Abstract
In peer-to-peer (P2P) systems, peers often must interact with unknown or unfamiliar peers without the benefit of trusted third parties or authorities to mediate the interactions. A peer will need reputation mechanisms to incorporate the knowledge of others to decide whether to trust another party in P2P systems. This paper discusses the design of reputation mechanisms and proposes a novel distributed reputation mechanism to detect malicious or unreliable peers in P2P systems. It illustrates the process for rating gathering and aggregation and presents some experimental results to evaluate the proposed approach. Moreover, it considers how to effectively aggregate noisy (dishonest or inaccurate) ratings from independent or collusive peers using weighted majority techniques. Furthermore, it analyzes some possible attacks on reputation mechanisms and shows how to defend against such attacks.
References (26)
- M. Blaze, J. Feigenbaum, and J. Lacy. Decentralized trust management. In Proceedings of the IEEE Symposium on Se- curity and Privacy, pages 164-173, 1996.
- S. Brin and L. Page. The anatomy of a large-scale hyper- textual web search engine. In Proceedings of the Seventh International World Wide Web Conference (WWW7), pages 107-117, 1998.
- S. Capkun, L. Buttyan, and J.-P. Hubaux. Small worlds in security systems: an analysis of the PGP certificate graph. In Proceedings of the ACM Workshop on New Security Paradigms, 2002.
- Y. Chawathe, S. Ratnasamy, L. Breslau, N. Lanham, and S. Shenker. Making gnutella-like P2P systems scalable. In Proceedings of the ACM SIGCOMM Conference on Appli- cations, Technologies, Architectures, and Protocols for Com- puter Communication, pages 407-418, 2003.
- F. Cornelli, E. Damiani, S. D. C. di Vimercati, S. Paraboschi, and P. Samarati. Choosing reputable servents in a P2P net- work. In Proceedings of the Eleventh International World Wide Web Conference, pages 376-386, 2002.
- E. Damiani, S. D. C. di Vimercati, S. Paraboschi, P. Sama- rati, and F. Violante. A reputation-based approach for choos- ing reliable resources in peer-to-peer networks. In Proceed- ings of the Ninth ACM Conference on Computer and Com- munications Security, pages 207-216, 2002.
- J. R. Douceur. The sybil attack. In Proceedings of First In- ternational Workshop on Peer-to-Peer Systems, 2002.
- C. M. Ellison. Establishing identity without certificate au- thorities. In Proceedings of the 6th USENIX Security Sym- posium, pages 67-76, 1996.
- E. J. Friedman and P. Resnick. The social cost of cheap pseudonyms. Journal of Economics and Management Strat- egy, 10(2):173-199, 2001.
- N. R. Jennings, K. Sycara, and M. Wooldridge. A roadmap of agent research and development. Autonomous Agents and Multiagent Systems, 1(1):275-306, 1998.
- S. D. Kamvar, M. T. Schlosser, and H. Garcia-Molina. The EigenTrust algorithm for reputation management in P2P net- works. In Proceedings of the Twelfth International World Wide Web Conference, pages 640-651, 2003.
- H. Kautz, B. Selman, and A. Milewski. Agent amplified communication. In Proceedings of the National Conference on Artificial Intelligence, pages 3-9, 1996.
- N. Li, B. N. Grosof, and J. Feigenbaum. Delegation logic: A logic-based approach to distributed authorization. ACM Transactions on Information and System Security (TISSEC), 6(1):128-171, 2003.
- N. Littlestone and M. K. Warmuth. The weighted majority algorithm. Information and Computation, 108(2):212-261, 1994.
- S. Marti and H. Garcia-Molina. Limited reputation sharing in P2P systems. In Proceedings of the ACM Conference on Electronic Commerce, 2004. to appear.
- M. Paolucci, K. Sycara, T. Nishimura, and N. Srinivasan. Us- ing DAML-S for P2P discovery. In Proceedings of the First International Conference on Web Services, pages 203-207, 2003.
- S. Ratnasamy, P. Francis, M. Handley, R. Karp, and S. Shenker. A scalable content-addressable network. In Pro- ceedings of ACM SIGCOMM, pages 161-172, 2001.
- M. K. Reiter and S. G. Stubblebine. Toward acceptable met- rics of authentication. In Proceedings of the IEEE Sympo- sium on Security and Privacy, pages 10-20, 1997.
- P. Resnick, R. Zeckhauser, E. Friedman, and K. Kuwabara. Reputation systems: Facilitating trust in internet interactions. Communications of the ACM, 43(12):45-48, 2000.
- M. Richardson, R. Agrawal, and P. Domingos. Trust man- agement for the semantic web. In Proceedings of the Sec- ond International Semantic Web Conference, pages 351-368, 2003.
- I. Stoica, R. Morris, D. Karger, M. F. Kaashoek, and H. Bal- akrishnan. Chord: A scalable peer-to-peer lookup service for internet applications. In Proceedings of ACM SIGCOMM, pages 149-160, 2001.
- D. J. Watts and S. H. Strogatz. Collective dynamics of 'small-world' networks. Nature, 393:440-442, June 1998.
- B. Yu and M. P. Singh. An evidential model of distributed reputation management. In Proceedings of First Interna- tional Joint Conference on Autonomous Agents and Multi- agent Systems, pages 294-301, 2002.
- B. Yu and M. P. Singh. Detecting deception in reputation management. In Proceedings of Second International Joint Conference on Autonomous Agents and Multiagent Systems, pages 73-80, 2003.
- B. Yu, M. Venkatraman, and M. P. Singh. An adaptive so- cial network for information access: Theoretical and experi- mental results. Applied Artificial Intelligence, 17(1):21-38, 2003.
- T. Yu, M. Winslett, and K. E. Seamons. Interoperable strate- gies in automated trust negotiation. In Proceedings of the 8th ACM Conference on Computer and Communications Se- curity, pages 146-155, 2001.