Peer Discovery With Transitive Trust in Distributed System

Master Thesis (2017)
Author(s)

C. Luo (TU Delft - Electrical Engineering, Mathematics and Computer Science)

Contributor(s)

Johan Pouwelse – Mentor

Neil Yorke-Smith – Graduation committee member

J.S. Rellermeyer – Graduation committee member

Faculty
Electrical Engineering, Mathematics and Computer Science
Copyright
© 2017 Changliang Luo
More Info
expand_more
Publication Year
2017
Language
English
Copyright
© 2017 Changliang Luo
Graduation Date
20-10-2017
Awarding Institution
Delft University of Technology
Project
['Tribler']
Faculty
Electrical Engineering, Mathematics and Computer Science
Reuse Rights

Other than for strictly personal use, it is not permitted to download, forward or distribute the text or part of it, without the consent of the author(s) and/or copyright holder(s), unless the work is under an open content license such as Creative Commons.

Abstract

It is a common case that resources belong to different people who are distributed across the world. So, for making good use of resources, people have to cooperate with each other. Cooperation is important not only in the physical world but also in cyberspace. Computers holding different resources also need to cooperate with others. The problems that people cooperate with people and computers cooperate with computers can be abstracted into a high level one – peers cooperate with other peers in a network. In such problems, the first step to initiate a cooperation is loc-ating other peers – you can not cooperate with a peer when you are not even aware of its existence. The task to locate other peers is called “peer discovery”, it is not an easy task, especially in distributed fashion. Peers need to acquire information of other peers from somewhere, if there is not a central party, the only place to acquire such information is other peers. Malicious peers may provide toxic information to other peers. Therefore, unconditionally trust other peers is very dangerous. For security concern, peers need to find a way to decide who is trustworthy and who is not. This thesis aims to establish trust among peers basing on the historical behaviors of other peers. We believe that by using the established trust, a Peer-to-Peer system will be more resilient to Sybil Attack where attackers create a lot of fake identities to deceive honest peers. Our trust system will be implemented andtested in the peer discovery system of Tribler, which is a distributed system helping people share files.

Files

License info not available