Reputation Management Techniques in DHT-Based Peer-to-Peer Networks

Reputation evaluation and trust management techniques are successfully used in the peer-to-peer (P2P) environment due to its notable similarity to the human community. These techniques present a quite efficient solution to cope with some types of malicious activity in P2P networks. Recently, a great number of P2P platforms use distributed Hash table (DHT) -based overlay-networks that provide effective lookup and storage mechanisms. However, DHT-based networks are a subject to some particular types of attacks. In this paper we present an analysis of applicability of some reputation evaluation techniques as protection from the malicious activity in DHT- based networks.

[1]  N. Shahmehri,et al.  An Integration of Reputation-based and Policy-based Trust Management , 2005 .

[2]  Stephen Hailes,et al.  Supporting trust in virtual communities , 2000, Proceedings of the 33rd Annual Hawaii International Conference on System Sciences.

[3]  Seungjoon Lee,et al.  Cooperative peer groups in NICE , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).

[4]  Victor S. Grishchenko,et al.  A fuzzy model for context-dependent reputation , 2004, Trust@ISWC.

[5]  Ling Liu,et al.  A reputation-based trust model for peer-to-peer ecommerce communities , 2003, EC.

[6]  Morris Sloman,et al.  A survey of trust in internet applications , 2000, IEEE Communications Surveys & Tutorials.

[7]  Audun Jøsang,et al.  AIS Electronic Library (AISeL) , 2017 .

[8]  Weisong Shi,et al.  PET: A PErsonalized Trust Model with Reputation and Risk Evaluation for P2P Resource Sharing , 2005, Proceedings of the 38th Annual Hawaii International Conference on System Sciences.

[9]  Donal O'Mahony,et al.  Overlay Networks: A Scalable Alternative for P2P , 2003, IEEE Internet Comput..

[10]  Robert Tappan Morris,et al.  Security Considerations for Peer-to-Peer Distributed Hash Tables , 2002, IPTPS.

[11]  R. Chen,et al.  Poblano A Distributed Trust Model for Peer-to-Peer Networks , 2001 .

[12]  David R. Karger,et al.  Looking up data in P2P systems , 2003, CACM.

[13]  Mostafa H. Ammar,et al.  A reputation system for peer-to-peer networks , 2003, NOSSDAV '03.

[14]  Ernesto Damiani,et al.  A reputation-based approach for choosing reliable resources in peer-to-peer networks , 2002, CCS '02.