A role-based trust model for peer-to-peer communities and dynamic coalitions
Although P2P systems are usually used for information exchange between peers, they have either protected peers anonymity, or required transacting peers to trust each other implicitly. Both these approaches are vulnerable to attacks by malicious peers who could abuse the P2P system to spread viruses,...
Gespeichert in:
Hauptverfasser: | , , |
---|---|
Format: | Tagungsbericht |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 154 |
---|---|
container_issue | |
container_start_page | 141 |
container_title | |
container_volume | |
creator | Khambatti, M. Partha Dasgupta Ryu, K.D. |
description | Although P2P systems are usually used for information exchange between peers, they have either protected peers anonymity, or required transacting peers to trust each other implicitly. Both these approaches are vulnerable to attacks by malicious peers who could abuse the P2P system to spread viruses, incorrect, or damaging information. Here, we propose an approach for trust management in P2P systems. We introduce an optimistic role-based model for trust amongst peers and show that it is scalable, dynamic, revocable, secure and transitive. Our proposed solution permits asymmetric trust relationships that can be verified by any peer in the system through a simple, low-cost algorithm. We introduce a metric known as iComplex that combines a peer's trust value for each of its roles into a single, relative, probabilistic guarantee of trust. Finally, we discuss how our trust model allows peers to revoke relationships with malicious peers, and the nonrepudiation of peer relations. We use simulations to illustrate the trust value distribution amongst peers in the network. Our analysis and experiments demonstrates the low-cost involved to verify and validate trust values. Lastly, we establish the effectiveness of using sum as the aggregation function to combine trust values of a peer. |
doi_str_mv | 10.1109/IWIA.2004.1288044 |
format | Conference Proceeding |
fullrecord | <record><control><sourceid>ieee_6IE</sourceid><recordid>TN_cdi_ieee_primary_1288044</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>1288044</ieee_id><sourcerecordid>1288044</sourcerecordid><originalsourceid>FETCH-LOGICAL-i173t-e2b84127c50da81f15fd54380cd3111066aaa991db4c7eb5a3b95c8f1b297f703</originalsourceid><addsrcrecordid>eNotj8tKxDAYRgMiKGMfQNzkBVrz59IkyzJ4GSi4UVwOuUKkbYaks5i3t-J8mwNn8cFB6BFIB0D08-H7MHSUEN4BVYpwfoMaLRWRvRYUQPZ3qKn1h2xjWoDo79E44JKn0FpTg8drOdcVz9mHCcdc8CmE0q65_SN2eZ7PS1pTqNgsHvvLYubkNm-mzealPqDbaKYamit36Ov15XP_3o4fb4f9MLYJJFvbQK3iQKUTxBsFEUT0gjNFnGewhfS9MUZr8JY7GawwzGrhVARLtYySsB16-v9NIYTjqaTZlMvx2sx-AYAWTJc</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>A role-based trust model for peer-to-peer communities and dynamic coalitions</title><source>IEEE Electronic Library (IEL) Conference Proceedings</source><creator>Khambatti, M. ; Partha Dasgupta ; Ryu, K.D.</creator><creatorcontrib>Khambatti, M. ; Partha Dasgupta ; Ryu, K.D.</creatorcontrib><description>Although P2P systems are usually used for information exchange between peers, they have either protected peers anonymity, or required transacting peers to trust each other implicitly. Both these approaches are vulnerable to attacks by malicious peers who could abuse the P2P system to spread viruses, incorrect, or damaging information. Here, we propose an approach for trust management in P2P systems. We introduce an optimistic role-based model for trust amongst peers and show that it is scalable, dynamic, revocable, secure and transitive. Our proposed solution permits asymmetric trust relationships that can be verified by any peer in the system through a simple, low-cost algorithm. We introduce a metric known as iComplex that combines a peer's trust value for each of its roles into a single, relative, probabilistic guarantee of trust. Finally, we discuss how our trust model allows peers to revoke relationships with malicious peers, and the nonrepudiation of peer relations. We use simulations to illustrate the trust value distribution amongst peers in the network. Our analysis and experiments demonstrates the low-cost involved to verify and validate trust values. Lastly, we establish the effectiveness of using sum as the aggregation function to combine trust values of a peer.</description><identifier>ISBN: 9780769521176</identifier><identifier>ISBN: 0769521177</identifier><identifier>DOI: 10.1109/IWIA.2004.1288044</identifier><language>eng</language><publisher>IEEE</publisher><subject>Access control ; Knowledge management ; Peer to peer computing ; Protection</subject><ispartof>Second IEEE International Information Assurance Workshop, 2004. Proceedings, 2004, p.141-154</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/1288044$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,776,780,785,786,2052,4036,4037,27902,54895</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/1288044$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Khambatti, M.</creatorcontrib><creatorcontrib>Partha Dasgupta</creatorcontrib><creatorcontrib>Ryu, K.D.</creatorcontrib><title>A role-based trust model for peer-to-peer communities and dynamic coalitions</title><title>Second IEEE International Information Assurance Workshop, 2004. Proceedings</title><addtitle>IWIAS</addtitle><description>Although P2P systems are usually used for information exchange between peers, they have either protected peers anonymity, or required transacting peers to trust each other implicitly. Both these approaches are vulnerable to attacks by malicious peers who could abuse the P2P system to spread viruses, incorrect, or damaging information. Here, we propose an approach for trust management in P2P systems. We introduce an optimistic role-based model for trust amongst peers and show that it is scalable, dynamic, revocable, secure and transitive. Our proposed solution permits asymmetric trust relationships that can be verified by any peer in the system through a simple, low-cost algorithm. We introduce a metric known as iComplex that combines a peer's trust value for each of its roles into a single, relative, probabilistic guarantee of trust. Finally, we discuss how our trust model allows peers to revoke relationships with malicious peers, and the nonrepudiation of peer relations. We use simulations to illustrate the trust value distribution amongst peers in the network. Our analysis and experiments demonstrates the low-cost involved to verify and validate trust values. Lastly, we establish the effectiveness of using sum as the aggregation function to combine trust values of a peer.</description><subject>Access control</subject><subject>Knowledge management</subject><subject>Peer to peer computing</subject><subject>Protection</subject><isbn>9780769521176</isbn><isbn>0769521177</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2004</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><sourceid>RIE</sourceid><recordid>eNotj8tKxDAYRgMiKGMfQNzkBVrz59IkyzJ4GSi4UVwOuUKkbYaks5i3t-J8mwNn8cFB6BFIB0D08-H7MHSUEN4BVYpwfoMaLRWRvRYUQPZ3qKn1h2xjWoDo79E44JKn0FpTg8drOdcVz9mHCcdc8CmE0q65_SN2eZ7PS1pTqNgsHvvLYubkNm-mzealPqDbaKYamit36Ov15XP_3o4fb4f9MLYJJFvbQK3iQKUTxBsFEUT0gjNFnGewhfS9MUZr8JY7GawwzGrhVARLtYySsB16-v9NIYTjqaTZlMvx2sx-AYAWTJc</recordid><startdate>2004</startdate><enddate>2004</enddate><creator>Khambatti, M.</creator><creator>Partha Dasgupta</creator><creator>Ryu, K.D.</creator><general>IEEE</general><scope>6IE</scope><scope>6IL</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIL</scope></search><sort><creationdate>2004</creationdate><title>A role-based trust model for peer-to-peer communities and dynamic coalitions</title><author>Khambatti, M. ; Partha Dasgupta ; Ryu, K.D.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-i173t-e2b84127c50da81f15fd54380cd3111066aaa991db4c7eb5a3b95c8f1b297f703</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2004</creationdate><topic>Access control</topic><topic>Knowledge management</topic><topic>Peer to peer computing</topic><topic>Protection</topic><toplevel>online_resources</toplevel><creatorcontrib>Khambatti, M.</creatorcontrib><creatorcontrib>Partha Dasgupta</creatorcontrib><creatorcontrib>Ryu, K.D.</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE Electronic Library (IEL)</collection><collection>IEEE Proceedings Order Plans (POP All) 1998-Present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Khambatti, M.</au><au>Partha Dasgupta</au><au>Ryu, K.D.</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>A role-based trust model for peer-to-peer communities and dynamic coalitions</atitle><btitle>Second IEEE International Information Assurance Workshop, 2004. Proceedings</btitle><stitle>IWIAS</stitle><date>2004</date><risdate>2004</risdate><spage>141</spage><epage>154</epage><pages>141-154</pages><isbn>9780769521176</isbn><isbn>0769521177</isbn><abstract>Although P2P systems are usually used for information exchange between peers, they have either protected peers anonymity, or required transacting peers to trust each other implicitly. Both these approaches are vulnerable to attacks by malicious peers who could abuse the P2P system to spread viruses, incorrect, or damaging information. Here, we propose an approach for trust management in P2P systems. We introduce an optimistic role-based model for trust amongst peers and show that it is scalable, dynamic, revocable, secure and transitive. Our proposed solution permits asymmetric trust relationships that can be verified by any peer in the system through a simple, low-cost algorithm. We introduce a metric known as iComplex that combines a peer's trust value for each of its roles into a single, relative, probabilistic guarantee of trust. Finally, we discuss how our trust model allows peers to revoke relationships with malicious peers, and the nonrepudiation of peer relations. We use simulations to illustrate the trust value distribution amongst peers in the network. Our analysis and experiments demonstrates the low-cost involved to verify and validate trust values. Lastly, we establish the effectiveness of using sum as the aggregation function to combine trust values of a peer.</abstract><pub>IEEE</pub><doi>10.1109/IWIA.2004.1288044</doi><tpages>14</tpages></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | ISBN: 9780769521176 |
ispartof | Second IEEE International Information Assurance Workshop, 2004. Proceedings, 2004, p.141-154 |
issn | |
language | eng |
recordid | cdi_ieee_primary_1288044 |
source | IEEE Electronic Library (IEL) Conference Proceedings |
subjects | Access control Knowledge management Peer to peer computing Protection |
title | A role-based trust model for peer-to-peer communities and dynamic coalitions |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-28T18%3A47%3A29IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ieee_6IE&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=A%20role-based%20trust%20model%20for%20peer-to-peer%20communities%20and%20dynamic%20coalitions&rft.btitle=Second%20IEEE%20International%20Information%20Assurance%20Workshop,%202004.%20Proceedings&rft.au=Khambatti,%20M.&rft.date=2004&rft.spage=141&rft.epage=154&rft.pages=141-154&rft.isbn=9780769521176&rft.isbn_list=0769521177&rft_id=info:doi/10.1109/IWIA.2004.1288044&rft_dat=%3Cieee_6IE%3E1288044%3C/ieee_6IE%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=1288044&rfr_iscdi=true |