• DocumentCode
    2573305
  • Title

    Attack-resistant techniques in P2P reputation systems

  • Author

    Jiang, Xiaoning ; Ye, Lingxiao

  • Author_Institution
    Inf. & Electron. Eng. Inst., Zhejiang Gong Shang Univ., Hangzhou, China
  • Volume
    1
  • fYear
    2010
  • fDate
    30-31 May 2010
  • Firstpage
    390
  • Lastpage
    393
  • Abstract
    The success of a reputation system depends on accurately calculated reputations that predict the quality of future interactions. In the peer-to-peer (P2P) networks, the scores are distributed by each peer locally or managed by the server/super-nodes. Similar to all other security mechanisms, reputation systems in P2P networks can be under attacks. Some attacks may attempt to exploit the system to its own benefits by deceiving or misleading. This paper focuses on trust model based on both direct and indirect feedbacks. The attacks-defense mechanisms by the trust model with credibility and community context factors are also explored.
  • Keywords
    peer-to-peer computing; security of data; P2P reputation system; attack-resistant technique; attacks-defense mechanism; peer-to-peer network; trust model; Access protocols; Communication system security; Content management; Context modeling; Distributed computing; Electronic mail; Feedback; Network servers; Peer to peer computing; Product development; attack-resistant; feedback; peer-to-peer; reputation; trust metrics;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Networking and Digital Society (ICNDS), 2010 2nd International Conference on
  • Conference_Location
    Wenzhou
  • Print_ISBN
    978-1-4244-5162-3
  • Type

    conf

  • DOI
    10.1109/ICNDS.2010.5479214
  • Filename
    5479214