skip to main content
article

Cooperative peer groups in NICE

Published: 15 March 2006 Publication History

Abstract

We present a distributed scheme for trust inference in peer-to-peer networks. Our work is in the context of the NICE system, which is a platform for implementing cooperative applications over the Internet. We describe a technique for efficiently storing user reputation information in a completely decentralized manner, and show how this information can be used to efficiently identify non-cooperative users in NICE. We present a simulation-based study of our algorithms, in which we show our scheme scales to thousands of users using modest amounts of storage, processing, and bandwidth at any individual node. Lastly we show that our scheme is robust and can form cooperative groups in systems where the vast majority of users are malicious.

References

[1]
A. Abdul-Rahman, S. Hailes. Supporting trust in virtual communities, in: Proceedings Hawaii International Conference on System Sciences, vol. 33, 2000.
[2]
Aberer, K. and Despotovic, Z., Managing trust in a Peer-2-Peer information system. In: Paques, H., Liu, L., Grossman, D. (Eds.), Proceedings of the Tenth International Conference on Information and Knowledge Management CIKM-01, ACM Press, New York. pp. 310-317.
[3]
E. Adar, B.A. Huberman, Free riding on gnutella, Technical report, Xerox PARC, August 2000.
[4]
S. Banerjee, B. Bhattacharjee, C. Kommareddy, Scalable application layer multicast, in: Proc. ACM Sig-comm, August 2002.
[5]
S. Bhattacharjee, K. Calvert, E. Zegura, Self-organizing wide-area network caches, in: IEEE In- focom'98, 1998.
[6]
Bloom, B.H., Space/time trade-offs in hash coding with allowable errors. Communications of the Association for Computing Machinery. v13 i7. 422-426.
[7]
Bollobas, B., Random Graphs. 2001. Cambridge University Press.
[8]
M. Faloutsos, P. Falouts, C. Faloutsos, On power-law relationship of the internet topology, in: SIGCOMM, 1999, pp. 251-262.
[9]
Fan, L., Cao, P., Almeida, J. and Broder, A.Z., Summary cache: a scalable wide-area web cache sharing protocol. Proc. SIGCOMM'98. v28 i4. 254-265.
[10]
Friedman, E. and Resnick, P., The social cost of cheap pseudonyms. Journal of Economics and Management Strategy. v10 i2. 173-199.
[11]
<http://gnutella.wego.com>.
[12]
S.D. Kamvar, M.T. Schlosser, H. Garcia-Molina, The EigenTrust algorithm for reputation management in P2P networks, in: World Wide Web (WWW), 2003.
[13]
L.P. Cox, B.D. Noble, Samsara: Honor among thieves in peer-to-peer storage, in: Symposium on Operating Systems Principals (SOSP), October 2003, pp. 120-132.
[14]
S. Marsh, Formalising Trust as a Computational Concept, Ph.D. thesis, University of Sterling 1994.
[15]
R. Morselli, B. Bhattacharjee, M. Marsh, A. Srinivasan, Efficient lookup on unstructured topologies, Technical Report CS-TR-4593, University of Maryland, 2004.
[16]
S. Ratnasamy, P. Francis, M. Handley, R. Karp, S. Shenker, A scalable content addressable network, in: Proceedings of the ACM SIGCOMM 2001 Technical Conference, 2001.
[17]
S.C. Rhea, John Kubiatowicz, Probabilistic location and routing, in: Proceedings of INFOCOM 2002, 2002.
[18]
A. Rowstran, P. Druschel, Pastry: Scalable, distributed object location and routing for largescale peer-to-peer systems, in: Proceedings of the 18th IFIP/ACM International Conference on Distributed Systems Platforms (Middleware 2001), 2001.
[19]
N. Shankar, C. Komareddy, B. Bhattacharjee, Finding close friends over the Internet, in: Proceedings of International Conference on Network Protocols, November 2001.
[20]
I.S.R. Morris, D. Karger, M.F. Kaashoek, H. Balakrishnan, Chord: A scalable peer-to-peer lookup service for internet applications, in: Proceedings of the ACM SIGCOMM '01 Conference, San Diego, California, August 2001.
[21]
<http://www.ebay.com>.
[22]
<http://www.mojonation.net>.
[23]
B. Yu, M.P. Singh, A social mechanism of reputation management in electronic communities, in: Proceedings of Fourth International Workshop on Cooperative Information Agents, 2000.
[24]
S.Q. Zhuang, B.Y. Zhao, A.D. Joseph, R. Katz, J. Kubiatowicz, Bayeux: an architecture for scalable and fault-tolerant wide-area data dissemination, in: Eleventh International Workshop on Network and Operating Systems Support for Digital Audio and Video (NOSSDAV 2001), 2001.
[25]
P. Zimmermann, Pretty good privacy user's guide, Distributed with PGP software, June 1993.

Cited By

View all

Recommendations

Comments

Information & Contributors

Information

Published In

cover image Computer Networks: The International Journal of Computer and Telecommunications Networking
Computer Networks: The International Journal of Computer and Telecommunications Networking  Volume 50, Issue 4
Management in peer-to-peer systems
15 March 2006
129 pages

Publisher

Elsevier North-Holland, Inc.

United States

Publication History

Published: 15 March 2006

Author Tags

  1. Distributed algorithms
  2. P2P
  3. Reputation base trust

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 07 Nov 2024

Other Metrics

Citations

Cited By

View all

View Options

View options

Get Access

Login options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media