Abstract | ||
---|---|---|
The open and autonomous nature of peer-to-peer (P2P) file-sharing invites the phenomenon of widespread decoys and free-riding. Reputation systems are introduced to assure data authenticity and to stimulate collaboration. We argue that, in a reputation-aided P2P file-sharing system, the faithful delivery of an authentic file depends on the authenticity of the file, its reputation (either the objective reputation of itself or the subjective reputation of its providing peer) and its index. Hence, we propose to add integrity control for the reputation and indexing storage/computation processing to enhance the authenticity of the resultant reputation values and service indexes. An integrity model is presented to articulate necessary mechanisms and rules for integrity protection. The existing proposals for P2P reputation and indexing are analyzed, accordingly. |
Year | DOI | Venue |
---|---|---|
2008 | 10.1109/ICYCS.2008.132 | ICYCS |
Keywords | Field | DocType |
index poisoning,pollution,integrity model,data authenticity,service authenticity,subjective reputation,reputation system,p2p file-sharing system,computation processing,p2p reputation,integrity control,reputation fraud,clark-wilson integrity model,integrity protection,p2p file-sharing,objective reputation,peer-to-peer computing,message authentication,resultant reputation value,data integrity,indexes,p2p,indexing,object recognition,free riding,indexation,computational modeling,file sharing,servers | Internet privacy,Reputation system,Message authentication code,Computer science,Computer security,Server,Computer network,Search engine indexing,Data integrity,Phenomenon,File sharing,Reputation | Conference |
ISBN | Citations | PageRank |
978-0-7695-3398-8 | 1 | 0.36 |
References | Authors | |
16 | 3 |
Name | Order | Citations | PageRank |
---|---|---|---|
Lingli Deng | 1 | 8 | 4.93 |
Yeping He | 2 | 77 | 14.64 |
Ziyao Xu | 3 | 4 | 3.48 |