DocumentCode :
466882
Title :
Using Trust and Reputation Information to Choose Both Request Responders and Servers in Peer-to-Peer Networks
Author :
Jin, Yu ; Gu, Zhimin ; Ban, Zhijie
Author_Institution :
Beijing Inst. of Technol., Beijing
Volume :
1
fYear :
2007
fDate :
July 30 2007-Aug. 1 2007
Firstpage :
431
Lastpage :
436
Abstract :
In current reputation-based trust models for P2P applications trust and reputation information are mainly used to choose service providers, they are helpless when facing this malicious attack: malicious nodes respond received queries at random in spite of whether it locally has queried resources. Once they are chosen as a provider, they will transmit a fake, even a malicious file. We present a hierarchical, especially reputation-based two-level trust model. In our model trust and reputation information are used to choose both request responders and service providers. So our model can restrain malicious behaviors from the headstream and withstand this attack. Furthermore in our model peers can receive more and better services; trust value in node can be concentrated at a considerable fast speed and malicious nodes can be identified quickly.
Keywords :
peer-to-peer computing; telecommunication security; malicious attack; peer-to-peer network; reputation-based two-level trust model; Application software; Artificial intelligence; Computer science; Distributed computing; Educational institutions; Network servers; Peer to peer computing; Pollution; Security; Software engineering;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing, 2007. SNPD 2007. Eighth ACIS International Conference on
Conference_Location :
Qingdao
Print_ISBN :
978-0-7695-2909-7
Type :
conf
DOI :
10.1109/SNPD.2007.123
Filename :
4287546
Link To Document :
بازگشت