Abstract
The secure transmission of messages via computer networks is, in many scenarios, considered to be a solved problem. However, a related problem, being almost as crucial, has been widely ignored: To whom to entrust information? We argue that confidentiality modeling is a question of trust. Therefore, the article at hand addresses this problem based on a reputation system. We consider a Peer-to-Peer network whose participants decide on whether or not to make information available to other nodes based on the author’s trust relationships. Documents are only forwarded to another node if, according to the sender’s local view, the recipient is considered to be sufficiently trustworthy. In contrast to most existing reputation systems, trust relationships are considered only with respect to a specific domain. Privacy is preserved by limiting the revelation of trust relationships.
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Abdul-Rahman, A.: The PGP Trust Model. EDI Forum: The Journal of Electronic Commerce (April 1997)
Abdul-Rahman, A., Hailes, S.: Supporting trust in virtual communities. In: HICSS 2000: Proceedings of the 33rd Hawaii International Conference on System Sciences, Washington, DC, USA, vol. 6, p. 6007. IEEE Computer Society, Los Alamitos (2000)
Daignault, M., Shepherd, M., Marche, S., Watters, C.: Enabling trust online. In: Proceedings of the 3rd International Symposium on Electronic Commerce, pp. 3–12. IEEE, Los Alamitos (2002)
Douceur, J.R.: The sybil attack. In: Druschel, P., Kaashoek, M.F., Rowstron, A. (eds.) IPTPS 2002. LNCS, vol. 2429, p. 251. Springer, Heidelberg (2002)
Esser, H.: Institutionen: Soziologie: Spezielle Grundlagen, vol. 5. Campus Verlag, Frankfurt (2000)
Gambetta, D. (ed.): Can We Trust Trust? Basil Blackwell, Malden (1988)
Glaeser, E.L., Laibson, D.I., Scheinkman, J.A., Soutter, C.L.: Measuring trust. The Quarterly Journal of Economics 115(3), 811–846 (2000)
Guha, R., Kumar, R., Raghavan, P., Tomkins, A.: Propagation of trust and distrust. In: WWW 2004: Proceedings of the 13th international conference on WorldWide Web, pp. 403–412. ACM Press, New York (2004)
Gupta, M., Judge, P., Ammar, M.: A reputation system for peer-to-peer networks. In: NOSSDAV 2003: Proceedings of the 13th international workshop on Networkand operating systems support for digital audio and video, pp. 144–152. ACM Press, New York (2003)
Jones, K.: Trust: Philosophical Aspects. In: International Encyclopedia of the Social and Behavioral Sciences, vol. 23, pp. 15917–15922. Elsevier, Amsterdam (2001)
Kamvar, S.D., Schlosser, M.T., Garcia-Molina, H.: The Eigentrust algorithm for reputation management in P2P networks. In: WWW 2003: Proceedings of the 12th international conference on WorldWide Web, pp. 640–651. ACM Press, New York (2003)
Kinateder, M., Pearson, S.: A Privacy-Enhanced Peer-to-Peer Reputation System. In: Bauknecht, K., Tjoa, A.M., Quirchmayr, G. (eds.) EC-Web 2003. LNCS, vol. 2738, pp. 206–215. Springer, Heidelberg (2003)
Leibowitz, N., Ripeanu, M., Wierzbicki, A.: Deconstructing the kazaa network. In: WIAPP 2003: Proceedings of the The Third IEEE Workshop on Internet Applications, Washington, DC, USA, p. 112. IEEE Computer Society, Los Alamitos (2003)
Marsh, S.P.: Formalising Trust as a Computational Concept. PhD thesis, University of Stirling (1994)
Resnick, P., Zeckhauser, R.: Trust among strangers in internet transactions: Empirical analysis of ebay’s reputation system. In: Baye, M. (ed.) The Economics of The Internet and E-Commerce. Advances in Applied Microeconomics, vol. 11. Elsevier, Amsterdam (2002)
Resnick, P., Zeckhauser, R., Friedman, E., Kuwabara, K.: Reputation systems. Commun. ACM 43(12), 45–48 (2000)
Ripeanu, M.: Peer-to-peer architecture case study: Gnutella network. In: P2P 2001: Proceedings of the First International Conference on Peer-to-Peer Computing (P2P 2001), Washington, DC, USA, p. 99. IEEE Computer Society, Los Alamitos (2001)
Stallings, W.: Cryptography and Network Security: Principles and Practices, 3rd edn. Prentice Hall, Englewood Cliffs (2003)
Walsh, K., Sirer, E.G.: Fighting peer-to-peer spam and decoys with object reputation. In: P2PECON 2005: Proceeding of the 2005 ACM SIGCOMM workshop on Economics of peer-to-peer systems, pp. 138–143. ACM Press, New York (2005)
Westin, A.F.: Privacy and freedom. Atheneum (1967)
Yu, B., Singh, M.P.: A social mechanism of reputation management in electronic communities. In: Cooperative Information Agents, pp. 154–165 (2000)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2006 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Sorge, C., Zitterbart, M. (2006). A Reputation-Based System for Confidentiality Modeling in Peer-to-Peer Networks. In: Stølen, K., Winsborough, W.H., Martinelli, F., Massacci, F. (eds) Trust Management. iTrust 2006. Lecture Notes in Computer Science, vol 3986. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11755593_27
Download citation
DOI: https://doi.org/10.1007/11755593_27
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-34295-3
Online ISBN: 978-3-540-34297-7
eBook Packages: Computer ScienceComputer Science (R0)