Conference Paper

Assessing efficiency of trust management in peer-to-peer systems

Dipt. di Tecnologie dell'Informazione, Univ. di Milano, Crema, Italy
DOI: 10.1109/WETICE.2005.20 Conference: Enabling Technologies: Infrastructure for Collaborative Enterprise, 2005. 14th IEEE International Workshops on
Source: IEEE Xplore

ABSTRACT

P2P applications support exchanging resources while preserving total or partial anonymity of both requestors and providers. However, concerns have been raised about the possibility that anonymity may encourage malicious peers to spread tampered-with resources (e.g., malicious programs and viruses). A considerable amount of research is now being carried out on the development of trust and reputation models in P2P networks. In this paper, we assess the efficiency of our approach to the design of reputation systems involving flexible techniques for collecting and aggregating peers' opinions via comparison with probabilistic approaches.

Download full-text

Full-text

Available from: Ernesto Damiani
  • [Show abstract] [Hide abstract]
    ABSTRACT: A peer-to-peer (P2P) network is an exchange community of anonymous peers or individuals. The evolution of P2P network has determined the need of trust and reputation systems (TRS) in order to improve the reliability of local interactions: collecting in some way the local experiences, the TRS assesses the possibility that an individual has a malicious behavior, i.e., he cheats other individuals. In this paper we present an agent-based simulation model for the evaluation of a generic TRS within a decentralized P2P network. We describe some minimal requirements that, in our opinion, every P2P simulators should have. Moreover, we propose a complete model of peers in which the behavior of both good and malicious peers is accurately defined.
    No preview · Chapter · Dec 2005
  • Source
    [Show abstract] [Hide abstract]
    ABSTRACT: We introduce a decentralized trust management model called anonymous role-based cascaded delegation. In this model, a delegator can issue authorizations on behalf of her role without revealing her identity. This type of delegation protects the sensitive membership information of a delegator and hides the internal structure of an organization. To provide an efficient storage and transmission mechanism for credentials used in anonymous role-based cascaded delegation, we present a new signature scheme that supports both signer anonymity and signature aggregation. Our scheme has compact role signatures that make it especially suitable for ubiquitous computing environments, where users may have mobile computing devices with narrow communication bandwidth and small storage units
    Preview · Conference Paper · Jul 2006
  • Source
    [Show abstract] [Hide abstract]
    ABSTRACT: We introduce a decentralized delegation model called anonymous role-based cascaded delega- tion. In this model, a delegator can issue authorizations on behalf of her role without revealing her identity. This type of delegation protects the sensitive membership information of a delegator and hides the internal structure of an organization. To provide an efficient storage and trans- mission mechanism for credentials used in anonymous role-based cascaded delegation, we present a new digital signature scheme that supports both signer anonymity and signature aggregation. Our scheme has compact role signatures that make it especially suitable for ubiquitous comput- ing environments, where users may have mobile computing devices with narrow communication bandwidth and small storage units.
    Preview · Article · Jan 2009 · ACM Transactions on Information and System Security
Show more