Skip to main content

Recard: Using Recommendation Cards Approach for Building Trust in Peer-to-Peer Networks

  • Conference paper
Information Security Practice and Experience (ISPEC 2005)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 3439))

  • 955 Accesses

Abstract

The peer-to-peer applications have recently seen an enormous success and spread over the Internet community which showed a dramatic change in the current client-server paradigm; that caused the appearance of some new concepts and protocols. One of the main new concepts introduced is the user anonymity which is in spite of being considered one of the main characteristics of the peer-to-peer paradigm it has introduced a serious security flaw due to the missing of trust between the participants in the system. This paper proposes an approach for peer-to-peer security, where the system participants can establish a trust relationship between each others based on their reputation gained by the participation in the system. The proposed technique relays on the concept of the recommendation cards. This paper discusses this technique and how to apply it to a peer-to-peer file sharing application.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Abdul-Rahman, Hailes, S.: Supporting trust in virtual communities. In: Proceedings of the Hawaii International Conference on System Sciences, Maui, Hawaii, January 4-7 (2000)

    Google Scholar 

  2. Singh, A., Liu, L.: TrustMe: Anonymous management of Trust Relationships in Decentralized p2p systems. In: Proc. of IEEE Third International Conference on Peer-to-Peer Computing (P2P 2003), Linköping, Sweden, September 01 - 03 (2003)

    Google Scholar 

  3. Adar, E., Huberman, B.: Free riding on gnutella, Technical report, Xerox PARC (August 2000)

    Google Scholar 

  4. Damiani, E., di Vimercati, D.C., Paraboschi, S., Samarati, P., Violante, F.: A Reputation-Based Approach for choosing Reliable Resources in Peer-to-peer networks. In: Proceedings of the 9th ACM conference on computer and communication security, pp. 207–216. ACM Press, New York (2002)

    Chapter  Google Scholar 

  5. Azzedin, F., Maheswaran, M.: Evolving and Managing Trust in Grid Computing Systems. In: IEEE Canadian Conference on Electrical and Computer Engineering (CCECE 2002) (May 2002)

    Google Scholar 

  6. Cornelli, F., Damiani, E., Ghorbani, A.: Implementing a Reputation Aware Gnutella Servent. In: Proceedings of the International Workshop on peer-to-peer Computing Pisa, Italy, May 24 (2002)

    Google Scholar 

  7. Cornelli, F., Damiani, E., De Capitani di Vimercati, S., Paraboschi, S., Samarati, P.: Choosing reputable servents in a P2P network. In: Proc. of the Eleventh International World Wide Web Conference, Honolulu, Hawaii (May 2002)

    Google Scholar 

  8. Freenet Homepage, http://freenet.sourceforge.net

  9. Gnutella Homepage, http://gnutella.wego.com

  10. Clarke: A decentralized information storage and retrieval system, Master’s thesis, university of Edinburgh (1999)

    Google Scholar 

  11. Clarke, Sandberg, O., Wiley, B., Hong, T.W.: Freenet: A distributed anonymous information storage and retrieval system. In: Proceedings of the ICSI workshop on design issues in anonymity and Unobservability, Berkeley, California (June 2000)

    Google Scholar 

  12. Stoica, R., Morries, D., Karger, M.F.: A scalable peer-to-peer lookup service for internet applications. In: Proc. of ACM SIGCOMM 2001 (August 2001)

    Google Scholar 

  13. Carter, J., Bitting, E., Ghorbani, A.: Reputation Formalization for an information-sharing Multi-peer System. Computational Intelligence 18(4), 515–534 (2002)

    Article  MathSciNet  Google Scholar 

  14. Douceur, J.: The sybil attack. In: Druschel, P., Kaashoek, M.F., Rowstron, A. (eds.) IPTPS 2002. LNCS, vol. 2429, p. 251. Springer, Heidelberg (2002)

    Chapter  Google Scholar 

  15. Aberer, K., Desporovic, Z.: Managing trust in a peer-to-peer information system. In: Proc. of the Hawaii International Conference on System Sciences, Maui, Hawaii (January 2000)

    Google Scholar 

  16. Kazaa homepage, http://www.kazaa.com

  17. Montaner, M., Lopez, B.: Opinion-based filtering through trust. In: Klusch, M., Ossowski, S., Shehory, O. (eds.) CIA 2002. LNCS (LNAI), vol. 2446, p. 164. Springer, Heidelberg (2002)

    Chapter  Google Scholar 

  18. Schlosser, M.T., Condie, T.E., Kamvar, S.D.: Simulating A File-Sharing P2P Network. In: 1st Workshop on Semantics in Grid and P2P Networks, Budapest, Hungary, May 20 (2003)

    Google Scholar 

  19. Microsoft Network Messenger Homepage, http://messenger.msn.com

  20. MiloJicic, D.S., Kalogeraki, V., Luckose, R.: peer-to-peer Computing, Tech Report:HPL-2002-57, available online at, http://www.hpl.hp.com/techreports/2002/HPL-2002-57.pdf

  21. Napster Homepage, http://www.napster.com

  22. Van Oorschot, P.C., Menezes, A.J., Vanstone, S.A.: Handbook of Applied Cryptography. CRC Press, Boca Raton (1996)

    Google Scholar 

  23. Dingledine, R., Molnar, D., Freedman, M.J.: The Free Haven project: Distributed anonymous storage service. In: Proceedings of the workshop on Design Issues in Anonymity and Unobservability (July 2000)

    Google Scholar 

  24. Kamvar, S., Schlosser, M., Garcia-Molina, H.: Eigenrep: Reputation management in p2p networks. In: Twelfth International World Wide Web conference (2003)

    Google Scholar 

  25. Marsh, S.: Formalizing trust as a computational concept, PhD. Thesis, university of Stirling (1994)

    Google Scholar 

  26. Saroiu, S., Gummadi, P.K., Gribble, S.D.: A measurement study of peer-to-peer file sharing systems. In: Proceedings of Multimedia Computing and Networking 2002 (MMCN 2002), San Jose, CA,USA (January 2002)

    Google Scholar 

  27. SETI@HOME: THE Search for Extraterrestrial Intelligence at Home, http://setiathome.berkely.edu/

  28. Wang, Y., Vassileva, J.: Bayesian Network Trust Model in Peer-to-Peer Networks. In: Proceedings of second international workshop on peers and peer-to-peer computing, Melbourne, Australia (July 14, 2003)

    Google Scholar 

  29. Yahoo Messenger Homepage, http://www.yahoo.com

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Samuel, H.A., Dakroury, Y.H., Shahein, H.I. (2005). Recard: Using Recommendation Cards Approach for Building Trust in Peer-to-Peer Networks. In: Deng, R.H., Bao, F., Pang, H., Zhou, J. (eds) Information Security Practice and Experience. ISPEC 2005. Lecture Notes in Computer Science, vol 3439. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-31979-5_24

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-31979-5_24

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-25584-0

  • Online ISBN: 978-3-540-31979-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics