120 likes | 284 Views
P2P Reputation Management Using Distributed Identities and Decentralized Recommendation Chains. Authors: P. Dewan and P. Dasgupta Source: IEEE Transactions on Knowledge and Data Engineering, vol. 22, no. 7, pp. 1000-1013, 2010 Speaker: Shu-Fen Chiou ( 邱淑芬 ). Outline . Introduction
E N D
P2P Reputation Management Using Distributed Identities and Decentralized Recommendation Chains Authors: P. Dewan and P. Dasgupta Source: IEEE Transactions on Knowledge and Data Engineering, vol. 22, no. 7, pp. 1000-1013, 2010 Speaker: Shu-Fen Chiou (邱淑芬)
Outline • Introduction • Proposed method • Experimental results • Conclusions • Comments
abc.mp3 REC: -0.5 abc.mp3 7 REC: 0.3 8 abc.mp3 REC: 0.65 REC: 0.6 6 4 5 3 2 1 Query abc.mp3 De-centralized P2P Architecture
REC=0.3-> 0.8 8 False transaction 8’ 8’ 8’ 8’ 8’ Problem abc.mp3 REC: -0.5 abc.mp3 7 REC: 0.3 REC: 0.8 8 abc.mp3 REC: 0.6 liar farms 6 4 5 3 2 1 Query abc.mp3
Contributions • A self-certification-based identity system protected by cryptographically blind identity mechanisms. • A light weight and simple reputation model. • An attack resistant cryptographic protocol for generation of authentic global reputation information of a peer.
Proposed method CA Request certificate Get list and decide the provider with the highest reputation Search file or service P Verify, get file or service, and feedback reputation (Recommend)
Proposed method • Certification request PK1, PK2 AK1, AK2 Peer (P) Authority (A) B1, IAlice B1={EBKa(IAliceτ)} B2=EAK2{EBKa(IAliceτ)} B2 EAK2{IAliceτ}={EBKa{B2}}
Proposed method RK1, RK2 PK1, PK2 Requester (R) Provider (P) RTS, IDR IDP, TID, EPK2(H(TID||RTS)) Search for network: Search(PK1||TID) LTID=Max(Search(PK1||TID)) Check LTID<TID Past Recommendation Request, r CHAIN, EPK2(CHAIN) Verify CHAIN file or service B1 B1=EBKa(REC||TID||ERK2{H(REC||TID)}) B1||EPK2(H(B1),nonce), nonce verify Decrypt B1 Ka Stores: (IDR, {REC||TID||ERK2{H(REC||TID)}})
Conclusions • Presents self-certification, an identity management mechanism, reputation model, and a cryptographic protocol. • The self-certification-based identity generation mechanism reduces the threat of liar farms.