Publication | Closed Access
A reputation-based approach for choosing reliable resources in peer-to-peer networks
240
Citations
0
References
2002
Year
Unknown Venue
EngineeringInformation SecurityReliable ResourcesTrust Management ArchitectureReputation ManagementNetwork AnalysisP2p ServicesUser AnonymityHardware SecurityPrivacy-preserving CommunicationSocial Network AnalysisReliabilityData PrivacyTrustData SecurityCryptographyP2p ProtocolsNetwork ScienceCloud ComputingBusinessPeer-to-peer DatabaseReputation SystemTrusted P2pBlockchain
Peer-to-peer (P2P) applications have seen an enormous success, and recently introduced P2P services have reached tens of millions of users. A feature that significantly contributes to the success of many P2P applications is user anonymity. However, anonymity opens the door to possible misuses and abuses, exploiting the P2P network as a way to spread tampered with resources, including Trojan Horses, viruses, and spam. To address this problem we propose a self-regulating system where the P2P network is used to implement a robust reputation mechanism. Reputation sharing is realized through a distributed polling algorithm by which resource requestors can assess the reliability of a resource offered by a participant before initiating the download. This way, spreading of malicious contents will be reduced and eventually blocked. Our approach can be straightforwardly piggybacked on existing P2P protocols and requires modest modifications to current implementations.