DocumentCode
466882
Title
Using Trust and Reputation Information to Choose Both Request Responders and Servers in Peer-to-Peer Networks
Author
Jin, Yu ; Gu, Zhimin ; Ban, Zhijie
Author_Institution
Beijing Inst. of Technol., Beijing
Volume
1
fYear
2007
fDate
July 30 2007-Aug. 1 2007
Firstpage
431
Lastpage
436
Abstract
In current reputation-based trust models for P2P applications trust and reputation information are mainly used to choose service providers, they are helpless when facing this malicious attack: malicious nodes respond received queries at random in spite of whether it locally has queried resources. Once they are chosen as a provider, they will transmit a fake, even a malicious file. We present a hierarchical, especially reputation-based two-level trust model. In our model trust and reputation information are used to choose both request responders and service providers. So our model can restrain malicious behaviors from the headstream and withstand this attack. Furthermore in our model peers can receive more and better services; trust value in node can be concentrated at a considerable fast speed and malicious nodes can be identified quickly.
Keywords
peer-to-peer computing; telecommunication security; malicious attack; peer-to-peer network; reputation-based two-level trust model; Application software; Artificial intelligence; Computer science; Distributed computing; Educational institutions; Network servers; Peer to peer computing; Pollution; Security; Software engineering;
fLanguage
English
Publisher
ieee
Conference_Titel
Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing, 2007. SNPD 2007. Eighth ACIS International Conference on
Conference_Location
Qingdao
Print_ISBN
978-0-7695-2909-7
Type
conf
DOI
10.1109/SNPD.2007.123
Filename
4287546
Link To Document