首页 | 官方网站   微博 | 高级检索  
     


Reputation management algorithms for DHT-based peer-to-peer environment
Authors:Natalya Fedotova  Luca Veltri
Affiliation:1. Department of Electrical and Computer Engineering, University of Manitoba, Winnipeg, Canada;2. Department of Computer Science, Hong Kong University of Science and Technology, Clear Water Bay, Kowloon, Hong Kong;1. Laboratory of Environmental Protection Engineering, Department of Civil and Environmental Engineering, Graduate School of Engineering, Tohoku University, 6-6-06 Aza-Aoba, Aramaki, Aoba Ward, Sendai, Miyagi, 980-8579, Japan;2. Graduate School of Environmental Studies, Tohoku University, 6-6-06 Aza-Aoba, Aramaki, Aoba Ward, Sendai, Miyagi, 980-8579, Japan;3. State Key Laboratory of Environmental Aquatic Chemistry, Research Center for Eco-Environmental Sciences, Chinese Academy of Sciences, Beijing, 100085, China;1. School of Civil and Environmental Engineering, Yonsei University, Seoul 03722, Republic of Korea;2. Department of Civil, Environmental and Architectural Engineering, Korea University, Seoul 02841, Republic of Korea;3. Department of Civil and Environmental Engineering, Korea Advanced Institute of Science and Technology (KAIST), 291 Daehak-ro, Yuseong-gu, Daejeon 34141, Republic of Korea;1. Department of Anatomy and Neuroscience, University College Cork, Cork, Ireland;2. APC Microbiome Institute, University College Cork, Cork, Ireland;3. Department of Psychiatry and Neurobehavioural Science, University College Cork, Cork, Ireland
Abstract:This paper addresses the problem of integration of reputation management mechanisms into data look-up and routing processes to cope with some specific security problems in peer-to-peer (P2P) networks based on Distributed Hash Tables (DHT). The goal is to find a mode for “good” peers to cooperate in order to withstand malicious activity of single malevolent peers and their collusions as well.We start from consideration of individual instruments for reputation evaluation that every single peer should be provided with to autonomously define the level of its own trust towards others. We also propose a possible scenario of integration of some existing reputation management techniques and routing mechanisms in a P2P network based on the popular Kademlia algorithm. Then, we present an interaction algorithm that allows peers to obtain the global trust value for each single node through exchanging opinions in the form of local trust values independently calculated by every peer with other members of the community. Such collaboration between peers is indispensable to cope with malicious activity of inconsistent nature specific to DHT-based environment. To render the algorithm resilient to the presence of malicious participants we propose to apply solutions for Byzantine Agreement to exchange opinions among peers. We also provide mathematical evaluations concerning the complexity and computational costs of the proposed algorithm that evidence apparent improvements over the previous one.
Keywords:
本文献已被 ScienceDirect 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号