[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
article
Free access

Globally decoupled reputations for large distributed networks

Published: 01 January 2007 Publication History

Abstract

Reputation systems help establish social control in peer-to-peer networks. To be truly effective, however, a reputation system should counter attacks that compromise the reliability of user ratings. Existing reputation approaches either average a peer's lifetime ratings or account for rating credibility by weighing each piece of feedback by the reputation of its source. While these systems improve cooperation in a P2P network, they are extremely vulnerable to unfair ratings attacks. In this paper, we recommend that reputation systems decouple a peer's service provider reputation from its service recommender reputation, thereby, making reputations more resistant to tampering. We propose a scalable approach to system-wide decoupled service and feedback reputations and demonstrate the effectiveness of our model against previous nondecoupled reputation approaches. Our results indicate that decoupled approache significantly improves reputation accuracy, resulting in more successful transactions. Furthermore, we demonstrate the effectiveness and scalability of our decoupled approach as compared to PeerTrust, an alternative mechanism proposed for decoupled reputations. Our results are compiled from comprehensive logs collected from Maze, a large file-sharing system with over 1.4 million users supporting searches on 226TB of data.

References

[1]
{1} Gnutella, "The gnutella protocol specification v0.4," 2001.
[2]
{2} Symantec, "Vbs.gnutella worm," 2000, http://securityresponse .symantec.com/avcenter/venc/data/vbs.gnutella.html.
[3]
{3} E. Damiani, S. Vimercati, S. Paraboschi, P. Samarati, and F. Violante, "A reputation-based approach for choosing reliable resources in peer-to-peer networks," in Proceedings of the 9th ACM Conference on Computer and Communications Security (CCS '02), pp. 207-216, Washington, DC, USA, November 2002.
[4]
{4} K. Walsh and E. G. Sirer, "Fighting peer-to-peer SPAM and decoys with object reputation," in Proceeding of the 3rd Workshop on Economics of Peer-to-Peer Systems (P2PECON '05), pp. 138-143, Philadelphia, Pa, USA, August 2005.
[5]
{5} K. Aberer and Z. Despotovic, "Managing trust in a peer-2-peer information system," in Proceedings of the 10th International Conference on Information and Knowledge Management (CIKM '01), pp. 310-317, Atlanta, Ga, USA, November 2001.
[6]
{6} K. Burton, "Design of the openprivacy distributed reputation system," May 2002, http://www.peerfear.org/papers/ openprivacy-reputation.pdf.
[7]
{7} P. Dewan and P. Dasgupta, "Pride: peer-to-peer reputation infrastructure for decentralized environments," in Proceedings of the 13th International Conference on World Wide Web (WWW '04), pp. 1212-1213, New York, NY, USA, May 2004.
[8]
{8} S. D. Kamvar, M. T. Schlosser, and H. Garcia-Molina, "The eigentrust algorithm for reputation management in P2P networks," in Proceedings of the 12th International Conference on World Wide Web (WWW '03), pp. 640-651, Budapest, Hungary, May 2003.
[9]
{9} B. C. Ooi, C. Y. Liau, and K.-L. Tan, "Managing trust in peer-to-peer systems using reputation-based techniques," in Proceedings of the 4th International Conference on Advances in Web-Age Information Management (WAIM '03), pp. 2-12, Chengdu, China, August 2003.
[10]
{10} L. Xiong and L. Liu, "PeerTrust: supporting reputation-based trust for peer-to-peer electronic communities," IEEE Transactions on Knowledge and Data Engineering, vol. 16, no. 7, pp. 843-857, 2004.
[11]
{11} S. Buchegger and J. Le Boudec, "A robust reputation system for P2P and mobile ad-hoc networks," in Proceedings of the 2nd Workshop on the Economics of Peer-to-Peer Systems (P2PECON '04), Cambridge, Mass, USA, June 2004.
[12]
{12} R. Sherwood, S. Lee, and B. Bhattacharjee, "Cooperative peer groups in NICE," Computer Networks, vol. 50, no. 4, pp. 523-544, 2006.
[13]
{13} Z. Zhang, S. Chen, and M. Yoon, "MARCH: a distributed incentive scheme for peer-to-peer networks," in Proceedings of the 26th IEEE International Conference on Computer Communications (INFOCOM '07), pp. 1091-1099, Anchorage, Alaska, USA, May 2007.
[14]
{14} S. Marti and H. Garcia-Molina, "Identity crisis: anonymity vs. reputation in P2P systems," in Proceedings of the 3rd International Conference on Peer-to-Peer Computing (P2P '03), pp. 134-141, Linkvping, Sweden, September 2003.
[15]
{15} eBay, "ebay," 2005, http://www.ebay.com/.
[16]
{16} M. Feldman, K. Lai, I. Stoica, and J. Chuang, "Robust incentive techniques for peer-to-peer networks," in Proceedings of the 5th ACM Conference on Electronic Commerce (EC '04), vol. 5, pp. 102-111, New York, NY, USA, May 2004.
[17]
{17} M. Srivatsa, L. Xiong, and L. Liu, "TrustGuard: countering vulnerabilities in reputation management for decentralized overlay networks," in Proceedings of the 14th International Conference on World Wide Web (WWW '05), pp. 422-431, Chiba, Japan, May 2005.
[18]
{18} K. Walsh and E. G. Sirer, "Experience with an object reputation system for peer-to-peer filesharing," in Proceedings of the 3rd Symposium on Networked System Design and Implementation (NSDI '06), San Jose, Calif, USA, May 2006.
[19]
{19} C. Dellarocas, "Immunizing online reputation reporting systems against unfair ratings and discriminatory behavior," in Proceedings of the 2nd ACM Conference on Electronic Commerce (EC '00), pp. 150-157, Minneapolis, Minn, USA, October 2000.
[20]
{20} J. Douceur, "The sybil attack," in Proceedings of the 1st International Workshop on Peer-to-Peer Systems (IPTPS '02), pp. 251-260, Cambridge, Mass, USA, March 2002.
[21]
{21} A. Cheng and E. Friedman, "Sybilproof reputation mechanisms," in Proceedings of the 3rd Workshop on Economics of Peer-to-Peer Systems (P2PECON '05), pp. 128-132, Philadelphia, Pa, USA, August 2005.
[22]
{22} D. E. Knuth, The Stanford GraphBase: A Platform for Combinatorial Computing, ACM Press, New York, NY, USA, 1993.
[23]
{23} K. L. Calvert, M. B. Doar, and E. W. Zegura, "Modeling internet topology," IEEE Communications Magazine, vol. 35, no. 6, pp. 160-163, 1997.
[24]
{24} M. Yang, H. Chen, B. Y. Zhao, Y. Dai, and Z. Zhang, "Deployment of a large-scale peer-to-peer social network," in Proceedings of the 1st Workshop on Real Large Distributed Systems (WORLDS '04), San Francisco, Calif, USA, December 2004.

Cited By

View all
  • (2013)Modeling Decentralized Reputation-Based Trust for Initial Transactions in Digital EnvironmentsACM Transactions on Internet Technology (TOIT)10.1145/2461321.246132312:3(1-35)Online publication date: 1-May-2013

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image Advances in Multimedia
Advances in Multimedia  Volume 2007, Issue 1
January 2007
356 pages
ISSN:1687-5680
EISSN:1687-5699
Issue’s Table of Contents

Publisher

Hindawi Limited

London, United Kingdom

Publication History

Published: 01 January 2007

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)19
  • Downloads (Last 6 weeks)4
Reflects downloads up to 06 Jan 2025

Other Metrics

Citations

Cited By

View all
  • (2013)Modeling Decentralized Reputation-Based Trust for Initial Transactions in Digital EnvironmentsACM Transactions on Internet Technology (TOIT)10.1145/2461321.246132312:3(1-35)Online publication date: 1-May-2013

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Login options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media