Building trust in peer-to-peer systems: a review

The decentralised, cooperative and self-organising nature of Peer-to-Peer (P2P) systems help to mitigate and even overcome many challenges which overwhelm the traditional client-server approaches. On the other hand, these very characteristics also introduce some novel issues in P2P environments. One of the critical issues is how to build the trust relationship within P2P systems. In this paper, we first discuss the desired properties that need to be considered while building trust in P2P systems. Then, we analyse two types of attacks both the ones mitigated by as well as the ones aimed at trust systems. After this, we divide the previous research work on building trust in P2P systems into two broad categories, that is, reputation-based and trade-based. We then review and discuss the advances in this area based on this classification. Finally, we point out some potential research directions in building trust securely in P2P systems.

[1]  Bo Li,et al.  CoolStreaming/DONet: a data-driven overlay network for peer-to-peer live media streaming , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..

[2]  Roger Dingledine,et al.  The Free Haven Project : design and deployment of an anonymous secure data haven , 2000 .

[3]  Thomas Beth,et al.  Valuation of Trust in Open Networks , 1994, ESORICS.

[4]  George Danezis,et al.  Towards an Information Theoretic Metric for Anonymity , 2002, Privacy Enhancing Technologies.

[5]  Kostas G. Anagnostakis,et al.  Exchange-based incentive mechanisms for peer-to-peer file sharing , 2004, 24th International Conference on Distributed Computing Systems, 2004. Proceedings..

[6]  G. Hardin,et al.  Tragedy of the Commons , 1968 .

[7]  E. Friedman,et al.  The Social Cost of Cheap Pseudonyms , 2001 .

[8]  Angelos D. Keromytis,et al.  Offline Micropayments without Trusted Hardware , 2002, Financial Cryptography.

[9]  J. J. Garcia-Luna-Aceves,et al.  Secure hierarchical multicast routing and multicast internet anonymity , 1999 .

[10]  Fabrice Guillemin,et al.  Experimental analysis of the impact of peer-to-peer applications on traffic in commercial IP networks , 2004, Eur. Trans. Telecommun..

[11]  John Riedl,et al.  Shilling recommender systems for fun and profit , 2004, WWW '04.

[12]  Ramanathan V. Guha,et al.  Propagation of trust and distrust , 2004, WWW '04.

[13]  Il Im,et al.  The effect of negative buyer feedback on prices in Internet auction markets , 2000, ICIS.

[14]  Angelos D. Keromytis,et al.  Fileteller: Paying and Getting Paid for File Storage , 2002, Financial Cryptography.

[15]  Ian Clarke,et al.  Freenet: A Distributed Anonymous Information Storage and Retrieval System , 2000, Workshop on Design Issues in Anonymity and Unobservability.

[16]  Roger Dingledine,et al.  The Free Haven Project: Distributed Anonymous Storage Service , 2000, Workshop on Design Issues in Anonymity and Unobservability.

[17]  Paul A. Pavlou,et al.  Evidence of the Effect of Trust Building Technology in Electronic Markets: Price Premiums and Buyer Behavior , 2002, MIS Q..

[18]  Hector Garcia-Molina,et al.  Protecting the PIPE from malicious peers , 2002 .

[19]  J. Wooders,et al.  Reputation in Auctions: Theory, and Evidence from Ebay , 2006 .

[20]  Michael K. Reiter,et al.  Crowds: anonymity for Web transactions , 1998, TSEC.

[21]  Hector Garcia-Molina,et al.  The Eigentrust algorithm for reputation management in P2P networks , 2003, WWW '03.

[22]  I. Foster,et al.  ‘To Share or not to Share’ An Analysis of Incentives to Contribute in Collaborative File Sharing Environments , 2003 .

[23]  Brian D. Noble,et al.  Samsara: honor among thieves in peer-to-peer storage , 2003, SOSP '03.

[24]  Rakesh Kumar,et al.  Pollution in P2P file sharing systems , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..

[25]  David Mazières,et al.  Tangler: a censorship-resistant publishing system based on document entanglements , 2001, CCS '01.

[26]  Ernesto Damiani,et al.  A reputation-based approach for choosing reliable resources in peer-to-peer networks , 2002, CCS '02.

[27]  Chrysanthos Dellarocas,et al.  The Digitization of Word-of-Mouth: Promise and Challenges of Online Feedback Mechanisms , 2003, Manag. Sci..

[28]  Brian Neil Levine,et al.  A protocol for anonymous communication over the Internet , 2000, CCS.

[29]  Bill Broyles Notes , 1907, The Classical Review.

[30]  Rajeev Motwani,et al.  The PageRank Citation Ranking : Bringing Order to the Web , 1999, WWW 1999.

[31]  Stephen Hailes,et al.  A distributed trust model , 1998, NSPW '97.

[32]  Ling Liu,et al.  PeerTrust: supporting reputation-based trust for peer-to-peer electronic communities , 2004, IEEE Transactions on Knowledge and Data Engineering.

[33]  Munindar P. Singh,et al.  Incentive Mechanisms for Peer-to-Peer Systems , 2003, AP2PC.

[34]  Stefan Saroiu,et al.  A Measurement Study of Peer-to-Peer File Sharing Systems , 2001 .

[35]  Mudhakar Srivatsa,et al.  TrustGuard: countering vulnerabilities in reputation management for decentralized overlay networks , 2005, WWW '05.

[36]  Dan S. Wallach,et al.  Enforcing Fair Sharing of Peer-to-Peer Resources , 2003, IPTPS.

[37]  Eytan Adar,et al.  Free Riding on Gnutella , 2000, First Monday.

[38]  Karl Aberer,et al.  Managing trust in a peer-2-peer information system , 2001, CIKM '01.

[39]  Ersin Uzun,et al.  A reputation-based trust management system for P2P networks , 2004, IEEE International Symposium on Cluster Computing and the Grid, 2004. CCGrid 2004..

[40]  Chrysanthos Dellarocas The Digitization of Word-of-mouth: Promise and Challenges of Online Reputation Mechanisms , 2022 .

[41]  Amin Vahdat,et al.  SHARP: an architecture for secure resource peering , 2003, SOSP '03.

[42]  John R. Douceur,et al.  The Sybil Attack , 2002, IPTPS.

[43]  Brian Neil Levine,et al.  Hordes: a Multicast-Based Protocol for Anonymity , 2002, J. Comput. Secur..

[44]  Nick Mathewson,et al.  Tor: The Second-Generation Onion Router , 2004, USENIX Security Symposium.

[45]  Ling Liu,et al.  A reputation-based trust model for peer-to-peer e-commerce communities , 2003, EEE International Conference on E-Commerce, 2003. CEC 2003..

[46]  Paul F. Syverson,et al.  Anonymous connections and onion routing , 1998, IEEE J. Sel. Areas Commun..

[47]  Alberto Blanc,et al.  Designing incentives for peer-to-peer routing , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..

[48]  Chrysanthos Dellarocas,et al.  Immunizing online reputation reporting systems against unfair ratings and discriminatory behavior , 2000, EC '00.

[49]  Ling Liu,et al.  A reputation-based trust model for peer-to-peer ecommerce communities , 2003, EC.

[50]  Ion Stoica,et al.  Incentives for Cooperation in Peer-to-Peer Networks , 2003 .

[51]  Riccardo Bettati,et al.  An optimal strategy for anonymous communication protocols , 2002, Proceedings 22nd International Conference on Distributed Computing Systems.

[52]  Daniel W. Manchala E-Commerce Trust Metrics and Models , 2000, IEEE Internet Comput..

[53]  Ernesto Damiani,et al.  Choosing reputable servents in a P2P network , 2002, WWW.

[54]  Chrysanthos Dellarocas,et al.  Self-Interest, Reciprocity, and Participation in Online Reputation Systems , 2004 .

[55]  Bo Li,et al.  DONet: A Data-Driven Overlay Network For Efficient Live Media Streaming , 2004, INFOCOM 2005.