hiREP: Hierarchical Reputation Management for Peer-to-Peer Systems

The open feature of peer-to-peer systems invites the spread of the malfunctioning data. Additional reputation systems are constructed to guarantee the data authenticity. One challenge in these systems is how to store and spread trust value securely and efficiently. Devoid of a central control system, most of the recently proposed P2P reputation systems adopt flooding based polling mechanisms, which need to inquire into every node in the system. The polling mechanisms create heavy traffic, do not guarantee voter anonymity, and make it hard for peers to filter out the fake trust values. In this paper, we propose a reputation management system - hiREP to address these problems. A peer in hiREP system only needs to contact a small group of reputation agents to obtain the trust values. hiREP guarantees data authenticity and voter anonymity, and also makes it easier for peers to filter out fake trust values

[1]  Ling Liu,et al.  A reputation-based trust model for peer-to-peer ecommerce communities , 2003, EC.

[2]  Jonathan Katz,et al.  Trust-preserving set operations , 2004, IEEE INFOCOM 2004.

[3]  Hector Garcia-Molina,et al.  The Eigentrust algorithm for reputation management in P2P networks , 2003, WWW '03.

[4]  Rakesh Kumar,et al.  Pollution in P2P file sharing systems , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..

[5]  Karl Aberer,et al.  Managing trust in a peer-2-peer information system , 2001, CIKM '01.

[6]  Stephen Marsh,et al.  Formalising Trust as a Computational Concept , 1994 .

[7]  Ernesto Damiani,et al.  Choosing reputable servents in a P2P network , 2002, WWW.

[8]  Mostafa H. Ammar,et al.  A reputation system for peer-to-peer networks , 2003, NOSSDAV '03.

[9]  Munindar P. Singh,et al.  A Social Mechanism of Reputation Management in Electronic Communities , 2000, CIA.

[10]  Mudhakar Srivatsa,et al.  TrustGuard: countering vulnerabilities in reputation management for decentralized overlay networks , 2005, WWW '05.

[11]  Stephen Hailes,et al.  Supporting trust in virtual communities , 2000, Proceedings of the 33rd Annual Hawaii International Conference on System Sciences.

[12]  Siani Pearson,et al.  A Privacy-Enhanced Peer-to-Peer Reputation System , 2003, EC-Web.

[13]  Julita Vassileva,et al.  Trust and reputation model in peer-to-peer networks , 2003, Proceedings Third International Conference on Peer-to-Peer Computing (P2P2003).

[14]  P. Resnick,et al.  Online Reputation Mechanisms-A Roadmap for Future Research , 2003 .

[15]  John R. Douceur,et al.  The Sybil Attack , 2002, IPTPS.

[16]  Ling Liu,et al.  PeerTrust: supporting reputation-based trust for peer-to-peer electronic communities , 2004, IEEE Transactions on Knowledge and Data Engineering.

[17]  David E. Culler,et al.  A blueprint for introducing disruptive technology into the Internet , 2003, CCRV.

[18]  Hector Garcia-Molina,et al.  Limited reputation sharing in P2P systems , 2004, EC '04.

[19]  Ling Liu,et al.  TrustMe: anonymous management of trust relationships in decentralized P2P systems , 2003, Proceedings Third International Conference on Peer-to-Peer Computing (P2P2003).

[20]  Edith Cohen,et al.  Search and replication in unstructured peer-to-peer networks , 2002, ICS '02.

[21]  Kurt Rothermel,et al.  Strong pseudonymous communication for peer-to-peer reputation systems , 2005, SAC '05.