Title :
P2P Trust Model: The Resource Chain Model
Author :
Lee, Sinjae ; Zhu, Shaojian ; Kim, Yanggon
Author_Institution :
Towson Univ., Towson
fDate :
July 30 2007-Aug. 1 2007
Abstract :
As is well known, computer security has been given more attention; many mechanisms have been developed to increase P2P security like encryption, sandboxing, reputation, and firewall. Among those technologies, reputation mechanism as an active method is especially useful to automatically record, analyze and adjust peers´ reputation, trust, histories among the different peers, and this method is suitable for our anonymous and dynamic P2P environment. Therefore, reputation-based trust mechanism is a secure enough reputation system. In this paper, we present a new reputation-based trust management model to prevent the spread of malicious content in the open community using a resource chain model. The main idea of the resource chain model is using a routing table to record the information of nodes´ credibility and their recommending nodes´ credibility. Therefore, using this model can help us to find the best and safest resource location efficiently and decrease the number of malicious transactions.
Keywords :
cryptography; peer-to-peer computing; P2P security; P2P trust model; computer security; encryption; firewall; malicious transactions; reputation-based trust management model; resource chain model; resource location; routing table; sandboxing; Artificial intelligence; Computer networks; Computer security; Distributed computing; Feedback; File servers; Network servers; Peer to peer computing; Routing; Software engineering;
Conference_Titel :
Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing, 2007. SNPD 2007. Eighth ACIS International Conference on
Conference_Location :
Qingdao
Print_ISBN :
978-0-7695-2909-7
DOI :
10.1109/SNPD.2007.521