• DocumentCode
    466882
  • Title

    Using Trust and Reputation Information to Choose Both Request Responders and Servers in Peer-to-Peer Networks

  • Author

    Jin, Yu ; Gu, Zhimin ; Ban, Zhijie

  • Author_Institution
    Beijing Inst. of Technol., Beijing
  • Volume
    1
  • fYear
    2007
  • fDate
    July 30 2007-Aug. 1 2007
  • Firstpage
    431
  • Lastpage
    436
  • Abstract
    In current reputation-based trust models for P2P applications trust and reputation information are mainly used to choose service providers, they are helpless when facing this malicious attack: malicious nodes respond received queries at random in spite of whether it locally has queried resources. Once they are chosen as a provider, they will transmit a fake, even a malicious file. We present a hierarchical, especially reputation-based two-level trust model. In our model trust and reputation information are used to choose both request responders and service providers. So our model can restrain malicious behaviors from the headstream and withstand this attack. Furthermore in our model peers can receive more and better services; trust value in node can be concentrated at a considerable fast speed and malicious nodes can be identified quickly.
  • Keywords
    peer-to-peer computing; telecommunication security; malicious attack; peer-to-peer network; reputation-based two-level trust model; Application software; Artificial intelligence; Computer science; Distributed computing; Educational institutions; Network servers; Peer to peer computing; Pollution; Security; Software engineering;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing, 2007. SNPD 2007. Eighth ACIS International Conference on
  • Conference_Location
    Qingdao
  • Print_ISBN
    978-0-7695-2909-7
  • Type

    conf

  • DOI
    10.1109/SNPD.2007.123
  • Filename
    4287546