Abstract | ||
---|---|---|
Content pollution is pervasive in the current peer-to-peer file sharing systems. Many previous reputation models have been proposed to address this problem, however, such models strongly rely on the participants' feedback. In this paper, we bring forward a new holistic mechanism which integrates the reputation model, inherent file-source-based information and the statistical data reflecting the diffusion state to defend against pollution attack. First, we deploy a redundancy mechanism to assure that the file requester receives the correct indices that accord with the information published by the file provider. Second, we complement the reputation information with the diffusion data to help the file requester select the authentic file for downloading. Finally, we introduce a block-oriented probabilistic verification protocol to help the file requester discern the polluted files during the downloading with a low cost. We perform a simulation which shows that our holistic mechanism can perform very well and converge to a high accuracy rapidly, even in a highly malicious environment. |
Year | DOI | Venue |
---|---|---|
2009 | 10.1145/1529282.1529288 | SAC |
Keywords | Field | DocType |
redundancy mechanism,file pollution,authentic file,peer-to-peer network,new holistic mechanism,current peer-to-peer file,polluted file,file requester,previous reputation model,holistic mechanism,inherent file-source-based information,file provider,file sharing,reputation | BitTorrent tracker,SSH File Transfer Protocol,Global Namespace,Self-certifying File System,Computer security,Computer science,Upload,Torrent file,Journaling file system,File sharing | Conference |
Citations | PageRank | References |
8 | 0.47 | 14 |
Authors | ||
6 |
Name | Order | Citations | PageRank |
---|---|---|---|
Zhuhua Cai | 1 | 90 | 7.48 |
Ruichuan Chen | 2 | 205 | 18.95 |
Jianqiao Feng | 3 | 8 | 1.14 |
Cong Tang | 4 | 20 | 7.18 |
Zhong Chen | 5 | 503 | 58.35 |
Jianbin Hu | 6 | 179 | 22.43 |