Modeling feedback behaviors We model a P2P file sharing network by a tuple G = (P, E, C, B) where P is the set of peers in P2P network, P = {p,..., p n }, E is the set of neighbor relationships between peers, E = {e ij i j, i, j P }, C is the set of resources provided by all peers, and B is the set of user behaviors. We consider two kinds of user behaviors: sharing and feedback, described by B = {SHARE, F B}. SHARE represents the contributions of all peers to P2P service system while F B represents the contributions of all peers to the rating system. Since P2P network is highly dynamic, user behavior changes over time t. A peer s sharing behavior can be described by the set of files shared or transacted by it. Let C(j, t) denote the set of files shared or transacted by peer j up to time t, C(j, t) C. Each file in C(j, t) has three properties: UV jf (t) represents the total volume of file f uploaded by peer j up to time t; SD jf (t) represents the duration that peer j shares file f up to time t; P R f represents the identification of the peer who provided file f for peer j. Let SHARE(j, t) denote the (6) sharing history of peer j up to time t, SHARE(j, t) = {f, UV jf (t), SD jf (t), P R f f C(j, t)}. The sharing histories of all peers can be described by SHARE(t) = {SHARE(j, t) j P }. Let F B(j, t) represent the feedback history of a peer j up to time t, P (j, t) denote the set of peers who interacted with peer j up to time t, DT ji (t) denote peer j s rating on peer i up to time t, F B(j, t) = {DT ji (t) i P (j, t)}. The feedback histories of all peers can be described by F B(t) = {F B(j, t) j P }. Let fr denote feedback ratio that is the ratio of feedbacks to downloads, F jf (t, fd, fr) denote the feedback result that peer j provides with probability fr at time t about file f downloaded at time t fd, F jf (t, fd, fr) {,, }, peer j s rating on peer i at time t can be expressed as t DT ji (t) = DT ji (t ) + F jf (t, fd, fr) fd= f C(j,t) P R f =i where fd denotes the delay time from completing download to checking the downloaded file. When fr =, peer j provides no feedback, F jf (t, fd, fr) =. According to [7], the delay time shows a bimodal form, that is, one part of users immediately check the file after download while another part of users check the file until finishing session. It is reasonable to suppose that a peer provides feedback only when checking the quality of files. Therefore, the delay time of providing feedback follows the same distribution as the checking delay time. In section IV, we analyze the performance of trust systems with various feedback ratios and feedback delays. III. AN IMPLICIT FEEDBACK MECHANISM In a decentralized P2P network, the trust systems based on explicit feedback are difficult to implement if the majority of users are unwilling to provide feedback information for the items they download. Some implicit rating methods are proposed to infer the credibility of an item through some objective factors. Feng et al. [3] use a lifetime and popularity based ranking approach to generate the rating on a file. Fotiou et al. [4] take the fact that a peer shares an information version as a positive vote on a file. Ormandi et al. [5] infer implicit ratings on files by observing whether the rater will seed the file. If a user deletes a file after download, his rating on the file is low, or if a user is seeding the file for a long time, his rating is high. However, how to implicitly rate a peer still remains an open question. When a peer completes download, its behavior expected by system is to immediately check the quality of the downloaded file, delete it if the file is polluted or continue to share it if the file is authentic. Assuming that all peers behave as expected, the evaluation of a peer on the downloaded file may be inferred from the retention time of the file in shared folder after download. Similarly, the evaluation of a peer on the other peers may be inferred from the average retention time of the files downloaded (7)

4 JOURNAL OF NETWORKS, VOL. 7, NO. 8, AUGUST from them. Based on this idea, we propose an implicit feedback mechanism. Let F S j (t) denote the set of files downloaded by peer j up to time t, RS j (t) denote the set of the files which are evaluated up to time t, RS j (t) F S j (t). Let IT jf (t) denote the interval from the moment when peer j completes downloading file f to the current time t, SD jf (t) denote the duration that peer j remains file f in the shared folder during IT jf (t), the implicit rating on peer i placed by peer j can be inferred by the following rules: ) If IT jf (t) > T H, put file f in RS j (t), or else peer j s rating on file f is not considered. Here T H is the time threshold of the valid rating. It may be set by each user or be a experience value. We assume that T H equals to three times slots in this paper. 2) If RS j (t), let RSP ji (t) denote the set of files provided by peer i in RS j (t), ASD ji (t) denote the average duration that peer j remains files provided by peer i in RS j (t), then f RSP ASD ji (t) = SD ji(t) jf (t) (8) RSP ji (t) 3) Let P SET j (t) denote the set of peers who provided files in RS j (t) for peer j up to time t, peer j s implicit rating on peer i in P SET j (t) can be computed by IDT ji (t) = ASD ji (t) k P SET ASD j(t) jk(t) Thus at time t, the system can get the feedback information of all peers who interact with other peers at time t T H. Under the implicit feedback scheme, a peer will be punished by the declining quality of service in the future if it does not behave as expected. For example, if peer j remains the polluted files downloaded from peer i in the shared folder for a long time, from the perspective of system, peer j s rating on peer i may be high. This will improve the probability that peer j interacts with peer i in the future. Therefore, the implicit feedback mechanism has both reward and punishment function. It can encourage peers to actively check the quality of the downloaded file and filter out invalid files as well as forward the authentic files. Implicit feedback can be used in all existing trust systems. In next section, we analyze the performance of various trust systems using implicit feedback. A. Simulation settings IV. EVALUATION In order to analyze the impact of feedback on the trust systems, we simulate a decentralized P2P trust network with n peers, in which various trust mechanisms are used to improve the download success rate of normal peers. We compare the performance of trust mechanisms in the networks with the idealized feedback behavior and with feedback sparsity and delay. Simulation environment consists of five parts as follows. (9) Network model. We simulate a P2P network with small world topology. Assuming that each peer may connect d max peers at most and d min peers at least. Initially, peer j is randomly assigned d j (d min d j d max ) peers as neighbors. With the evolution of trust system, a peer may select the d max most trustworthiness peers as neighbors. Content model. There are m available files in the network, including z topics with valid and invalid versions each. The popularity of topics and versions of each topic obeys Zipf distribution among the n peers [6]. Here we define the popularity of a topic as the percent of users querying the topic in all users. If a peer has a version file of a topic, we say it has one copy of the version file. For simplicity, we assume that a peer only remains one version file of a topic in the shared folder. Intuitively, the more popular files are more vulnerable to attack. To close to a real network, we assume that the number of the polluted version files of a topic proportionate to the popularity of the topic. A version file f can uniquely be identified by an identification F ID. Peer model. The population of network consists of normal and malicious peers. Normal peers refer to those who have no intention to attack P2P systems. They share valid version files. Each normal peer is interested in a subset of all topics. A peer only shares and search for the files about the interested topics. The popularity of interests also obeys Zipf distributions. We consider two kinds of feedback behaviors of normal users: ) All normal peers behave as expected by system, that is, immediately check the content after download, delete polluted files, continue to share the authentic files, and provide honest feedback. This situation is denoted by fr =, fd =. 2) All normal peers delay fd time slots to check the content after download and provide feedbacks with the probability of f r =. The variable f d obeys the bimodal distribution over [, L] where L is the duration of sharing the file after download [7]. The value of L follows the exponential distribution with parameter is 3. This situation is simply described by fr =, fd = 3. Each malicious peer has an attack target that is a subset of all topics. Malicious peers share the polluted version files in the attack target set.to attack the target, malicious peers always provide false feedbacks without any delay. Simulation execution. The simulation of a P2P network proceeds in time slots. Each time slot is subdivided into a number of query cycles. In each query cycle, a peer issues the query to all his neighbors for a file in his interested subset, and decides whether to respond to queries passing by. The query is propagated by broadcast within time to live (T T L). Upon issuing a query, the peer waits for the responses, and selects a file provided by the most trusted peer to download. After download, the peer may delay a certain time to check the content and provide feedback with a certain probability. Each version file is downloaded at most once by a peer. Upon the conclusion of each query cycle, the system updates the trust value

5 86 JOURNAL OF NETWORKS, VOL. 7, NO. 8, AUGUST 22 TABLE I. SIMULATION SETTINGS Parameters Settings n 2 m 2 z 2 T T L 3 d max d min 3 s the number of query cycles for each slot of each peer. Statistics are collected at each peer. Each experiment is run five times and the results of all runs are averaged. The simulation parameters are shown in Table I. Metrics. We analyze the performance of the trust systems by the following metrics. ) Effective download ratio. It refers to the ratio of good downloads to the total searches for normal peers. 2) Pollution ratio. It refers to the ratio of the polluted copies to the total copies in the system. B. Simulation results ) The impact of feedback on trust systems. We first compare the performance of three typical global trust systems in the networks with the idealized feedback (fr =, fd = ) and with feedback sparsity and delay (fr =, fd = 3). Fig. and Fig. 2 show the evolution of effective download ratio and pollution ratio. When the number of normal feedbacks is sparse, the effective download ratio of three global trust systems decreases while the pollution ratio increases. By comparison, EigenTrust is affected less than PowerTrust and PeerTrust. This is because EigenTrust takes some reliable normal peers as the pre-trusted peers who are selected by normal peers for transactions when without feedback. In PowerTrust, the trust of each peer is aggregated from local trust scores weighted by the global reputations of all raters. When there are a large number of malicious peers in system, they may promote reputation for each other and play more important roles than normal peers in trust evaluation. PeerTrust are the most affected by feedback sparsity and delay. Sparse feedbacks result in the shortage of ratings, which means that the similarity of most peers is unknown. Feedback ratio becomes the important factor of recommendation. Since malicious peers always provide feedback, malicious recommendation will be adopted more. Fig. 3 and Fig. 4 show the performance of personalized trust systems. We can see that feedback sparsity and delay reduce effective download ratio and increase pollution ratio in three personalized algorithms. The AVG and HALF algorithms are affected more than BETA algorithm. The AVG algorithm considers that the weights of all raters are equal. When the number of malicious raters is more than that of normal raters, normal peers will trust in malicious Effective download ratio.9.7. Eigentrust, fr=,fd= Eigentrust, fr=,fd=3 Powertrust, fr=,fd= Powertrust, fr=,fd=3 Peertrust, fr=,fd= Peertrust, fr=,fd= Figure. Comparing the effective download ratio of global trust systems with idealized feedback and with feedback sparsity and delay. Pollution ratio 5 5 Eigentrust, fr=,fd= Eigentrust, fr=,fd=3 5 Powertrust, fr=,fd= Powertrust, fr=,fd=3 Peertrust, fr=,fd= Peertrust, fr=,fd= Figure 2. Comparing the pollution ratio of global trust systems with idealized feedback and with feedback sparsity and delay. Effective download ratio.9.7. AVG, fr=,fd= AVG, fr=,fd=3 HALF, fr=,fd= HALF, fr=,fd=3 BETA, fr=,fd= BETA, fr=,fd= Figure 3. Comparing the effective download ratio of personalized trust systems with idealized feedback and with feedback sparsity and delay. peers. The HALF algorithm gives the acquaintance peer higher weight (here is.7). When few normal peers provide feedbacks, the number of acquaintance peers is very small. The performance of HALF is dependent on the stranger recommendation more. In summary, feedback sparsity and delay can significantly reduce the performance of trust systems. It is

6 JOURNAL OF NETWORKS, VOL. 7, NO. 8, AUGUST Pollution ratio 5 5 AVG, fr=,fd= AVG, fr=,fd=3 HALF, fr=,fd= HALF, fr=,fd=3 BETA, fr=,fd= BETA, fr=,fd= Pollution ratio 5 AVG, fr=,fd= AVG, fr=,fd=3 HALF, fr=,fd= HALF, fr=,fd=3 Peertrust, fr=,fd= Peertrust, fr=,fd= Figure 4. Comparing the pollution ratio of personalized trust systems with idealized feedback and with feedback sparsity and delay. Figure 6. Comparing the pollution ratio of three trust systems with implicit feedback. AVG HALF.9 Effective download ratio.7 AVG, fr=,fd= AVG, fr=,fd=3 HALF, fr=,fd= HALF, fr=,fd=3 Peertrust, fr=,fd= Peertrust, fr=,fd= Figure 5. Comparing the effective download ratio of three trust systems with implicit feedback. necessary to study how to get sufficient input data for trust systems. 2) Using the implicit feedback in trust systems To validate the trust systems with implicit feedback, we compare the performances of the most affected-byfeedback AVG, HALF, and PeerTrust algorithms under implicit feedback mechanism. Since implicit feedback does not need user participation, the feedback ratio does not affect the performance of trust systems. Fig. 5 and Fig. 6 show the results of simulation. We see that using implicit feedback can significantly improve the effective download ratio, especially in the environment with feedback sparsity and delay. Delaying to check the content will result in slowing down the convergence rate of trust systems. To analyze the impact of various post-download behaviors on the performance, we classify normal peers into selfish, lazy, and good peers. Selfish peers always immediately delete files regardless of the quality is good or bad. Lazy peers always delay fd time slots to check the quality of files. Good peers always timely check the quality of files, delete the polluted files and continue to share the authentic files. Let x, x 2, x 3,and x 4 denote the proportion of selfish, lazy, good, and malicious peers in PeerTrust Selfish Figure 7. Comparing the effective download ratio of various peers in three trust systems with implicit feedback. the networks respectively, the population vector can be described by X = (x, x 2, x 3, x 4 ). Fig. 7 shows the performance of AVG, HALF, and PeerTrust systems with implicit feedback when X = (,,, ). We see that all trust systems based on implicit feedback can provide differential services for peers with different behaviors. Good peers are rewarded by better and better performance while Lazy peers and selfish peers will be punished by the declining performance. It is proved that trust mechanism based on implicit feedback can encourage the rational peers to behave as expected by system. From the cost of implementation, implicit feedback derives from the post-download behavior of the local peer, which can be monitored by system automatically. Considering many attacks against trust systems derived from subjective feedback, implicit feedback can improving the robustness of trust systems. V. CONCLUSION In this paper, we analyze the impact of feedback sparsity and delay on the feedback-based trust systems in the decentralized P2P network. Based on a uniform simulation platform, we compare the performances of trust systems under the idealized feedback assumption and Lazy Good

7 88 JOURNAL OF NETWORKS, VOL. 7, NO. 8, AUGUST 22 the real feedback model considering feedback sparsity and delay. The results show that feedback sparsity and delay significantly affect the effectiveness of trust systems. We propose an implicit feedback mechanism based on the retention time of the downloaded file to removing the impact of explicit feedback on trust. Using the implicit feedback, the performance of trust systems are reviewed in the same network environment. We find the implicit feedback-based trust systems can gain better performance than the explicit feedback-based trust systems. ACKNOWLEDGMENT This work was supported by the National 973 Program of China under Grant No. 2CB7343. REFERENCES [] E. Adar and B. Huberman, Free riding on gnutella, First Monday, vol. 5, pp. 2-3, 2. [2] J. Liang, R. Kumar, Y. J.Xi, and K. W. Ross, Pollution in P2P file sharing systems, IEEE Infocom 25: The Conference on Computer Communications, vols. -4, pp , 25. doi:.9/infcom [3] S. D. Kamvar, M. T. Schlosser, and H. Garcia-Molina, The eigentrust algorithm for reputation management in p2p networks, in Proc. of the 2th International Conference on World Wide Web, pp , 23. doi:.45/ [4] R. F. Zhou, K Hwang, Powertrust: A robust and scalable reputation system for trusted peer-to-peer computing, IEEE Trans. on Parallel and Distributed Systems, pp , 27. doi:.9/tpds.27.2 [5] L. Xiong and L. Liu, PeerTrust: Supporting Reputation- Based Trust for Peer-to-Peer Electronic Communities, IEEE Trans. on Knowledge and Data Eng., vol. 6, no. 7, pp , 24. doi:.9/tkde [6] G. Boella, M. Remondino, and G. Tornese, Simulating the Human Factor in Reputation Management Systems for P2P Networks an Agent Based Model, in Proc. of the Fifth International Conference on Web Information Systems and Technologies, 29. [7] U. Lee, M. Choi, J. Cho, M. Y. Sanadidi, M. Gerla, Understanding pollution dynamics in p2p file sharing, UCLA CSD Techical Report, 25. [8] L. Mekouar, Y. Iraqi, R. Boutaba, Reputation-based trust management in peer-to-peer systems: taxonomy and anatomy, Handbook of Peer-to-Peer Networking, pp , 2. doi:.7/ [9] Z. Liang and W. Shi, Analysis of ratings on trust inference in open environments, Elsevier Performance Evaluation, vol. 65, no. 2, pp , Feb 28. doi:.6/j.peva [] Z. Liang, W. Shi, Enforcing cooperative resource sharing in untrusted peer-to-peer environment, ACM Journal of Mobile Networks and Applicationsvol., no. 6, pp , 25. doi:.7/s [] Y. Wang, J. Vassileva, Trust and reputation model in peer-to-peer networks, in: Third International Conference on Peer-to-Peer Computing, P2P 3, September 23. doi:.9/ptp [2] A. Josang, R. Ismail, The beta reputation system, in Proc. of the 5th Bled Electronic Commerce Conference, Bled, Slovenia, 22. [3] Q. Y. Feng, Y. F. Dai, Lip: A lifetime and popularity based ranking approach to filter out fake files in p2p file sharing systems, in Proc. of IPTPS, Bellevue, Washington, 27. [4] N. Fotiou, G. Marias, and G. Polyzos, Information Ranking in Content-Centric Networks, in Proc. of the Future Network and Mobile, 2. [5] R. Ormandi, I. Hegedus, K. Csernai, and M. Jelasity, Towards inferring ratings from user behavior in BitTorrent communities, 9th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (Wetice 2), pp , 2. doi:.9/wetice.2 [6] M. Schlosser, T. Condie, and S. kamvar, Simulating a file-sharing p2p network, in Proc. of the st Workshop on Semantics in Peer-to-Peer and Grid Computing, pp , May 23. Zhihua Huang (976-) is currently a Ph.D. candidate at the Department of Electronic Engineering of Shanghai Jiao Tong University, Shanghai, China. She received her B.S. degree in Information Engineering and M.S. degree in Communication and Information System from Xinjiang University of Urumqi City, Xinjiang, in 999 and 25, respectively. Her research interests include peer to peer network, trust and reputation systems, and Information security. Songnian Lu (943-) is a Professor and Ph.D. supervisor at the Department of Electronic Engineering of Shanghai Jiao Tong University, Shanghai, China. He received his B.S. from Shanghai Jiao Tong University in 982. His research interests include information security, distributed systems, and Operating Systems. Aixin Zhang (973-) is an Associate professor of the School of Information Security Engineering, Shanghai Jiao Tong University, Shanghai, China. She received her Ph.D. degree in control theory and control engineering From East China University of Science and Technology, Shanghai, China, in 23, her M.S. degree in control theory and control engineering and B.E. degree in computer software engineering from Liaoning Shihua University, Liaoning, China, in 998 and 995, respectively. Her current research interests include information security, digital rights management and multimedia information forensics. Jie Gu (982-) is currently a Ph.D. candidate at the Department of Electronic Engineering of Shanghai Jiao Tong University, Shanghai, China. He received his B.S. and M.S. degrees in Telecommunication Engineering from Xidian University in 24 and 27, respectively. His research interests include anonymous authentication, key distribution, wireless network security and information security.

Reputation Management in P2P Systems

Reputation Management in P2P Systems Reputation Management in P2P Systems Pradipta Mitra Nov 18, 2003 1 We will look at... Overview of P2P Systems Problems in P2P Systems Reputation Management Limited Reputation Sharing Simulation Results

More information

SELF-ORGANIZING TRUST MODEL FOR PEER TO PEER SYSTEMS

SELF-ORGANIZING TRUST MODEL FOR PEER TO PEER SYSTEMS SELF-ORGANIZING TRUST MODEL FOR PEER TO PEER SYSTEMS R. K. Prasad and Vipin Sharma 1 Department of Mechanical Engineering ABSTRACT: P A College of Engineering Nadupadavu, Mangalore, India In this implemented

More information

Trust in the Internet of Things From Personal Experience to Global Reputation. 1 Nguyen Truong PhD student, Liverpool John Moores University

Trust in the Internet of Things From Personal Experience to Global Reputation. 1 Nguyen Truong PhD student, Liverpool John Moores University Trust in the Internet of Things From Personal Experience to Global Reputation 1 Nguyen Truong PhD student, Liverpool John Moores University 2 Outline I. Background on Trust in Computer Science II. Overview

More information

AN ADAPTIVE P2P TOPOLOGY EVOLVEMENT MODEL BASED ON INTEREST SIMILARITY

AN ADAPTIVE P2P TOPOLOGY EVOLVEMENT MODEL BASED ON INTEREST SIMILARITY AN ADAPTIVE P2P TOPOLOGY EVOLVEMENT MODEL BASED ON INTEREST SIMILARITY Li Yang, Changyou Xing, Yusen Zhang, and Jinshuang Wang Institute of Command Automation, PLA University of Science and Technology

More information

P2P Contents Distribution System with Routing and Trust Management

P2P Contents Distribution System with Routing and Trust Management The Sixth International Symposium on Operations Research and Its Applications (ISORA 06) Xinjiang, China, August 8 12, 2006 Copyright 2006 ORSC & APORC pp. 319 326 P2P Contents Distribution System with

More information

DEFENDING AGAINST MALICIOUS NODES USING AN SVM BASED REPUTATION SYSTEM

DEFENDING AGAINST MALICIOUS NODES USING AN SVM BASED REPUTATION SYSTEM DEFENDING AGAINST MALICIOUS NODES USING AN SVM BASED REPUTATION SYSTEM Rehan Akbani, Turgay Korkmaz, and G. V. S. Raju {rakbani@cs.utsa.edu, korkmaz@cs.utsa.edu, and gvs.raju@utsa.edu} University of Texas

More information

Wireless Network Security : Spring Arjun Athreya March 3, 2011 Survey: Trust Evaluation

Wireless Network Security : Spring Arjun Athreya March 3, 2011 Survey: Trust Evaluation Wireless Network Security 18-639: Spring 2011 Arjun Athreya March 3, 2011 Survey: Trust Evaluation A scenario LOBOS Management Co A CMU grad student new to Pittsburgh is looking for housing options in

More information

Trusted P2P Transactions with Fuzzy Reputation Aggregation

Trusted P2P Transactions with Fuzzy Reputation Aggregation Trusted P2P Transactions with Fuzzy Reputation Aggregation Shanshan Song, Kai Hwang, Runfang Zhou, and Yu-Kwong Kwok University of Southern California Internet commerce is facing a problem of distrust

More information

Entropy-Based Recommendation Trust Model for Machine to Machine Communications

Entropy-Based Recommendation Trust Model for Machine to Machine Communications Entropy-Based Recommendation Trust Model for Machine to Machine Communications Saneeha Ahmed and Kemal Tepe 1 University of Windsor, Windsor, Ontario, Canada {ahmed13m,ktepe}@uwindsor.ca Abstract. In a

More information

Novel Design and Implementation of Self Organizing Trust Model for Peer - Peer Systems

Novel Design and Implementation of Self Organizing Trust Model for Peer - Peer Systems Novel Design and Implementation of Self Organizing Trust Model for Peer - Peer Systems E. Latha M.Tech, Dept of Software Engineering (SE), Vinuthna Institute of Technology & Sciences. Abstract: This paper

More information

P2P Trust: An Efficient and Secure File Sharing Management in P2P Networks

P2P Trust: An Efficient and Secure File Sharing Management in P2P Networks International Journal of Control Theory and Applications ISSN : 0974-5572 International Science Press Volume 10 Number 16 2017 P2P Trust: An Efficient and Secure File Sharing Management in P2P Networks

More information

Refining Reputation to Truly Select High-QoS Servers in Peer-to-Peer Networks

Refining Reputation to Truly Select High-QoS Servers in Peer-to-Peer Networks Refining to Truly Select High-QoS Servers in Peer-to-Peer Networks Haiying Shen and Lianyu Zhao Department of Electrical and Computer Engineering Clemson University, Clemson, SC 93 {shenh, lianyuz}@clemson.edu

More information

AN AUTOMATED TRUST MODEL FOR CLIENT-SERVER AND PEER-TO-PEER SYSTEM

AN AUTOMATED TRUST MODEL FOR CLIENT-SERVER AND PEER-TO-PEER SYSTEM AN AUTOMATED TRUST MODEL FOR CLIENT-SERVER AND PEER-TO-PEER SYSTEM 1 LANKE PRAVIN, 2 SACHIN MALVE 1 Student, IOKCOE, 2 Professor, IOKCOE Email: 1 lankepd@gmail.com Abstract To maintain trust in peer-to-peer

More information

Distributed Data-Intensive Systems

Distributed Data-Intensive Systems Distributed Data-Intensive Systems CSCE 438 Texas A&M University Department of Computer Science and Engineering Instructor: Prof. James Caverlee Peer-to-Peer Systems February 6, 214 EigenTrust The EigenTrust

More information

A Method of Identifying the P2P File Sharing

A Method of Identifying the P2P File Sharing IJCSNS International Journal of Computer Science and Network Security, VOL.10 No.11, November 2010 111 A Method of Identifying the P2P File Sharing Jian-Bo Chen Department of Information & Telecommunications

More information

arxiv: v1 [cs.cr] 30 May 2014

arxiv: v1 [cs.cr] 30 May 2014 ROMEO: ReputatiOn Model Enhancing OpenID Simulator Ginés Dólera Tormo 1, Félix Gómez Mármol 1, and Gregorio Martínez Pérez 2 arxiv:1405.7831v1 [cs.cr] 30 May 2014 1 NEC Europe Ltd., Kurfürsten-Anlage 36,

More information

Abhishek Sharma and Hao Shi

Abhishek Sharma and Hao Shi Abhishek Sharma and Hao Shi School of Engineering and Science, Victoria University, Melbourne, Australia abhisharayiya@gmail.com and hao.shi@vu.edu.au ABSTRACT Peer-to-Peer (P2P) networks provide a significant

More information

Trust Enhanced Cryptographic Role-based Access Control for Secure Cloud Data Storage

Trust Enhanced Cryptographic Role-based Access Control for Secure Cloud Data Storage 1 Trust Enhanced Cryptographic Role-based Access Control for Secure Cloud Data Storage Lan Zhou,Vijay Varadharajan,and Michael Hitchens Abstract Cloud data storage has provided significant benefits by

More information

A CONFIDENCE MODEL BASED ROUTING PRACTICE FOR SECURE ADHOC NETWORKS

A CONFIDENCE MODEL BASED ROUTING PRACTICE FOR SECURE ADHOC NETWORKS A CONFIDENCE MODEL BASED ROUTING PRACTICE FOR SECURE ADHOC NETWORKS Ramya. S 1 and Prof. B. Sakthivel 2 ramyasiva.jothi@gmail.com and everrock17@gmail.com 1PG Student and 2 Professor & Head, Department

More information

PSH: A Private and Shared History-Based Incentive Mechanism

PSH: A Private and Shared History-Based Incentive Mechanism PSH: A Private and Shared History-Based Incentive Mechanism Thomas Bocek 1,WangKun 2, Fabio Victora Hecht 1, David Hausheer 1, and Burkhard Stiller 1,3 1 Department of Informatics IFI, University of Zurich,

More information

Technical Report CS : Incorporating Trust in Network Virtualization

Technical Report CS : Incorporating Trust in Network Virtualization Technical Report CS-2010-04: Incorporating Trust in Network Virtualization Loubna Mekouar University of Waterloo Waterloo, Canada lmekouar@bbcr.uwaterloo.ca Youssef Iraqi Khalifa University Sharjah, UAE

More information

1. Introduction. 2. Discussion On Defense Mechanisms. 2.1 Blacklisting

1. Introduction. 2. Discussion On Defense Mechanisms. 2.1 Blacklisting www.ijcsi.org 296 Study of Reputation Based Defense Mechanism in Peer To Peer Live Streaming Prof. Dr. M.A. Mottalib 1, Md. Ali-Al Mamun 2, Reazul Hoque 3, Md. Ehsanuzzaman 4 and Jonayed Kaysar 5 1,2,3,4,5

More information

Reliable and Resilient Trust Management in Distributed Service Provision Networks

Reliable and Resilient Trust Management in Distributed Service Provision Networks Reliable and Resilient Trust Management in Distributed Service Provision Networks ZHIYUAN SU, State Key Laboratory of High-end Server & Storage Technology, Dalian University of Technology, Georgia Institute

More information

A Priori Trust Vulnerabilities in EigenTrust

A Priori Trust Vulnerabilities in EigenTrust A Priori Trust Vulnerabilities in EigenTrust Rob Jansen jansen@cs.umn.edu Alexander Saint Croix saintx@umn.edu Ted Kaminski tedinski@cs.umn.edu December 22, 2008 Daniel Selifonov selifon@cs.umn.edu Fedor

More information

A Security Management Scheme Using a Novel Computational Reputation Model for Wireless and Mobile Ad hoc Networks

A Security Management Scheme Using a Novel Computational Reputation Model for Wireless and Mobile Ad hoc Networks 5th ACM Workshop on Performance Evaluation of Wireless Ad Hoc, Sensor, and Ubiquitous Networks (PE-WASUN) A Security Management Scheme Using a Novel Computational Reputation Model for Wireless and Mobile

More information

Model the P2P Attack in Computer Networks

Model the P2P Attack in Computer Networks International Conference on Logistics Engineering, Management and Computer Science (LEMCS 2015) Model the P2P Attack in Computer Networks Wei Wang * Science and Technology on Communication Information

More information

Problems in Reputation based Methods in P2P Networks

Problems in Reputation based Methods in P2P Networks WDS'08 Proceedings of Contributed Papers, Part I, 235 239, 2008. ISBN 978-80-7378-065-4 MATFYZPRESS Problems in Reputation based Methods in P2P Networks M. Novotný Charles University, Faculty of Mathematics

More information

hirep: Hierarchical Reputation Management for Peer-to-Peer Systems

hirep: Hierarchical Reputation Management for Peer-to-Peer Systems hirep: Hierarchical Reputation Management for Peer-to-Peer Systems Xiaomei Liu, Li Xiao Department of Computer Science and Engineering Michigan State University, East Lansing, MI 48824 {liuxiaom, lxiao}@cse.msu.edu

More information

Heterogeneity Increases Multicast Capacity in Clustered Network

Heterogeneity Increases Multicast Capacity in Clustered Network Heterogeneity Increases Multicast Capacity in Clustered Network Qiuyu Peng Xinbing Wang Huan Tang Department of Electronic Engineering Shanghai Jiao Tong University April 15, 2010 Infocom 2011 1 / 32 Outline

More information

PowerTrust: A Robust and Scalable Reputation System for Trusted Peer-to-Peer Computing *

PowerTrust: A Robust and Scalable Reputation System for Trusted Peer-to-Peer Computing * PowerTrust: A Robust and Scalable Reputation System for Trusted Peer-to-Peer Computing * Runfang Zhou, Student Member, IEEE and Kai Hwang, Fellow, IEEE Computer Society Abstract: Peer-to-Peer (P2P) reputation

More information

Cumulative Reputation Systems for Peer-to-Peer Content Distribution

Cumulative Reputation Systems for Peer-to-Peer Content Distribution Cumulative Reputation Systems for Peer-to-Peer Content Distribution B. Mortazavi and G. Kesidis Pennsylvania State University also with Verizon Wireless CISS Princeton March 23, 2006 1 Outline P2P CDNs

More information

Study of Trust Management Approaches in Peer to Peer System

Study of Trust Management Approaches in Peer to Peer System Research Article International Journal of Current Engineering and Technology E-ISSN 2277 4106, P-ISSN 2347-5161 2014 INPRESSCO, All Rights Reserved Available at http://inpressco.com/category/ijcet Santosh

More information

A Survey of Trust Computation Models for Service Management in Internet of Things Systems

A Survey of Trust Computation Models for Service Management in Internet of Things Systems A Survey of Trust Computation Models for Service Management in Internet of Things Systems Abstract Jia Guo, Ing-Ray Chen, and Jeffrey J.P. Tsai* Virginia Tech Department of Computer Science {jiaguo, irchen}@vt.edu

More information

Trust4All: a Trustworthy Middleware Platform for Component Software

Trust4All: a Trustworthy Middleware Platform for Component Software Proceedings of the 7th WSEAS International Conference on Applied Informatics and Communications, Athens, Greece, August 24-26, 2007 124 Trust4All: a Trustworthy Middleware Platform for Component Software

More information

Countering Sparsity and Vulnerabilities in Reputation Systems

Countering Sparsity and Vulnerabilities in Reputation Systems Countering Sparsity and Vulnerabilities in Reputation Systems Li Xiong Department of Mathematics and Computer Science Emory University lxiong@mathcs.emory.edu Ling Liu, Mustaque Ahamad College of Computing

More information

Decoy Black-Hole Attack

Decoy Black-Hole Attack International Journal of Scientific & Engineering Research, Volume 3, Issue 6, June-2012 1 Decoy Black-Hole Attack Sabeeha Mehtab, Aruna B. Dulloo Abstract Mobile ad hoc networks are being widely deployed

More information

Recommendation System for Location-based Social Network CS224W Project Report

Recommendation System for Location-based Social Network CS224W Project Report Recommendation System for Location-based Social Network CS224W Project Report Group 42, Yiying Cheng, Yangru Fang, Yongqing Yuan 1 Introduction With the rapid development of mobile devices and wireless

More information

AOTO: Adaptive Overlay Topology Optimization in Unstructured P2P Systems

AOTO: Adaptive Overlay Topology Optimization in Unstructured P2P Systems AOTO: Adaptive Overlay Topology Optimization in Unstructured P2P Systems Yunhao Liu, Zhenyun Zhuang, Li Xiao Department of Computer Science and Engineering Michigan State University East Lansing, MI 48824

More information

WEB PAGE RE-RANKING TECHNIQUE IN SEARCH ENGINE

WEB PAGE RE-RANKING TECHNIQUE IN SEARCH ENGINE WEB PAGE RE-RANKING TECHNIQUE IN SEARCH ENGINE Ms.S.Muthukakshmi 1, R. Surya 2, M. Umira Taj 3 Assistant Professor, Department of Information Technology, Sri Krishna College of Technology, Kovaipudur,

More information

Collusion Detection in Reputation Systems for Peer-to-Peer Networks

Collusion Detection in Reputation Systems for Peer-to-Peer Networks Collusion Detection in Reputation Systems for Peer-to-Peer Networks Ze Li, Haiying Shen and Karan Sapra Department of Electrical and Computer Engineering Clemson University, Clemson, SC, 263 Email: {zel,

More information

Multi-path based Algorithms for Data Transfer in the Grid Environment

Multi-path based Algorithms for Data Transfer in the Grid Environment New Generation Computing, 28(2010)129-136 Ohmsha, Ltd. and Springer Multi-path based Algorithms for Data Transfer in the Grid Environment Muzhou XIONG 1,2, Dan CHEN 2,3, Hai JIN 1 and Song WU 1 1 School

More information

Research Article Globally Decoupled Reputations for Large Distributed Networks

Research Article Globally Decoupled Reputations for Large Distributed Networks Hindawi Publishing Corporation Advances in Multimedia Volume 27, Article ID 92485, 14 pages doi:1.1155/27/92485 Research Article Globally Decoupled Reputations for Large Distributed Networks Gayatri Swamynathan,

More information

SOFIA: Social Filtering for Niche Markets

SOFIA: Social Filtering for Niche Markets Social Filtering for Niche Markets Matteo Dell'Amico Licia Capra University College London UCL MobiSys Seminar 9 October 2007 : Social Filtering for Niche Markets Outline 1 Social Filtering Competence:

More information

Ensuring Secure and Timely Availability of Reputation Data in Peer To Peer Networks

Ensuring Secure and Timely Availability of Reputation Data in Peer To Peer Networks Ensuring Secure and Timely Availability of Reputation Data in Peer To Peer Networks S.Saranya 1, K.Kiruthika Devi 2 P.G Scholar, Department of Computer Science and Engineering, Nandha College of Technology,

More information

A reputation system for BitTorrent peer-to-peer filesharing

A reputation system for BitTorrent peer-to-peer filesharing University of Wollongong Research Online University of Wollongong Thesis Collection 1954-2016 University of Wollongong Thesis Collections 2006 A reputation system for BitTorrent peer-to-peer filesharing

More information

GroupRep: A Robust Group-based Reputation System for Peer-to-Peer Networks

GroupRep: A Robust Group-based Reputation System for Peer-to-Peer Networks GroupRep: A Robust Group-based Reputation System for Peer-to-Peer Networks Ye Tian, Di Wu and Kam-Wing Ng Department of Computer Science and Engineering The Chinese University of Hong Kong Shatin, N.T.,

More information

MULTI - KEYWORD RANKED SEARCH OVER ENCRYPTED DATA SUPPORTING SYNONYM QUERY

MULTI - KEYWORD RANKED SEARCH OVER ENCRYPTED DATA SUPPORTING SYNONYM QUERY ISSN: 0976-3104 SPECIAL ISSUE Jayanthi and Prabadevi RESEARCH OPEN ACCESS MULTI - KEYWORD RANKED SEARCH OVER ENCRYPTED DATA SUPPORTING SYNONYM QUERY Jayanthi M.* and Prabadevi School of Information Technology

More information

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY A PATH FOR HORIZING YOUR INNOVATIVE WORK PEER-TO-PEER FILE SHARING WITH THE BITTORRENT PROTOCOL APURWA D. PALIWAL 1, PROF.

More information

E±cient Detection Of Compromised Nodes In A Wireless Sensor Network

E±cient Detection Of Compromised Nodes In A Wireless Sensor Network E±cient Detection Of Compromised Nodes In A Wireless Sensor Network Cheryl V. Hinds University of Idaho cvhinds@vandals.uidaho.edu Keywords: Compromised Nodes, Wireless Sensor Networks Abstract Wireless

More information

On the impact of propogation delay on mining rewards in Bitcoin. Xuan Wen 1. Abstract

On the impact of propogation delay on mining rewards in Bitcoin. Xuan Wen 1. Abstract On the impact of propogation delay on mining rewards in Bitcoin Xuan Wen 1 Abstract Bitcoin 2 is a decentralized digital currency that is rapidly gaining in popularity. The Bitcoin system relies on miners

More information

Dynamic Trust Model for Reliable Transactions in Multi-agent Systems

Dynamic Trust Model for Reliable Transactions in Multi-agent Systems Dynamic Trust Model for Reliable Transactions in Multi-agent Systems Anupam Das, M. Mahfuzul Islam IEEE member and Golam Sorwar Department of Computer Science and Engineering, Bangladesh University of

More information

BitTorrent Fairness Analysis

BitTorrent Fairness Analysis BitTorrent Fairness Analysis Team Asians Zhenkuang He Gopinath Vasalamarri Topic Summary Aim to test how the fairness affect the file transfer speed in a P2P environment (here using the BitTorrent Protocol)

More information

SocialLink: Utilizing Social Network and Transaction Links for Effective Trust Management in P2P File Sharing Systems

SocialLink: Utilizing Social Network and Transaction Links for Effective Trust Management in P2P File Sharing Systems SocialLink: Utilizing Social Network and Transaction Links for Effective Trust Management in P2P File Sharing Systems Kang Chen 1, Guoxin Liu 2, Haiying Shen 2 and Fang Qi 2 1 Dept. Of ECE Southern Illinois

More information

A Framework of Decentralized PKI Key Management Based on Dynamic Trust

A Framework of Decentralized PKI Key Management Based on Dynamic Trust A Framework of Decentralized PKI Key Management Based on Dynamic Trust Zhiqian Xu 1 and Hai Jiang 2 1 FedEx Corporation, Collierville, TN, U.S.A. 2 Dept. of Computer Science, Arkansas State University,

More information

Defense of Trust Management Vulnerabilities in Distributed Networks

Defense of Trust Management Vulnerabilities in Distributed Networks Defense of Trust Management Vulnerabilities in Distributed Networks Yan (Lindsay) Sun, Zhu Han, and K. J. Ray Liu Department of Electrical and Computer Engineering University of Rhode Island, RI 02881

More information

Integrating Dirichlet Reputation into Usage Control

Integrating Dirichlet Reputation into Usage Control Integrating Dirichlet Reputation into Usage Control Li Yang and Alma Cemerlic University of Tennessee at Chattanooga Cyber Security and Information Intelligence Research Workshop 2009 Motivation of the

More information

A Framework for Securing Databases from Intrusion Threats

A Framework for Securing Databases from Intrusion Threats A Framework for Securing Databases from Intrusion Threats R. Prince Jeyaseelan James Department of Computer Applications, Valliammai Engineering College Affiliated to Anna University, Chennai, India Email:

More information

SEAR: SECURED ENERGY-AWARE ROUTING WITH TRUSTED PAYMENT MODEL FOR WIRELESS NETWORKS

SEAR: SECURED ENERGY-AWARE ROUTING WITH TRUSTED PAYMENT MODEL FOR WIRELESS NETWORKS SEAR: SECURED ENERGY-AWARE ROUTING WITH TRUSTED PAYMENT MODEL FOR WIRELESS NETWORKS S. P. Manikandan 1, R. Manimegalai 2 and S. Kalimuthu 3 1 Department of Computer Science and Engineering, Sri Venkateshwara

More information

Identity Crisis: Anonymity vs. Reputation in P2P Systems

Identity Crisis: Anonymity vs. Reputation in P2P Systems Identity Crisis: Anonymity vs. Reputation in P2P Systems Sergio Marti and Hector Garcia-Molina Stanford University Stanford, CA 94305 {smarti, hector}@cs.stanford.edu Abstract The effectiveness of reputation

More information

An Authentication Service Based on Trust and Clustering in Mobile Ad Hoc Networks

An Authentication Service Based on Trust and Clustering in Mobile Ad Hoc Networks An Authentication Service Based on Trust and Clustering in Mobile Ad Hoc Networks M.Phil Term 3 paper Department of Computer Science and Engineering The Chinese University of Hong Kong written by Edith

More information

Fault Localization for Firewall Policies

Fault Localization for Firewall Policies Fault Localization for Firewall Policies JeeHyun Hwang 1 Tao Xie 1 Fei Chen Alex X. Liu 1 Department of Computer Science, North Carolina State University, Raleigh, NC 7695-86 Department of Computer Science

More information

Analyzing a Human-based Trust Model for Mobile Ad Hoc Networks

Analyzing a Human-based Trust Model for Mobile Ad Hoc Networks Analyzing a Human-based Trust Model for Mobile Ad Hoc Networks Pedro B. Velloso 1, Rafael P. Laufer 2, Otto Carlos M. B. Duarte 3, and Guy Pujolle 1 1 Laboratoire d Informatique de Paris 6 (LIP6) 2 Computer

More information

Stretch-Optimal Scheduling for On-Demand Data Broadcasts

Stretch-Optimal Scheduling for On-Demand Data Broadcasts Stretch-Optimal Scheduling for On-Demand Data roadcasts Yiqiong Wu and Guohong Cao Department of Computer Science & Engineering The Pennsylvania State University, University Park, PA 6 E-mail: fywu,gcaog@cse.psu.edu

More information

Reputation-based Trust Management in Peer-to-Peer File Sharing Systems

Reputation-based Trust Management in Peer-to-Peer File Sharing Systems Reputation-based Trust Management in Peer-to-Peer File Sharing Systems by Loubna Mekouar A thesis presented to the University of Waterloo in fulfillment of the thesis requirement for the degree of Doctor

More information

EARM: An Efficient and Adaptive File Replication with Consistency Maintenance in P2P Systems.

EARM: An Efficient and Adaptive File Replication with Consistency Maintenance in P2P Systems. : An Efficient and Adaptive File Replication with Consistency Maintenance in P2P Systems. 1 K.V.K.Chaitanya, 2 Smt. S.Vasundra, M,Tech., (Ph.D), 1 M.Tech (Computer Science), 2 Associate Professor, Department

More information

Comparing Chord, CAN, and Pastry Overlay Networks for Resistance to DoS Attacks

Comparing Chord, CAN, and Pastry Overlay Networks for Resistance to DoS Attacks Comparing Chord, CAN, and Pastry Overlay Networks for Resistance to DoS Attacks Hakem Beitollahi Hakem.Beitollahi@esat.kuleuven.be Geert Deconinck Geert.Deconinck@esat.kuleuven.be Katholieke Universiteit

More information

Limited Reputation Sharing in P2P Systems

Limited Reputation Sharing in P2P Systems Limited Reputation Sharing in P2P Systems Sergio Marti and Hector Garcia-Molina Stanford University {smarti, hector}@cs.stanford.edu ABSTRACT The increasing popularity of resource exchange through peerto-peer

More information

Ripple-Stream: Safeguarding P2P Streaming Against DoS Attacks

Ripple-Stream: Safeguarding P2P Streaming Against DoS Attacks 1 Ripple-Stream: Safeguarding P2P Streaming Against DoS Attacks Wenjie Wang, Yongqiang Xiong, Qian Zhang Abstract Compared with file-sharing and distributed hash table (DHT) network, P2P streaming is more

More information

EVALUATED REPUTATION-BASED TRUST FOR WSN SECURITY

EVALUATED REPUTATION-BASED TRUST FOR WSN SECURITY EVALUATED REPUTATION-BASED TRUST FOR WSN SECURITY 1 ABDULLAH SAID ALKALBANI, 2 ABU OSMAN MD. TAP, 3 TEDDY MANTORO 1 Ph.D. Candidate, Department of Computer Science, KICT, International Islamic University

More information

Evolutionary Linkage Creation between Information Sources in P2P Networks

Evolutionary Linkage Creation between Information Sources in P2P Networks Noname manuscript No. (will be inserted by the editor) Evolutionary Linkage Creation between Information Sources in P2P Networks Kei Ohnishi Mario Köppen Kaori Yoshida Received: date / Accepted: date Abstract

More information

ENSF: ENERGY-EFFICIENT NEXT-HOP SELECTION METHOD USING FUZZY LOGIC IN PROBABILISTIC VOTING-BASED FILTERING SCHEME

ENSF: ENERGY-EFFICIENT NEXT-HOP SELECTION METHOD USING FUZZY LOGIC IN PROBABILISTIC VOTING-BASED FILTERING SCHEME ENSF: ENERGY-EFFICIENT NEXT-HOP SELECTION METHOD USING FUZZY LOGIC IN PROBABILISTIC VOTING-BASED FILTERING SCHEME Jae Kwan Lee 1 and Tae Ho Cho 2 1, 2 College of Information and Communication Engineering,

More information

CS246: Mining Massive Datasets Jure Leskovec, Stanford University

CS246: Mining Massive Datasets Jure Leskovec, Stanford University CS246: Mining Massive Datasets Jure Leskovec, Stanford University http://cs246.stanford.edu SPAM FARMING 2/11/2013 Jure Leskovec, Stanford C246: Mining Massive Datasets 2 2/11/2013 Jure Leskovec, Stanford

More information

On Veracious Search In Unsystematic Networks

On Veracious Search In Unsystematic Networks On Veracious Search In Unsystematic Networks K.Thushara #1, P.Venkata Narayana#2 #1 Student Of M.Tech(S.E) And Department Of Computer Science And Engineering, # 2 Department Of Computer Science And Engineering,

More information

Bootstrapping the Long Tail in Peer to Peer Systems

Bootstrapping the Long Tail in Peer to Peer Systems Bootstrapping the Long Tail in Peer to Peer Systems Bernardo A. Huberman and Fang Wu HP Labs, Palo Alto, CA 94304 May 4, 2006 Abstract We describe an efficient incentive mechanism for P2P systems that

More information

Part 11: Collaborative Filtering. Francesco Ricci

Part 11: Collaborative Filtering. Francesco Ricci Part : Collaborative Filtering Francesco Ricci Content An example of a Collaborative Filtering system: MovieLens The collaborative filtering method n Similarity of users n Methods for building the rating

More information

Investigation on OLSR Routing Protocol Efficiency

Investigation on OLSR Routing Protocol Efficiency Investigation on OLSR Routing Protocol Efficiency JIRI HOSEK 1, KAROL MOLNAR 2 Department of Telecommunications Faculty of Electrical Engineering and Communication, Brno University of Technology Purkynova

More information

Load Balancing Algorithm over a Distributed Cloud Network

Load Balancing Algorithm over a Distributed Cloud Network Load Balancing Algorithm over a Distributed Cloud Network Priyank Singhal Student, Computer Department Sumiran Shah Student, Computer Department Pranit Kalantri Student, Electronics Department Abstract

More information

Recommendation-Based Trust Model in P2P Network Environment

Recommendation-Based Trust Model in P2P Network Environment Recommendation-Based Trust Model in P2P Network Environment Yueju Lei, Guangxi Chen To cite this version: Yueju Lei, Guangxi Chen. Recommendation-Based Trust Model in P2P Network Environment. Zhongzhi

More information

TOWARD PRIVACY PRESERVING AND COLLUSION RESISTANCE IN A LOCATION PROOF UPDATING SYSTEM

TOWARD PRIVACY PRESERVING AND COLLUSION RESISTANCE IN A LOCATION PROOF UPDATING SYSTEM TOWARD PRIVACY PRESERVING AND COLLUSION RESISTANCE IN A LOCATION PROOF UPDATING SYSTEM R.Bhuvaneswari 1, V.Vijayalakshmi 2 1 M.Phil., Scholar, Bharathiyar Arts And Science College For Women, India 2 HOD

More information

Mobile Cloud Multimedia Services Using Enhance Blind Online Scheduling Algorithm

Mobile Cloud Multimedia Services Using Enhance Blind Online Scheduling Algorithm Mobile Cloud Multimedia Services Using Enhance Blind Online Scheduling Algorithm Saiyad Sharik Kaji Prof.M.B.Chandak WCOEM, Nagpur RBCOE. Nagpur Department of Computer Science, Nagpur University, Nagpur-441111

More information

A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud Data

A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud Data An Efficient Privacy-Preserving Ranked Keyword Search Method Cloud data owners prefer to outsource documents in an encrypted form for the purpose of privacy preserving. Therefore it is essential to develop

More information

A Survey of Attack and Defense Techniques for Reputation Systems

A Survey of Attack and Defense Techniques for Reputation Systems A Survey of Attack and Defense Techniques for Reputation Systems Kevin Hoffman, David Zage, and Cristina Nita-Rotaru Department of Computer Science and CERIAS, Purdue University 305 N. University St.,

More information

Query Independent Scholarly Article Ranking

Query Independent Scholarly Article Ranking Query Independent Scholarly Article Ranking Shuai Ma, Chen Gong, Renjun Hu, Dongsheng Luo, Chunming Hu, Jinpeng Huai SKLSDE Lab, Beihang University, China Beijing Advanced Innovation Center for Big Data

More information

An Cross Layer Collaborating Cache Scheme to Improve Performance of HTTP Clients in MANETs

An Cross Layer Collaborating Cache Scheme to Improve Performance of HTTP Clients in MANETs An Cross Layer Collaborating Cache Scheme to Improve Performance of HTTP Clients in MANETs Jin Liu 1, Hongmin Ren 1, Jun Wang 2, Jin Wang 2 1 College of Information Engineering, Shanghai Maritime University,

More information

Recommender Systems (RSs)

Recommender Systems (RSs) Recommender Systems Recommender Systems (RSs) RSs are software tools providing suggestions for items to be of use to users, such as what items to buy, what music to listen to, or what online news to read

More information

PRIVACY AND TRUST-AWARE FRAMEWORK FOR SECURE ROUTING IN WIRELESS MESH NETWORKS

PRIVACY AND TRUST-AWARE FRAMEWORK FOR SECURE ROUTING IN WIRELESS MESH NETWORKS PRIVACY AND TRUST-AWARE FRAMEWORK FOR SECURE ROUTING IN WIRELESS MESH NETWORKS 1 PRASHANTH JAYAKUMAR, 2 P.S.KHANAGOUDAR, 3 VINAY KAVERI 1,3 Department of CSE, GIT, Belgaum, 2 Assistant Professor, Dept.

More information

Sybil Attack Detection with Reduced Bandwidth overhead in Urban Vehicular Networks

Sybil Attack Detection with Reduced Bandwidth overhead in Urban Vehicular Networks Sybil Attack Detection with Reduced Bandwidth overhead in Urban Vehicular Networks D.Balamahalakshmi Department of Computer Science and Engineering, V.S.B Engineering College, Karur, Tamilnadu, India 1

More information

Bootstrapping the Long Tail in Peer to Peer Systems

Bootstrapping the Long Tail in Peer to Peer Systems Bootstrapping the Long Tail in Peer to Peer Systems Bernardo A. Huberman and Fang Wu HP Labs, Palo Alto, CA 94304 December 7, 2005 Abstract We describe an efficient incentive mechanism for P2P systems

More information

Using a Managed Peer-to-Peer Protocol to Deliver Files within an Organization

Using a Managed Peer-to-Peer Protocol to Deliver Files within an Organization ASIA-PACIFIC SYMPOSIUM ON QUEUEING THEORY AND NETWORK APPLICATIONS 2007 227 Using a Managed Peer-to-Peer Protocol to Deliver s within an Organization Chih-Chin Liang a, Chia-Hung Wang b, Hsing Luh b and

More information

A connection management protocol for promoting cooperation in Peer-to-Peer networks q

A connection management protocol for promoting cooperation in Peer-to-Peer networks q Available online at www.sciencedirect.com Computer Communications 31 (2008) 240 256 www.elsevier.com/locate/comcom A connection management protocol for promoting cooperation in Peer-to-Peer networks q

More information

Ensuring Trustworthiness and Security during Data Transmission in Multihop Wireless Networks

Ensuring Trustworthiness and Security during Data Transmission in Multihop Wireless Networks Ensuring Trustworthiness and Security during Data Transmission in Multihop Wireless Networks 1 S.Nandhini, 2 Mr.S.Franson Varun Richo, 1 PG Student, 2 Assistant professor, Francis Xavier Engineering college,

More information

A Flexible Trust Model for Distributed Service Infrastructures

A Flexible Trust Model for Distributed Service Infrastructures 11th IEEE Symposium on Object Oriented Real-Time Distributed Computing (ISORC) A Flexible Trust Model for Distributed Service Infrastructures Zhaoyu Liu, Stephen S. Yau, Dichao Peng, Yin Yin University

More information

Keywords: Peer-to-Peer Networks; Free Riding; Connection Management; Distributed Systems

Keywords: Peer-to-Peer Networks; Free Riding; Connection Management; Distributed Systems Elsevier Editorial System(tm) for Computer Communications Manuscript Draft Manuscript Number: COMCOM-D-06-00396R1 Title: A Connection Management Protocol for Promoting Cooperation in Peer-to-Peer Networks

More information

Peer-to-Peer (P2P) networks have emerged as a popular

Peer-to-Peer (P2P) networks have emerged as a popular , July 3-5, 213, London, U.K. On Combating Content Poisoning in Peer-to-Peer Networks Mohammed Hawa, Member, IAENG, Raed Al-Zubi, Khalid A. Darabkh, and Ghazi Al-Sukkar Abstract Poisoning attacks on Peer-to-Peer

More information

Remote Monitoring System of Ship Running State under Wireless Network

Remote Monitoring System of Ship Running State under Wireless Network Journal of Shipping and Ocean Engineering 7 (2017) 181-185 doi 10.17265/2159-5879/2017.05.001 D DAVID PUBLISHING Remote Monitoring System of Ship Running State under Wireless Network LI Ning Department

More information

Fast K-nearest neighbors searching algorithms for point clouds data of 3D scanning system 1

Fast K-nearest neighbors searching algorithms for point clouds data of 3D scanning system 1 Acta Technica 62 No. 3B/2017, 141 148 c 2017 Institute of Thermomechanics CAS, v.v.i. Fast K-nearest neighbors searching algorithms for point clouds data of 3D scanning system 1 Zhang Fan 2, 3, Tan Yuegang

More information

Traffic Signal Control Based On Fuzzy Artificial Neural Networks With Particle Swarm Optimization

Traffic Signal Control Based On Fuzzy Artificial Neural Networks With Particle Swarm Optimization Traffic Signal Control Based On Fuzzy Artificial Neural Networks With Particle Swarm Optimization J.Venkatesh 1, B.Chiranjeevulu 2 1 PG Student, Dept. of ECE, Viswanadha Institute of Technology And Management,

More information

On Minimizing Packet Loss Rate and Delay for Mesh-based P2P Streaming Services

On Minimizing Packet Loss Rate and Delay for Mesh-based P2P Streaming Services On Minimizing Packet Loss Rate and Delay for Mesh-based P2P Streaming Services Zhiyong Liu, CATR Prof. Zhili Sun, UniS Dr. Dan He, UniS Denian Shi, CATR Agenda Introduction Background Problem Statement

More information

Combining Review Text Content and Reviewer-Item Rating Matrix to Predict Review Rating

Combining Review Text Content and Reviewer-Item Rating Matrix to Predict Review Rating Combining Review Text Content and Reviewer-Item Rating Matrix to Predict Review Rating Dipak J Kakade, Nilesh P Sable Department of Computer Engineering, JSPM S Imperial College of Engg. And Research,

More information

VisoLink: A User-Centric Social Relationship Mining

VisoLink: A User-Centric Social Relationship Mining VisoLink: A User-Centric Social Relationship Mining Lisa Fan and Botang Li Department of Computer Science, University of Regina Regina, Saskatchewan S4S 0A2 Canada {fan, li269}@cs.uregina.ca Abstract.

More information