Back
 IJCNS  Vol.2 No.3 , June 2009
A Novel Approach to Improve the Security of P2P File-Sharing Systems
Abstract: The recent and unprecedented surge of public interest in peer-to-peer (P2P) file-sharing systems has led to a variety of interesting research questions. How to minimize threats in such an open community is an impor-tant research topic. Trust models have been widely used in estimating the trustworthiness of peers in P2P file-sharing systems where peers can transact with each other without prior experience. However, current P2P trust models almost take no consideration for the nature of trust, fuzzy, complex and dynamic, which results in low efficiency in resisting the attacks of malicious nodes. In this paper, a new trust model named NatureTrust that can alleviate the shortage brought by the nature of trust is proposed. In order to cope with the fuzzy characteristic of trust, linguistic terms are used to express trust. Additionally, fuzzy inference rules are employed to evaluate trust of each transaction so as to handle the complex characteristic of trust. Fur-thermore, risk factor is deployed into NatureTrust to represent and reason with the dynamic characteristic of trust. Both risk and trust factors are considered in evaluating the trustworthiness of each peer. Experimental results show that the trust model analyzed here thus stands against malicious act effectively.
Cite this paper: nullC. ZUO, R. LI and Z. LU, "A Novel Approach to Improve the Security of P2P File-Sharing Systems," International Journal of Communications, Network and System Sciences, Vol. 2 No. 3, 2009, pp. 229-236. doi: 10.4236/ijcns.2009.23025.
References

[1]   S. D. Kamvar, M. T. Schlosser, and H. Garcia-Molina, “The EigenTrust algorithm for reputation management in P2P networks,” in Proceedings of the 12th International World Wide Web Conference, pp. 640-651, 2003.

[2]   L. Xiong and L. Liu, “A reputation-based trust model for peer-to-peer e-commerce communities,” in Proceedings of the IEEE International Conference on E-Commerce, 2003.

[3]   L. Xiong and L. Liu, “PeerTrust: Supporting reputa-tion-based trust for peer-to-peer electronic communities,” in Proceedings of IEEE Transactions on Knowledge and Data Engineering, Vol. 16, No. 7, pp. 843-857, 2004.

[4]   E. J. Chang, F. K. Hussain, and T. S. Dillon, “Fuzzy na-ture of trust and dynamic trust modeling in service ori-ented environments,” in Proceedings of the 2nd ACM Workshop on Secure Web Services (SWS’05), Fairfax, Virginia, USA, 2005.

[5]   D. W. Manchala, “E-commerce trust metrics and mod-els,” IEEE Internet Computing, Vol. 4, No. 2, 2000.

[6]   L. Xiong and L. Liu, “A reputation-based trust model for peer-to-peer e-commerce communities,” in Proceedings of the IEEE Conference on E-Commerce, June 2003.

[7]   P. Resnick and R. Zeckhauser, “Trust among strangers in Internet transactions: Empirical analysis of eBay’s Repu-tation system,” in Proceedings of NBER Workshop on Empirical Studies of Electronic Commerce, 2000.

[8]   F. Cornelli, E. Damiani, S. D. C. di Vimercati, S. Paraboschi, and P. Samarati, “Choosing reputable ser-vents in a P2P network,” in Proceedings of the 11th World Wide Web Conference, 2002.

[9]   E. Damiani, S. Vimercati, S. Paraboschi, P. Samarati, and F. Violante, “A Reputation-based approach for choosing reliable resources in peer-to-peer networks,” in Proceed-ing of CCS, 2002.

[10]   S. Kamvar, M. Schlosser, and H. Garcia-Molina, “Eigen-Trust: Reputation management in P2P networks,” in Pro-ceedings of the 12th WWW Conference, 2003.

[11]   F. Cornelli, E. Damiani, S. D. C. di Vimercati, S. Paraboschi, and P. Samarati, “Choosing reputable ser-vents in a P2P network,” in Proceedings of the 11th In-ternational World Wide Web Conference, pp. 376-386, 2002.

[12]   E. Damiani, S. De Capitani di Vimercati, S. Paraboschi, and P. Samarati, “Managing and sharing servents’ reputa-tions in P2P systems,” in proceedings of IEEE Transac-tions on Knowledge and Data Engineering, pp. 840-854, 2003.

[13]   E. Damiani, S. D. C. di Vimercati, S. Paraboschi, P. Samarati, and F. Violante, “A reputation-based approach for choosing reliable resources in Peer-to-Peer networks,” in Proceedings of the 9th ACM Conference on Computer and Communications Security, pp. 207-216, 2002.

[14]   M. Richardson, R. Agrawal, and P. Domingos, “Trust management for the semantic web,” in Proceedings of the 2nd International Semantic Web Conference, pp. 351-368, 2003.

[15]   Z. Q. Liang and W. S. Shi, “PET: A personalized trust model with reputation and risk evaluation for P2P re-source sharing,” in Proceedings of the 38th Hawaii Inter-national Conference on System Sciences, 2005.

[16]   G. W. Zhang, J. H. Kang, and R. He, “Towards a trust model with uncertainty for e-commerce systems,” in pro-ceedings of the IEEE International Conference on e-Business Engineering, 2005.

[17]   R. He, J. W. Niu, and K. Hu, “A novel approach to evaluate trustworthiness and uncertainty of trust relation-ships in Peer-to-Peer computing,” in proceedings of the 5th International Conference on Computer and Informa-tion Technology (CIT’05), 2005.

[18]   D. Y. Li, “The cloud control method and balancing pat-terns of triple link inverted pendulum systems,” Chinese Engineering Science, Vol. 1, No. 2, pp. 41-46, 1999.

[19]   PeerSim: A peer-to-peer simulator. http://peersim. source forge.net/.

[20]   BRITE, http://www.cs.bu.edu/brite/, 2007.

[21]   A. Medina, A. Lakhina, I. Matta, et al., “BRITE: Univer-sal topology generation from a user’s perspective,” Tech-nical Report BUCS-TR-2001-003, Boston University, April 2001.

 
 
Top