skip to main content
10.1145/988772.988787acmconferencesArticle/Chapter ViewAbstractPublication PagesecConference Proceedingsconference-collections
Article

Limited reputation sharing in P2P systems

Published:17 May 2004Publication History

ABSTRACT

The increasing popularity of resource exchange through peer-to-peer networks has encouraged the development of ways to support more complex commercial transactions over these networks. Unfortunately, the prospect of higher volume and higher value transactions attracts agents seeking to exploit or weaken the network by propagating bad information and services. This paper presents advantages and disadvantages of resource selection techniques based on peer reputation. We evaluate the effect of limited reputation information sharing on the efficiency and load distribution of a peer-to-peer system. We show that limited reputation sharing can reduce the number of failed transactions by a factor of 20.

References

  1. Amazon.com.http://www.amazon.com/.Google ScholarGoogle Scholar
  2. R. Axelrod. The Evolution of Cooperation. Basic Books,1984.Google ScholarGoogle Scholar
  3. B. F. Cooper and H. Garcia-Molina. Peer to peer data trading to preserve information.ACM TOIS, April 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. F. Cornelli, E. Damiani, and S. D. Capitani. Choosing reputable servents in a p2p network. In Proc. of the 11th International World Wide Web Conference, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. E. Damiani, D. C. di Vimercati, S. Paraboschi, P. Samarati, and F. Violante. A reputation-based approach for choosing reliable resources in peer-to-peer networks.In Proceedings of the 9th ACM conference on Computer and communications security, pages 207--216.ACM Press,2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. R. Dingledine, M. J. Freedman, D. Hopwood, and D. Molnar. A reputation system to increase MIX-net reliability. Lecture Notes in Computer Science, 2137:126+,2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. J. R. Douceur. The Sybil Attack. In Proc. of the International Workshop on Peer-to-Peer Systems, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. eBay -The World's Online Marketplace. http://www.ebay.com/.Google ScholarGoogle Scholar
  9. M. Faloutsos, P. Faloutsos, and C. Faloutsos. On power-law relationships of the internet topology. In SIGCOMM,pages 251--262,1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. E. Friedman and P. Resnick. The social cost of cheap pseudonyms.Journal of Economics and Management Strategy 10,(2):173--199,1998.Google ScholarGoogle ScholarCross RefCross Ref
  11. M. Gupta, P. Judge, and M. Ammar.A reputation system for peer-to-peer networks. In ACM 13th International Workshop on Network and Operating Systems Support for Digital Audio and Video ,2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. B. Horne, B. Pinkas, and T. Sander. Escrow services and incentives in peer-to-peer networks. In Proceedings of 3rd ACM Conference on Electronic Commerce, 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. B. A. Huberman and F. Wu. The dynamics of reputations. www.hpl.hp.com/shl/papers/reputations/,2002.Google ScholarGoogle Scholar
  14. R. Jurca and B. Faltings. Towards incentive-compatible reputation management. In Proceedings of the AAMAS 2002 Workshop on Deception,Fraud and Trust in Agent Societies. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. S. D. Kamvar, M. T. Schlosser, and H. Garcia-Molina. The eigentrust algorithm for reputation management in p2p networks. In Proceedings of the Twelfth International World Wide Web Conference ,2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. K. Lai, M. Feldman, I. Stoica, and J. Chuang. Incentives for cooperation in peer-to-peer networks. In Workshop on Economics of Peer-to-Peer Systems, 2003.Google ScholarGoogle Scholar
  17. P. Maniatis, M. Roussopoulos, T. Giuli, D. S. H. Rosenthal, M. Baker, and Y. Muliadi. Preserving peer replicas by rate-limited sampled voting. In 19th ACM Symposium on Operating Systems Principles (SOSP 2003),2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. R. Marimon, J. Nicolini, and P. Teles. Competition and reputation. In Proceedings of the World Conference Econometric Society ,2000.Google ScholarGoogle Scholar
  19. S. Marti and H. Garcia-Molina. Identity crisis: Anonymity vs.reputation in p2p systems.In IEEE 3rd International Conference on Peer-to-Peer Computing (P2P 2003). Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. S. Marti and H. Garcia-Molina. Examining metrics for reputation systems (in progress). Technical report, 2003. dbpubs.stanford.edu/pub/2003-39.Google ScholarGoogle Scholar
  21. L. Page, S. Brin, R. Motwani, and T. Winograd. The PageRank citation ranking: Bringing order to the web.Technical report, Stanford Digital Library Technologies Project, 1998.Google ScholarGoogle Scholar
  22. K. Ranganathan, M. Ripeanu, A. Sarin,and I. Foster. To share or not to share: An analysis of incentives to contribute in collaborative file sharing environments. In Workshop on Economics of Peer-to-Peer Systems, 2003.Google ScholarGoogle Scholar
  23. S. Saroiu, P. K. Gummadi, and S. D. Gribble. A measurement study of peer-to-peer .le sharing systems. In Proceedings of Multimedia Computing and Networking 2002 (MMCN '02), San Jose, CA, USA, January 2002.Google ScholarGoogle Scholar
  24. K. Sripanidkulchai. The popularity of gnutella queries and its implications on scalability. Featured on O'Reilly's www.openp2p.com website, February 2001.Google ScholarGoogle Scholar
  25. B. Yang and H. Garcia-Molina. Comparing hybrid peer-to-peer systems (extended). Technical report, 2000.Google ScholarGoogle Scholar
  26. B. Yang and H. Garcia-Molina. Ppay: Micropayments for peer-to-peer systems. In Proceedings of the 10th ACM Conference on Computer and Communications Security (CCS), 2003. Washington D.C. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Limited reputation sharing in P2P systems

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Conferences
        EC '04: Proceedings of the 5th ACM conference on Electronic commerce
        May 2004
        278 pages
        ISBN:1581137710
        DOI:10.1145/988772

        Copyright © 2004 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 17 May 2004

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • Article

        Upcoming Conference

        EC '24
        The 25th ACM Conference on Economics and Computation
        July 8 - 11, 2024
        New Haven , CT , USA

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader