Browse > Article
http://dx.doi.org/10.3745/KIPSTA.2005.12A.6.493

An Access Control using Reputation Information in P2P File Sharing System  

Shin Jung-Hwa (부경대학교 대학원 전자계산학과)
Shin Weon (동명정보대학교 정보보호학과)
Rhee Kyung-Hyune (부경대학교 전자컴퓨터정보통신공학부)
Abstract
P2P service is a method that can share various information through direct connection between computer of a person who have information and a Person who have information without server in the Internet and it is getting a lot of popularity by method for free ex change of file. P2P file sharing systems have become popular as a new paradigm for information exchange. Because all users who use service in P2P file sharing system can use shared files of several users freely by equal access privilege, it is happening the 'free rider' that only download shared file of other users without share own files. Although a user share a malicious file including virus, worm or file that have title differing with actuality contents, can use file sharing service without limitation. In this paper, we propose a method that restrict access of 'free rider' that only download using reputation information that indicate reliability of user. Also, we restrict usage ons hared file of other users about users who share harmful file.
Keywords
Peer-to-Peer; Reputation; Access Control; File Sharing System; Free Rider;
Citations & Related Records
Times Cited By KSCI : 1  (Citation Analysis)
연도 인용수 순위
1 Natalia Stakhanova, Sergio Ferrero, Johnny Wong, Ying Cai, 'A reputation-based trust management in peer-to-peer network systems,' In Proceedings of 17th International Conference on Parallel and Distributed Computing Systems, PDCS-2004
2 Krishna Kant, Ravi Iyer, Vijay Tewari, 'A Framework for Classifying Peer-to-Peer Technologies,' pp.368-375, CCGRID 2002   DOI
3 조남수, 김우환, 윤효진, 이인석, 천정희, 김태성, 진승헌, 추경균, 'P2P 환경의 자기 평판 관리 시스템', 정보보호학회논문지 , 제14권 제2호, pp.35-45, 2004. 4   과학기술학회마을
4 Nazareno Andrade, Miranda Mowbray, Walfredo Cirne, Franciso Brasileiro, 'When Can an Autonomous Reputation Scheme Discourage Free-riding in a Peer-to-Peer System?,' 2004 IEEE International Symposium on Cluster Computing and the Grid, pp.440-448, 2004   DOI
5 J.McLean, 'The Specification and Modeling of Computer Security,' IEEE Computer, Jan., 1990   DOI   ScienceOn
6 Emesto Damiani, De Capitani di Vimercati, Stefano Paraboschi, Pierangela Samarati, Fabio Violante, 'A Reputation-Based Approach for Choosing Reliable Resources in Peer-to-Peer Networks,' Conference on Computer and Communications Security archive Proceedings of the 9th ACM conference on Computer and communications security, pp.207-216, 2002   DOI
7 Huu Tran, Michael Hitchens, Vijay Varadharajan, Paul Watters, 'A Trust based Access Control Framework for P2P File-Sharing Systems,' HICSS 2005, pp.302c-311c, 2005   DOI
8 Sepandar D. Kamvar, Mario T. Schlosser, Hector Garcia-Molina, 'The EigenTrust Algorithm for Reputation Management in P2P Networks,' In Proceedings International WWW Conference, 2002
9 Fabrizio Comelli, Emesto Damiani, Sabrina De Capitani eli Vimercati, 'Choosing Reputable Servents in a P2P Network,' WWW2002, pp.376-386, 2002   DOI
10 Gnutella, http://www.gnutella.com
11 '세상을 바꾸는 힘의 중심 P2P', 프로그램 세계, 2002, 7월호
12 YangBin Tang, HuaiMin Wang, Wen Dou, 'Trust Based Incentive in P2P Network,' Proceeding of the IEEE International Conference on E-Commerce Technology for Dynamic E-Business, 2004   DOI
13 팀 오라일리 외 24인 저, 전현성 외 4인 역, '차세대 인터넷 P2P', O'RELLY, 2001
14 E.Adar and B.Huberman, 'Free riding on gnutella,' September 2000. Available at http://www.firstmonday.dk/issues/issue5_ l0/adar/index.html
15 Dejan S.Milojicic, Vana Kalogeraki, Rajan Lukose, Kiran Nagaraja, Jim Pruyne, Bruno RIchard, Sami Roolins, Zhichen Xu, 'Peer-to-Peer Computing,' HP TechReport HPL-2002-57, 2002. http://www.hpl.ph.com/techreports/2002/HPS-2002-57.pdf