Toward the Next-Generation Peer-to-Peer ServicesView this Special Issue
Research Article | Open Access
Gayatri Swamynathan, Ben Y. Zhao, Kevin C. Almeroth, Haitao Zheng, "Globally Decoupled Reputations for Large Distributed Networks", Advances in Multimedia, vol. 2007, Article ID 092485, 14 pages, 2007. https://doi.org/10.1155/2007/92485
Globally Decoupled Reputations for Large Distributed Networks
Reputation systems help establish social control in peer-to-peer networks. To be truly effective, however, a reputation system should counter attacks that compromise the reliability of user ratings. Existing reputation approaches either average a peer's lifetime ratings or account for rating credibility by weighing each piece of feedback by the reputation of its source. While these systems improve cooperation in a P2P network, they are extremely vulnerable to unfair ratings attacks. In this paper, we recommend that reputation systems decouple a peer's service provider reputation from its service recommender reputation, thereby, making reputations more resistant to tampering. We propose a scalable approach to system-wide decoupled service and feedback reputations and demonstrate the effectiveness of our model against previous nondecoupled reputation approaches. Our results indicate that decoupled approache significantly improves reputation accuracy, resulting in more successful transactions. Furthermore, we demonstrate the effectiveness and scalability of our decoupled approach as compared to PeerTrust, an alternative mechanism proposed for decoupled reputations. Our results are compiled from comprehensive logs collected from Maze, a large file-sharing system with over 1.4 million users supporting searches on 226TB of data.
- Gnutella, “The gnutella protocol specification v0.4,” 2001.
- Symantec, “Vbs.gnutella worm,” 2000, http://securityresponse.symantec.com/avcenter/venc/data/vbs.gnutella.html.
- E. Damiani, S. Vimercati, S. Paraboschi, P. Samarati, and F. Violante, “A reputation-based approach for choosing reliable resources in peer-to-peer networks,” in Proceedings of the 9th ACM Conference on Computer and Communications Security (CCS '02), pp. 207–216, Washington, DC, USA, November 2002.
- K. Walsh and E. G. Sirer, “Fighting peer-to-peer SPAM and decoys with object reputation,” in Proceeding of the 3rd Workshop on Economics of Peer-to-Peer Systems (P2PECON '05), pp. 138–143, Philadelphia, Pa, USA, August 2005.
- K. Aberer and Z. Despotovic, “Managing trust in a peer-2-peer information system,” in Proceedings of the 10th International Conference on Information and Knowledge Management (CIKM '01), pp. 310–317, Atlanta, Ga, USA, November 2001.
- K. Burton, “Design of the openprivacy distributed reputation system,” May 2002, http://www.peerfear.org/papers/openprivacy-reputation.pdf.
- P. Dewan and P. Dasgupta, “Pride: peer-to-peer reputation infrastructure for decentralized environments,” in Proceedings of the 13th International Conference on World Wide Web (WWW '04), pp. 1212–1213, New York, NY, USA, May 2004.
- S. D. Kamvar, M. T. Schlosser, and H. Garcia-Molina, “The eigentrust algorithm for reputation management in P2P networks,” in Proceedings of the 12th International Conference on World Wide Web (WWW '03), pp. 640–651, Budapest, Hungary, May 2003.
- B. C. Ooi, C. Y. Liau, and K.-L. Tan, “Managing trust in peer-to-peer systems using reputation-based techniques,” in Proceedings of the 4th International Conference on Advances in Web-Age Information Management (WAIM '03), pp. 2–12, Chengdu, China, August 2003.
- L. Xiong and L. Liu, “PeerTrust: supporting reputation-based trust for peer-to-peer electronic communities,” IEEE Transactions on Knowledge and Data Engineering, vol. 16, no. 7, pp. 843–857, 2004.
- S. Buchegger and J. Le Boudec, “A robust reputation system for P2P and mobile ad-hoc networks,” in Proceedings of the 2nd Workshop on the Economics of Peer-to-Peer Systems (P2PECON '04), Cambridge, Mass, USA, June 2004.
- R. Sherwood, S. Lee, and B. Bhattacharjee, “Cooperative peer groups in NICE,” Computer Networks, vol. 50, no. 4, pp. 523–544, 2006.
- Z. Zhang, S. Chen, and M. Yoon, “MARCH: a distributed incentive scheme for peer-to-peer networks,” in Proceedings of the 26th IEEE International Conference on Computer Communications (INFOCOM '07), pp. 1091–1099, Anchorage, Alaska, USA, May 2007.
- S. Marti and H. Garcia-Molina, “Identity crisis: anonymity vs. reputation in P2P systems,” in Proceedings of the 3rd International Conference on Peer-to-Peer Computing (P2P '03), pp. 134–141, Linkvping, Sweden, September 2003.
- eBay, “ebay,” 2005, http://www.ebay.com/.
- M. Feldman, K. Lai, I. Stoica, and J. Chuang, “Robust incentive techniques for peer-to-peer networks,” in Proceedings of the 5th ACM Conference on Electronic Commerce (EC '04), vol. 5, pp. 102–111, New York, NY, USA, May 2004.
- M. Srivatsa, L. Xiong, and L. Liu, “TrustGuard: countering vulnerabilities in reputation management for decentralized overlay networks,” in Proceedings of the 14th International Conference on World Wide Web (WWW '05), pp. 422–431, Chiba, Japan, May 2005.
- K. Walsh and E. G. Sirer, “Experience with an object reputation system for peer-to-peer filesharing,” in Proceedings of the 3rd Symposium on Networked System Design and Implementation (NSDI '06), San Jose, Calif, USA, May 2006.
- C. Dellarocas, “Immunizing online reputation reporting systems against unfair ratings and discriminatory behavior,” in Proceedings of the 2nd ACM Conference on Electronic Commerce (EC '00), pp. 150–157, Minneapolis, Minn, USA, October 2000.
- J. Douceur, “The sybil attack,” in Proceedings of the 1st International Workshop on Peer-to-Peer Systems (IPTPS '02), pp. 251–260, Cambridge, Mass, USA, March 2002.
- A. Cheng and E. Friedman, “Sybilproof reputation mechanisms,” in Proceedings of the 3rd Workshop on Economics of Peer-to-Peer Systems (P2PECON '05), pp. 128–132, Philadelphia, Pa, USA, August 2005.
- D. E. Knuth, The Stanford GraphBase: A Platform for Combinatorial Computing, ACM Press, New York, NY, USA, 1993.
- K. L. Calvert, M. B. Doar, and E. W. Zegura, “Modeling internet topology,” IEEE Communications Magazine, vol. 35, no. 6, pp. 160–163, 1997.
- M. Yang, H. Chen, B. Y. Zhao, Y. Dai, and Z. Zhang, “Deployment of a large-scale peer-to-peer social network,” in Proceedings of the 1st Workshop on Real Large Distributed Systems (WORLDS '04), San Francisco, Calif, USA, December 2004.
Copyright © 2007 Gayatri Swamynathan et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.