Title :
A Reputation-Based Approach for Countering Vulnerabilities in P2P Networks
Author :
Chen, Jianguo ; Lu, Huijuan ; Bruda, Stefan D.
Author_Institution :
Coll. of Inf. Eng., China Jiliang Univ., Hangzhou, China
Abstract :
As a means of resources sharing, peer-to-peer (P2P) networks are currently receiving much attention. However, the open and anonymous nature of P2P networks also paves the way for malicious users to abuse the systems such as disseminating of inauthentic files or even viruses. To counter such menacing vulnerabilities in P2P networks, this paper presents a reputation-based approach that combines personal experiences and recommendations. On the basis of the discussion on vulnerabilities, three P2P networks, configuration of P2P reputation systems, the paper takes a critical look at some solutions with the trust model for the threats. The methods to update the trust values in the three unstructured P2P architectures are also discussed.
Keywords :
peer-to-peer computing; security of data; P2P networks; peer-to-peer networks; reputation-based approach; resources sharing; three unstructured P2P architectures; trust values; Computer architecture; Computer network reliability; Computer science; Counting circuits; DSL; Educational institutions; History; IP networks; Peer to peer computing; Viruses (medical);
Conference_Titel :
e-Business and Information System Security (EBISS), 2010 2nd International Conference on
Conference_Location :
Wuhan
Print_ISBN :
978-1-4244-5893-6
Electronic_ISBN :
978-1-4244-5895-0
DOI :
10.1109/EBISS.2010.5473399