SepRep: A Novel Reputation Evaluation Model in Peer-to-Peer Networks

In a heterogeneous peer-to-peer network, different peers provide different qualities of service. It will be very helpful if a peer can identify which peers can provide better services than others. In this paper, we design a novel reputation model which enables any peer to calculate a reputation value for any other peer that reflects the quality of service provided by that peer, so as to differentiate peers providing good quality of service from those peers providing poor service. Furthermore, to overcome the problem of malicious recommenda-tions, we propose an auxiliary trust mechanism which calculates a trust value for each peer. Experimental results show that our reputation model achieves a fast convergence speed, and it is also robust against a large portion of malicious peers that provide fraud recommendations.

[1]  Steve Chien,et al.  A First Look at Peer-to-Peer Worms: Threats and Defenses , 2005, IPTPS.

[2]  Keith W. Ross,et al.  The Index Poisoning Attack in P2P File Sharing Systems , 2006, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.

[3]  Ernesto Damiani,et al.  Choosing reputable servents in a P2P network , 2002, WWW.

[4]  Audun Jøsang,et al.  A survey of trust and reputation systems for online service provision , 2007, Decis. Support Syst..

[5]  A. Roth Game-Theoretic Models of Bargaining , 1987 .

[6]  Hector Garcia-Molina,et al.  The Eigentrust algorithm for reputation management in P2P networks , 2003, WWW '03.

[7]  Emin Gün Sirer,et al.  Fighting peer-to-peer SPAM and decoys with object reputation , 2005, P2PECON '05.

[8]  Nicolas Christin,et al.  Content availability, pollution and poisoning in file sharing peer-to-peer networks , 2005, EC '05.

[9]  Seungjoon Lee,et al.  Cooperative peer groups in NICE , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).

[10]  Eytan Adar,et al.  Free Riding on Gnutella , 2000, First Monday.

[11]  Seungjoon Lee,et al.  Cooperative peer groups in NICE , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).

[12]  Qinyuan Feng,et al.  LIP: A Lifetime and Popularity Based Ranking Approach to Filter out Fake Files in P2P File Sharing Systems , 2007, IPTPS.

[13]  Ling Liu,et al.  A reputation-based trust model for peer-to-peer ecommerce communities , 2003, EC.

[14]  Karl Aberer,et al.  Managing trust in a peer-2-peer information system , 2001, CIKM '01.

[15]  Miguel Castro,et al.  Peer-to-Peer Systems IV, 4th International Workshop, IPTPS 2005, Ithaca, NY, USA, February 24-25, 2005, Revised Selected Papers , 2005, IPTPS.

[16]  Akbar Ghaffarpour Rahbar,et al.  PowerTrust: A Robust and Scalable Reputation System for Trusted Peer-to-Peer Computing , 2007, IEEE Transactions on Parallel and Distributed Systems.