Please use this identifier to cite or link to this item:
Secure Reputation System Based on Group Transitivity And Peer''s Classification for Peer-to-Peer Networks
|關鍵字:||Reputation;信任;Transitivity;Security;Peer-to-peer networks;遞移;安全;點對點網路||出版社:||資訊科學系所||引用:|| Amazon: http://www.amazon.com  A. Jøsang, S. Pope, “Semantic Constraints for Trust Transitivity”. Second Asia-Pacific Conference on Conceptual Modeling (APCCM2005), Newcastle, Australia, January-February 2005.  A. A. Selcuk, E. Uzun, and M. R. Pariente, “A Reputation-Based Trust Management System for P2P Networks”, Proc. 4th Int''l workshop on GP2PC, 2004.  A. Singh, L. Liu, “TrustMe: Anonymous Management of Trust Relationships in Decentralized P2P Systems”, In the Proceedings of the third IEEE International Conference on P2P Computing, Linköping, Sweden, Sept, 2003. . B. C. Ooi, C. Y. Kiau, and K.-L. Tan, “Managing trust in peer-to-peer systems using reputation-based techniques,” in The 4th International Conference on Web Age Information Management. LNCS, August 2003, http://xena1.ddns.comp.nus.edu.sg/P2P/waim03.pdf.  B. Gross, A. Acquisti “Balances of Power on eBay: Peers or Unequals?” In the Workshop of Economics of Peer-to-peer Systems, Berkerly CA, June 2003.  B. Sieka, A. D. Kshemkalyani, Mukesh Singhaly, On the Security of Polling Protocols in Peer-to-Peer Systems,”Proceedings of the Fourth International Conference on Peer-to-Peer Computing”(P2P'04), 2004 IEEE.  C. Dellarocas “Building Trust On-line: The Design of Reliable Reputation Reporting System” eBusiness@MIT working paper, MIT Sloan School of management, Cambridge, Mass. 2001  C. Dellarocas, “Immunizing online reputation reporting systems against unfair ratings and discriminatory behavior,” in ACM Conference on Electronic Commerce, 2000, pp. 150-157.  E. Adar, B. Huberman. “Free Riding on Gnutella”, Technical report, Xerox PARC, 10 Aug. 2000.  eBay. http://ebay.com.  E. Damiani, D. C. di Vimercati, S. Paraboschi, P. Samarati, and F. Violante, “A reputation-based approach for choosing reliable resources in peer-to-peer networks”. In Proceedings of the 9th ACM conference on Computer and communications security, pages 207-216. ACM Press, 2002.  E. Damiani, D. C. di Vimercati, S. Paraboschi, P. Samarati, and F. Violante, “Managing and Sharing Servents' Reputations in P2P Systems” in IEEE Transactions on Knowledge and Data Engineering, Vol. 15, No. 4, July/August 2003, pp. 840-854.  F. K. Hussain, E. Chang, T. Dillon, Classification of Reputation in Peer-to-Peer (P2P) Communication, In Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, PDPTA ''04, June 21-24, 2004, Las Vegas, Nevada, USA, Volume 3.  I. Clarke, O. Sandberg, B. Wiley, and T. Hong. “Freenet: A distributed anonymous information storage and retrieval system”, In Proc. of the ICSI Workshop on Design Issues in Anonymity and Unobservability, Berkeley, CA, July 2000.  J. Douceur. The Sybil Attack. 2002. http://citeseer.ist.psu.edu/douceur02sybil.html  J. Ruderman “A comparison of two trust metrics”, UCSD CSE 202 Fall 2004 December 15, 2004  K. Ranganathan, M. Ripeanu, A. Sarin, I.Foster, To Share or not to Share, An Analysis of Incentives to Contribute in Collaborative File Sharing Environments, in Proc. Of the Workshop on Economics of Peer-to-Peer Systems 2003, Berkeley, CA, USA, June 2003” ”  Kazaa. http://www.kazaa.com.  Napster. http://www.napster.com.  P.Dewan, P. Dasgupta, Securing reputation data in peer-to-peer networks, In International Conference on Parallel and Distributed Computing and Systems (PDCS 2004). IASTED, November 2004.  P. Dewan, P. Dasgupta. Pride: Peer-to-peer reputation infrastructure for decentralized environments. In Proceedings of the 13th International World Wide Web Conference (WWW13), pages 480-481, 2004  P. Resnick, R. Zeckhauser, E. Friedman, and K. Kuwabara, “Reputation Systems,” Comm. ACM, vol. 43, no. 12, pp. 45-48,Dec. 2000.  R. L. Rivest and B. Lampson, “SDSI a simple,distributed,security infrastructure,” in Crypto. Santa Barbara ,USA: IEEE Computer Society, 1996, very near to self-certification.  S. D. Kamvar, M. T. Schlosser, and H. Garcia-Molina. The eigentrust algorithm for reputation management in P2P networks. In Proc. of the Twelfth International World Wide Web Conference (WWW2003). 2003.  R. Dingledine. In irc://irc.freenode.net/p2p-hackers on 2004-12-13.]  R. Levien, “Advogato,” Webpage, 2003. [Online].Available: www.Advogato.org  ”Symantec http//securityresponse.symantec.com”  Seti@Home website. http://setiathome.ssl.berkely.edu  Th. G. Papaioannou and G. D. Stamoulis. Reputation-based Policies that Provide the Right Incentives in Peer-to-Peer Environments. Computer Networks (Special Issue on Management in Peer-to-Peer Systems: Trust, Reputation and Security), Elsevier, vol. 50, issue 4, pp. 563-578, 2006.||摘要:||
在本論文中，我們提出一個植基於群體遞移的安全信任系統，其中每一個要求者與提供者是利用其信任度與在此系統的參與度而所決定。整個網路被區分為幾個區域，每一個區域存在一個管理者負責管理存取點(peer)對其他存取點的存取授權。在不同的存取點(peer)間以及不同的管理者間之交易是採用不同的協定以滿足其不同的交易性質。在本系統中我們採用一種稱為Simple Distributed Security Infrastructure (SDSI)的自我驗證 ( self-certification)的憑證系統以達成交易簽章與代表在此網路下各個存取點的身份 。
Peer-to-peer (P2P) systems are gaining a wide popularity in actual networks, due to their decentralized structure in offering services to users. The inherent problem of such an open and anonymous environment is its weakness to attackers. A reputation system is believed to be a solution to alleviate or even stop malicious peers from harming the system. However, this reputation system should be strong enough, well designed and based on certain rules to discourage attackers and inject trust and incentives to participation into the system.
In this paper, we propose a secure reputation system based on group transitivity where every requester and provider is selected according to her reputation and participation in the community service. The network is organized by area, each having a manager responsible for handling its peers' access to other groups' peers. In every area the transactions between the different peers and Area Managers are insured through different protocols that we designed for this purpose. A self-certification generating a Simple Distributed Security Infrastructure (SDSI) certificate is used for each transaction's signature and uniquely identifies every peer in the network.
We believe that this kind of reputation system where no contribution results in no service will have its domain of application in the large world of P2P network.
|Appears in Collections:||資訊科學與工程學系所|
Show full item record
TAIR Related Article
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.