• DocumentCode
    2480912
  • Title

    A Reputation-Based Approach for Countering Vulnerabilities in P2P Networks

  • Author

    Chen, Jianguo ; Lu, Huijuan ; Bruda, Stefan D.

  • Author_Institution
    Coll. of Inf. Eng., China Jiliang Univ., Hangzhou, China
  • fYear
    2010
  • fDate
    22-23 May 2010
  • Firstpage
    1
  • Lastpage
    4
  • Abstract
    As a means of resources sharing, peer-to-peer (P2P) networks are currently receiving much attention. However, the open and anonymous nature of P2P networks also paves the way for malicious users to abuse the systems such as disseminating of inauthentic files or even viruses. To counter such menacing vulnerabilities in P2P networks, this paper presents a reputation-based approach that combines personal experiences and recommendations. On the basis of the discussion on vulnerabilities, three P2P networks, configuration of P2P reputation systems, the paper takes a critical look at some solutions with the trust model for the threats. The methods to update the trust values in the three unstructured P2P architectures are also discussed.
  • Keywords
    peer-to-peer computing; security of data; P2P networks; peer-to-peer networks; reputation-based approach; resources sharing; three unstructured P2P architectures; trust values; Computer architecture; Computer network reliability; Computer science; Counting circuits; DSL; Educational institutions; History; IP networks; Peer to peer computing; Viruses (medical);
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    e-Business and Information System Security (EBISS), 2010 2nd International Conference on
  • Conference_Location
    Wuhan
  • Print_ISBN
    978-1-4244-5893-6
  • Electronic_ISBN
    978-1-4244-5895-0
  • Type

    conf

  • DOI
    10.1109/EBISS.2010.5473399
  • Filename
    5473399