A role-based trust model for peer-to-peer communities and dynamic coalitions

Although P2P systems are usually used for information exchange between peers, they have either protected peers anonymity, or required transacting peers to trust each other implicitly. Both these approaches are vulnerable to attacks by malicious peers who could abuse the P2P system to spread viruses,...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: Khambatti, M., Partha Dasgupta, Ryu, K.D.
Format: Tagungsbericht
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 154
container_issue
container_start_page 141
container_title
container_volume
creator Khambatti, M.
Partha Dasgupta
Ryu, K.D.
description Although P2P systems are usually used for information exchange between peers, they have either protected peers anonymity, or required transacting peers to trust each other implicitly. Both these approaches are vulnerable to attacks by malicious peers who could abuse the P2P system to spread viruses, incorrect, or damaging information. Here, we propose an approach for trust management in P2P systems. We introduce an optimistic role-based model for trust amongst peers and show that it is scalable, dynamic, revocable, secure and transitive. Our proposed solution permits asymmetric trust relationships that can be verified by any peer in the system through a simple, low-cost algorithm. We introduce a metric known as iComplex that combines a peer's trust value for each of its roles into a single, relative, probabilistic guarantee of trust. Finally, we discuss how our trust model allows peers to revoke relationships with malicious peers, and the nonrepudiation of peer relations. We use simulations to illustrate the trust value distribution amongst peers in the network. Our analysis and experiments demonstrates the low-cost involved to verify and validate trust values. Lastly, we establish the effectiveness of using sum as the aggregation function to combine trust values of a peer.
doi_str_mv 10.1109/IWIA.2004.1288044
format Conference Proceeding
fullrecord <record><control><sourceid>ieee_6IE</sourceid><recordid>TN_cdi_ieee_primary_1288044</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>1288044</ieee_id><sourcerecordid>1288044</sourcerecordid><originalsourceid>FETCH-LOGICAL-i173t-e2b84127c50da81f15fd54380cd3111066aaa991db4c7eb5a3b95c8f1b297f703</originalsourceid><addsrcrecordid>eNotj8tKxDAYRgMiKGMfQNzkBVrz59IkyzJ4GSi4UVwOuUKkbYaks5i3t-J8mwNn8cFB6BFIB0D08-H7MHSUEN4BVYpwfoMaLRWRvRYUQPZ3qKn1h2xjWoDo79E44JKn0FpTg8drOdcVz9mHCcdc8CmE0q65_SN2eZ7PS1pTqNgsHvvLYubkNm-mzealPqDbaKYamit36Ov15XP_3o4fb4f9MLYJJFvbQK3iQKUTxBsFEUT0gjNFnGewhfS9MUZr8JY7GawwzGrhVARLtYySsB16-v9NIYTjqaTZlMvx2sx-AYAWTJc</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>A role-based trust model for peer-to-peer communities and dynamic coalitions</title><source>IEEE Electronic Library (IEL) Conference Proceedings</source><creator>Khambatti, M. ; Partha Dasgupta ; Ryu, K.D.</creator><creatorcontrib>Khambatti, M. ; Partha Dasgupta ; Ryu, K.D.</creatorcontrib><description>Although P2P systems are usually used for information exchange between peers, they have either protected peers anonymity, or required transacting peers to trust each other implicitly. Both these approaches are vulnerable to attacks by malicious peers who could abuse the P2P system to spread viruses, incorrect, or damaging information. Here, we propose an approach for trust management in P2P systems. We introduce an optimistic role-based model for trust amongst peers and show that it is scalable, dynamic, revocable, secure and transitive. Our proposed solution permits asymmetric trust relationships that can be verified by any peer in the system through a simple, low-cost algorithm. We introduce a metric known as iComplex that combines a peer's trust value for each of its roles into a single, relative, probabilistic guarantee of trust. Finally, we discuss how our trust model allows peers to revoke relationships with malicious peers, and the nonrepudiation of peer relations. We use simulations to illustrate the trust value distribution amongst peers in the network. Our analysis and experiments demonstrates the low-cost involved to verify and validate trust values. Lastly, we establish the effectiveness of using sum as the aggregation function to combine trust values of a peer.</description><identifier>ISBN: 9780769521176</identifier><identifier>ISBN: 0769521177</identifier><identifier>DOI: 10.1109/IWIA.2004.1288044</identifier><language>eng</language><publisher>IEEE</publisher><subject>Access control ; Knowledge management ; Peer to peer computing ; Protection</subject><ispartof>Second IEEE International Information Assurance Workshop, 2004. Proceedings, 2004, p.141-154</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/1288044$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,776,780,785,786,2052,4036,4037,27902,54895</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/1288044$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Khambatti, M.</creatorcontrib><creatorcontrib>Partha Dasgupta</creatorcontrib><creatorcontrib>Ryu, K.D.</creatorcontrib><title>A role-based trust model for peer-to-peer communities and dynamic coalitions</title><title>Second IEEE International Information Assurance Workshop, 2004. Proceedings</title><addtitle>IWIAS</addtitle><description>Although P2P systems are usually used for information exchange between peers, they have either protected peers anonymity, or required transacting peers to trust each other implicitly. Both these approaches are vulnerable to attacks by malicious peers who could abuse the P2P system to spread viruses, incorrect, or damaging information. Here, we propose an approach for trust management in P2P systems. We introduce an optimistic role-based model for trust amongst peers and show that it is scalable, dynamic, revocable, secure and transitive. Our proposed solution permits asymmetric trust relationships that can be verified by any peer in the system through a simple, low-cost algorithm. We introduce a metric known as iComplex that combines a peer's trust value for each of its roles into a single, relative, probabilistic guarantee of trust. Finally, we discuss how our trust model allows peers to revoke relationships with malicious peers, and the nonrepudiation of peer relations. We use simulations to illustrate the trust value distribution amongst peers in the network. Our analysis and experiments demonstrates the low-cost involved to verify and validate trust values. Lastly, we establish the effectiveness of using sum as the aggregation function to combine trust values of a peer.</description><subject>Access control</subject><subject>Knowledge management</subject><subject>Peer to peer computing</subject><subject>Protection</subject><isbn>9780769521176</isbn><isbn>0769521177</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2004</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><sourceid>RIE</sourceid><recordid>eNotj8tKxDAYRgMiKGMfQNzkBVrz59IkyzJ4GSi4UVwOuUKkbYaks5i3t-J8mwNn8cFB6BFIB0D08-H7MHSUEN4BVYpwfoMaLRWRvRYUQPZ3qKn1h2xjWoDo79E44JKn0FpTg8drOdcVz9mHCcdc8CmE0q65_SN2eZ7PS1pTqNgsHvvLYubkNm-mzealPqDbaKYamit36Ov15XP_3o4fb4f9MLYJJFvbQK3iQKUTxBsFEUT0gjNFnGewhfS9MUZr8JY7GawwzGrhVARLtYySsB16-v9NIYTjqaTZlMvx2sx-AYAWTJc</recordid><startdate>2004</startdate><enddate>2004</enddate><creator>Khambatti, M.</creator><creator>Partha Dasgupta</creator><creator>Ryu, K.D.</creator><general>IEEE</general><scope>6IE</scope><scope>6IL</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIL</scope></search><sort><creationdate>2004</creationdate><title>A role-based trust model for peer-to-peer communities and dynamic coalitions</title><author>Khambatti, M. ; Partha Dasgupta ; Ryu, K.D.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-i173t-e2b84127c50da81f15fd54380cd3111066aaa991db4c7eb5a3b95c8f1b297f703</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2004</creationdate><topic>Access control</topic><topic>Knowledge management</topic><topic>Peer to peer computing</topic><topic>Protection</topic><toplevel>online_resources</toplevel><creatorcontrib>Khambatti, M.</creatorcontrib><creatorcontrib>Partha Dasgupta</creatorcontrib><creatorcontrib>Ryu, K.D.</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE Electronic Library (IEL)</collection><collection>IEEE Proceedings Order Plans (POP All) 1998-Present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Khambatti, M.</au><au>Partha Dasgupta</au><au>Ryu, K.D.</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>A role-based trust model for peer-to-peer communities and dynamic coalitions</atitle><btitle>Second IEEE International Information Assurance Workshop, 2004. Proceedings</btitle><stitle>IWIAS</stitle><date>2004</date><risdate>2004</risdate><spage>141</spage><epage>154</epage><pages>141-154</pages><isbn>9780769521176</isbn><isbn>0769521177</isbn><abstract>Although P2P systems are usually used for information exchange between peers, they have either protected peers anonymity, or required transacting peers to trust each other implicitly. Both these approaches are vulnerable to attacks by malicious peers who could abuse the P2P system to spread viruses, incorrect, or damaging information. Here, we propose an approach for trust management in P2P systems. We introduce an optimistic role-based model for trust amongst peers and show that it is scalable, dynamic, revocable, secure and transitive. Our proposed solution permits asymmetric trust relationships that can be verified by any peer in the system through a simple, low-cost algorithm. We introduce a metric known as iComplex that combines a peer's trust value for each of its roles into a single, relative, probabilistic guarantee of trust. Finally, we discuss how our trust model allows peers to revoke relationships with malicious peers, and the nonrepudiation of peer relations. We use simulations to illustrate the trust value distribution amongst peers in the network. Our analysis and experiments demonstrates the low-cost involved to verify and validate trust values. Lastly, we establish the effectiveness of using sum as the aggregation function to combine trust values of a peer.</abstract><pub>IEEE</pub><doi>10.1109/IWIA.2004.1288044</doi><tpages>14</tpages></addata></record>
fulltext fulltext_linktorsrc
identifier ISBN: 9780769521176
ispartof Second IEEE International Information Assurance Workshop, 2004. Proceedings, 2004, p.141-154
issn
language eng
recordid cdi_ieee_primary_1288044
source IEEE Electronic Library (IEL) Conference Proceedings
subjects Access control
Knowledge management
Peer to peer computing
Protection
title A role-based trust model for peer-to-peer communities and dynamic coalitions
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-28T18%3A47%3A29IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ieee_6IE&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=A%20role-based%20trust%20model%20for%20peer-to-peer%20communities%20and%20dynamic%20coalitions&rft.btitle=Second%20IEEE%20International%20Information%20Assurance%20Workshop,%202004.%20Proceedings&rft.au=Khambatti,%20M.&rft.date=2004&rft.spage=141&rft.epage=154&rft.pages=141-154&rft.isbn=9780769521176&rft.isbn_list=0769521177&rft_id=info:doi/10.1109/IWIA.2004.1288044&rft_dat=%3Cieee_6IE%3E1288044%3C/ieee_6IE%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=1288044&rfr_iscdi=true