A Reputation-Based System for Confidentiality Modeling in Peer-to-Peer Networks

The secure transmission of messages via computer networks is, in many scenarios, considered to be a solved problem. However, a related problem, being almost as crucial, has been widely ignored: To whom to entrust information? We argue that confidentiality modeling is a question of trust. Therefore, the article at hand addresses this problem based on a reputation system. We consider a Peer-to-Peer network whose participants decide on whether or not to make information available to other nodes based on the author's trust relationships. Documents are only forwarded to another node if, according to the sender's local view, the recipient is considered to be sufficiently trustworthy. In contrast to most existing reputation systems, trust relationships are considered only with respect to a specific domain. Privacy is preserved by limiting the revelation of trust relationships.

[1]  William Stallings,et al.  Cryptography and Network Security: Principles and Practice , 1998 .

[2]  N. Smelser,et al.  International Encyclopedia of the Social and Behavioral Sciences , 2001 .

[3]  John R. Douceur,et al.  The Sybil Attack , 2002, IPTPS.

[4]  Robert Boguslaw,et al.  Privacy and Freedom , 1968 .

[5]  Karen Jones,et al.  Trust: Philosophical Aspects , 2001 .

[6]  Michael R. Baye,et al.  The Economics of the Internet and E-commerce , 2002, Advances in Applied Microeconomics.

[7]  Mostafa H. Ammar,et al.  A reputation system for peer-to-peer networks , 2003, NOSSDAV '03.

[8]  A Min Tjoa,et al.  E-Commerce and Web Technologies , 2002, Lecture Notes in Computer Science.

[9]  Hector Garcia-Molina,et al.  The Eigentrust algorithm for reputation management in P2P networks , 2003, WWW '03.

[10]  Stephen Marsh,et al.  Formalising Trust as a Computational Concept , 1994 .

[11]  Munindar P. Singh,et al.  A Social Mechanism of Reputation Management in Electronic Communities , 2000, CIA.

[12]  Ramanathan V. Guha,et al.  Propagation of trust and distrust , 2004, WWW '04.

[13]  Emin Gün Sirer,et al.  Fighting peer-to-peer SPAM and decoys with object reputation , 2005, P2PECON '05.

[14]  Stephen Hailes,et al.  Supporting trust in virtual communities , 2000, Proceedings of the 33rd Annual Hawaii International Conference on System Sciences.

[15]  Matei Ripeanu,et al.  Peer-to-peer architecture case study: Gnutella network , 2001, Proceedings First International Conference on Peer-to-Peer Computing.

[16]  Adam Wierzbicki,et al.  Deconstructing the Kazaa network , 2003, Proceedings the Third IEEE Workshop on Internet Applications. WIAPP 2003.

[17]  Diego Gambetta Can We Trust Trust , 2000 .

[18]  Siani Pearson,et al.  A Privacy-Enhanced Peer-to-Peer Reputation System , 2003, EC-Web.

[19]  Paul Resnick,et al.  Trust among strangers in internet transactions: Empirical analysis of eBay' s reputation system , 2002, The Economics of the Internet and E-commerce.

[20]  Paul Resnick,et al.  Reputation systems , 2000, CACM.

[21]  Sunny Marche,et al.  Enabling trust online , 2002, Proceedings. Third International Symposium on Electronic Commerce,.