TY - GEN
T1 - Evaluation of P2P search algorithms for discovering trust paths
AU - De Mello, Emerson Ribeiro
AU - Van Moorsel, Aad
AU - Da Silva Fraga, Joni
PY - 2007
Y1 - 2007
N2 - Distributed security models based on a 'web of trust' eliminate single points of failure and alleviate performance bottlenecks. However, such distributed approaches rely on the ability to find trust paths between participants, which introduces performance overhead. It is therefore of importance to develop trust path discovery algorithms that minimize such overhead. Since peer-to-peer (P2P) networks share various characteristics with the web of trust, P2P search algorithms can potentially be exploited to find trust paths. In this paper we systematically evaluate the application of P2P search algorithms to the trust path discovery problem. We consider the number of iterations required (as expressed by the TTL parameter) as well as the messaging overhead, for discovery of single as well as multiple trust paths. Since trust path discovery does not allow for resource replication (usual in P2P applications), we observe that trust path discovery is very sensitive to parameter choices in selective forwarding algorithms (such as K-walker), but is relatively fast when the underlying network topology is scale-free.
AB - Distributed security models based on a 'web of trust' eliminate single points of failure and alleviate performance bottlenecks. However, such distributed approaches rely on the ability to find trust paths between participants, which introduces performance overhead. It is therefore of importance to develop trust path discovery algorithms that minimize such overhead. Since peer-to-peer (P2P) networks share various characteristics with the web of trust, P2P search algorithms can potentially be exploited to find trust paths. In this paper we systematically evaluate the application of P2P search algorithms to the trust path discovery problem. We consider the number of iterations required (as expressed by the TTL parameter) as well as the messaging overhead, for discovery of single as well as multiple trust paths. Since trust path discovery does not allow for resource replication (usual in P2P applications), we observe that trust path discovery is very sensitive to parameter choices in selective forwarding algorithms (such as K-walker), but is relatively fast when the underlying network topology is scale-free.
KW - Peer-to-peer
KW - Trust paths
KW - Web of trust
UR - https://www.scopus.com/pages/publications/38149087595
U2 - 10.1007/978-3-540-75211-0_9
DO - 10.1007/978-3-540-75211-0_9
M3 - Conference contribution
AN - SCOPUS:38149087595
SN - 9783540752103
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 112
EP - 124
BT - Formal Methods and Stochastic Models for Performance Evaluation - Fourth European Performance Engineering Workshop, EPEW 2007, Proceedings
PB - Springer Verlag
T2 - 4th European Performance Engineering Workshop, EPEW 2007
Y2 - 27 September 2007 through 28 September 2007
ER -