{"title":"A New Trust Management Model in P2P Systems","authors":"S. Moalla, Sana Hamdi, Bruno Defude","doi":"10.1109/SITIS.2010.48","DOIUrl":null,"url":null,"abstract":"The Peer-to-Peer systems (P2P) are a center of interest in the community of distributed systems, since their advantages in the adaptability and the robustness with regard to the traditional architectures client / server. Unfortunately, the anonymous and open nature of these systems involves an almost impossible surveillance of the network and offers nearly an ideal environment for the spread of the inauthentic files. To offer a more extensive vision of the network and to limit the malicious interactions between different peers of the network, we present a new model of trust management that considers the direct trust based on the peer’s history of uploads and the indirect trust which is calculated after constructing trust paths.","PeriodicalId":128396,"journal":{"name":"2010 Sixth International Conference on Signal-Image Technology and Internet Based Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2010-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"11","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2010 Sixth International Conference on Signal-Image Technology and Internet Based Systems","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/SITIS.2010.48","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 11
Abstract
The Peer-to-Peer systems (P2P) are a center of interest in the community of distributed systems, since their advantages in the adaptability and the robustness with regard to the traditional architectures client / server. Unfortunately, the anonymous and open nature of these systems involves an almost impossible surveillance of the network and offers nearly an ideal environment for the spread of the inauthentic files. To offer a more extensive vision of the network and to limit the malicious interactions between different peers of the network, we present a new model of trust management that considers the direct trust based on the peer’s history of uploads and the indirect trust which is calculated after constructing trust paths.