Evaluating Reputation Systems for Document Authenticity

نویسندگان

  • Neil Daswani
  • Philippe Golle
  • Sergio Marti
  • Hector Garcia-Molina
  • Dan Boneh
چکیده

Few P2P file-sharing networks developed to date have successfully provided mechanisms to ensure the authenticity of documents delivered to clients. For example, when a P2P client receives a hit for “Origin of Species,” the client currently has no assurance that the corresponding downloaded document is an authentic copy of Charles Darwin’s work. The document could be a “decoy” and could contain the content of the book by Charles Darwin with several key passages altered. The document might even be a different work entirely that advocates creationism. Even worse, the client has no way to tell if the downloaded document might be a newly deployed virus. We call the problem of determining whether a document is authentic the document authenticity problem.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Thwarting P2P Pollution Using Object Reputation

This paper describes Credence, a distributed object reputation management scheme for combating content pollution in peer-to-peer filesharing systems. Credence enables honest peers to assess the authenticity of online content by securely tabulating and managing endorsements from other peers. Credence employs a novel voter correlation scheme to weight peer opinions, which gives rise to favorable ...

متن کامل

Identifying Collusion Attack in P2P Trust and Reputation Systems

Internet became today a medium of sharing large amount of data among different nodes situated anywhere in the world. Due to its fairly open nature Peer to Peer applications gain-ing popularity in sharing of large data rather then conventional client-server systems. Many P2P applications has been designed for the purpose of content distribution over Internet and most of them are based on decentr...

متن کامل

A collusion mitigation scheme for reputation systems

Reputation management systems are in wide-spread use to regulate collaborations in cooperative systems. Collusion is one of the most destructive malicious behaviors in which colluders seek to affect a reputation management system in an unfair manner. Many reputation systems are vulnerable to collusion, and some model-specific mitigation methods are proposed to combat collusion. Detection of col...

متن کامل

An Introduction to the Literature on Online Reputation Systems for the MMAPPS project

This document provides an introduction to the research literature on online reputation systems. It has been written with a view to providing background and context for MMAPPS system design plans and is therefore focused on distributed systems. There is a companion annotated bibliography of summary and reading notes for many of the articles discussed in this document in the accompanying References.

متن کامل

Research on service reputation evaluation method based on cloud model

With the increasingly evident advantages of service-oriented software architecture, Web service received widespread attention, and the numbers of Web Services are increasing constantly. It is more difficult to select high-quality Web service that meets user requirements. Because traditional service reputation evaluation approaches cannot ensure the authenticity and reliability of user ratings, ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2003