TY - GEN
T1 - A reputation aggregation method considering file request distribution and peer behavior in unstructured P2P networks
AU - Ushikubo, Hiroki
AU - Takeda, Sonoko
AU - Shigeno, Hiroshi
N1 - Copyright:
Copyright 2014 Elsevier B.V., All rights reserved.
PY - 2013
Y1 - 2013
N2 - In order to establish secure file-sharing in unstructured peer-to-peer networks, reputation aggregation methods are now focused on. In these methods, each peer calculates reputation values which denote the reliability and safety of peers participating in P2P networks. When peers exchange files, they can avoid transacting with the malicious peers by reference to reputation values. Reputation aggregation methods, however, have a problem that file requests concentrate on partial peers with high reputation values. In the existing method, file requests are distributed by making partial peers whose reputation values are high to some extent more likely to be selected temporarily. Although, there are tactical malicious peers providing not only inauthentic but also authentic files in each transaction. And the existing method do not consider the problem that the malicious peers can spread more inauthentic files by providing authentic files intentionally and acquiring high reputation value by the system. Thus in this paper, we propose a reputation aggregation method which decreases the probability of selecting the malicious peers by considering reputation value. Furthermore, the method considers trade-off between the safety of file-sharing and the distribution of file requests. The results of computer simulation demonstrate the distribution of file requests and the advancement of transaction success rate.
AB - In order to establish secure file-sharing in unstructured peer-to-peer networks, reputation aggregation methods are now focused on. In these methods, each peer calculates reputation values which denote the reliability and safety of peers participating in P2P networks. When peers exchange files, they can avoid transacting with the malicious peers by reference to reputation values. Reputation aggregation methods, however, have a problem that file requests concentrate on partial peers with high reputation values. In the existing method, file requests are distributed by making partial peers whose reputation values are high to some extent more likely to be selected temporarily. Although, there are tactical malicious peers providing not only inauthentic but also authentic files in each transaction. And the existing method do not consider the problem that the malicious peers can spread more inauthentic files by providing authentic files intentionally and acquiring high reputation value by the system. Thus in this paper, we propose a reputation aggregation method which decreases the probability of selecting the malicious peers by considering reputation value. Furthermore, the method considers trade-off between the safety of file-sharing and the distribution of file requests. The results of computer simulation demonstrate the distribution of file requests and the advancement of transaction success rate.
KW - File-sharing
KW - P2P
KW - Reputation aggregation Method
KW - Security
UR - http://www.scopus.com/inward/record.url?scp=84893304006&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84893304006&partnerID=8YFLogxK
U2 - 10.1109/NBiS.2013.27
DO - 10.1109/NBiS.2013.27
M3 - Conference contribution
AN - SCOPUS:84893304006
SN - 9780769550527
T3 - Proceedings - 16th International Conference on Network-Based Information Systems, NBiS 2013
SP - 162
EP - 169
BT - Proceedings - 16th International Conference on Network-Based Information Systems, NBiS 2013
PB - IEEE Computer Society
T2 - 16th International Conference on Network-Based Information Systems, NBiS 2013
Y2 - 4 September 2013 through 6 September 2013
ER -