Securing reputation data in peer-to-peer networks

Prashant Dewan, Partha Dasgupta

Research output: Chapter in Book/Report/Conference proceedingConference contribution

18 Scopus citations

Abstract

Alice, a peer in a peer-to-peer (P2P) network can evaluate the reputation of another peer, Bob, either based on her own experiences (with Bob) or based on the evaluation (of Bob) by others (say Carol and David). If Alice uses her own experiences only, she will get cheated atleast once for every malicious peer she identifies. If Alice uses third party experiences (Carol and David), she can reduce the number of times she gets cheated. Besides, Alice will have to verify the third party information receives from other peers. The verification (if at all possible) is likely to be both network and computation intensive. In the propose solution, the reputation holder (Bob) stores its reputation data and protects it from the other peers. The reputation data is stored in a cryptographic chain in order to protect the reputation data from the reputation holder itself. Bob cannot modify the chain because the head and tail of the chain are public information and all recommendations are digitally signed. We show that the proposed solution reduces the number of malicious transaction experienced by a peer (Alice), along with a reduction in network traffic.

Original languageEnglish (US)
Title of host publicationProceedings of the IASTED International Conference on Parallel and Distributed Computing and Systems
EditorsT. Gonzalez
Pages485-490
Number of pages6
Volume16
StatePublished - 2004
EventProceedings of the 16th IASTED International Conference on Parallel and Distributed Computing and Systems - Cambridge, MA, United States
Duration: Nov 9 2004Nov 11 2004

Other

OtherProceedings of the 16th IASTED International Conference on Parallel and Distributed Computing and Systems
CountryUnited States
CityCambridge, MA
Period11/9/0411/11/04

Keywords

  • Peer-to-Peer
  • Reputation
  • Security
  • Trust

ASJC Scopus subject areas

  • Engineering(all)

Fingerprint Dive into the research topics of 'Securing reputation data in peer-to-peer networks'. Together they form a unique fingerprint.

  • Cite this

    Dewan, P., & Dasgupta, P. (2004). Securing reputation data in peer-to-peer networks. In T. Gonzalez (Ed.), Proceedings of the IASTED International Conference on Parallel and Distributed Computing and Systems (Vol. 16, pp. 485-490). [439-039]