DocumentCode
466983
Title
P2P Trust Model: The Resource Chain Model
Author
Lee, Sinjae ; Zhu, Shaojian ; Kim, Yanggon
Author_Institution
Towson Univ., Towson
Volume
2
fYear
2007
fDate
July 30 2007-Aug. 1 2007
Firstpage
357
Lastpage
362
Abstract
As is well known, computer security has been given more attention; many mechanisms have been developed to increase P2P security like encryption, sandboxing, reputation, and firewall. Among those technologies, reputation mechanism as an active method is especially useful to automatically record, analyze and adjust peers´ reputation, trust, histories among the different peers, and this method is suitable for our anonymous and dynamic P2P environment. Therefore, reputation-based trust mechanism is a secure enough reputation system. In this paper, we present a new reputation-based trust management model to prevent the spread of malicious content in the open community using a resource chain model. The main idea of the resource chain model is using a routing table to record the information of nodes´ credibility and their recommending nodes´ credibility. Therefore, using this model can help us to find the best and safest resource location efficiently and decrease the number of malicious transactions.
Keywords
cryptography; peer-to-peer computing; P2P security; P2P trust model; computer security; encryption; firewall; malicious transactions; reputation-based trust management model; resource chain model; resource location; routing table; sandboxing; Artificial intelligence; Computer networks; Computer security; Distributed computing; Feedback; File servers; Network servers; Peer to peer computing; Routing; Software engineering;
fLanguage
English
Publisher
ieee
Conference_Titel
Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing, 2007. SNPD 2007. Eighth ACIS International Conference on
Conference_Location
Qingdao
Print_ISBN
978-0-7695-2909-7
Type
conf
DOI
10.1109/SNPD.2007.521
Filename
4287708
Link To Document