{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T12:42:59Z","timestamp":1740141779705,"version":"3.37.3"},"reference-count":38,"publisher":"SAGE Publications","issue":"7","license":[{"start":{"date-parts":[[2014,7,1]],"date-time":"2014-07-01T00:00:00Z","timestamp":1404172800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/journals.sagepub.com\/page\/policies\/text-and-data-mining-license"}],"content-domain":{"domain":["journals.sagepub.com"],"crossmark-restriction":true},"short-container-title":["International Journal of Distributed Sensor Networks"],"published-print":{"date-parts":[[2014,7,1]]},"abstract":"<jats:p> File pollution is a recent security threat to peer-to-peer (P2P) file sharing systems. By disseminating numerous polluted files with mismatched or partially tampered contents in the P2P system, the attacker causes users to download unexpected files. This attack is aimed at frustrating users and making them abandon the system. Present researches on combating file pollution have mostly focused on pollution modeling or evaluating the extent of pollution. Only a few researches have proposed effective methods to eliminate pollution attacks, and they are primarily based on reputation systems and blacklisting mechanisms. However, these methods require exchange of significant feedback among the peers in order to identify the malicious peers or polluted files in the system. In this paper, we describe the application of fault-tolerant mechanism used in the redundant arrays of independent disks system to suppress file pollution attacks based on the concept that P2P file sharing systems currently have global file storage systems. We have extended the previously developed Fluid Model to analyze and evaluate the proposed antipollution mechanism. The model accuracy has been demonstrated by performing several simulation experiments; the proposed mechanism could effectively suppress the pollution and successfully decrease the polluted-time exposure of a P2P file sharing system by approximately 40\u223c60%. <\/jats:p>","DOI":"10.1155\/2014\/792407","type":"journal-article","created":{"date-parts":[[2014,7,7]],"date-time":"2014-07-07T21:07:13Z","timestamp":1404767233000},"page":"792407","update-policy":"https:\/\/doi.org\/10.1177\/sage-journals-update-policy","source":"Crossref","is-referenced-by-count":1,"title":["Application of Fault-Tolerant Mechanism to Reduce Pollution Attacks in Peer-to-Peer Networks"],"prefix":"10.1177","volume":"10","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-7448-1877","authenticated-orcid":false,"given":"Chien-Sheng","family":"Chen","sequence":"first","affiliation":[{"name":"Department of Information Management, Tainan University of Technology, Tainan 71002, Taiwan"}]},{"given":"Ting-Yuan","family":"Yeh","sequence":"additional","affiliation":[{"name":"Department of Engineering Science, National Cheng Kung University, Tainan 70000, Taiwan"}]},{"given":"Chin-Tan","family":"Lee","sequence":"additional","affiliation":[{"name":"Department of Electronic Engineering, National Quemoy University, Quemoy 89250, Taiwan"}]},{"given":"Chyuan-Der","family":"Lu","sequence":"additional","affiliation":[{"name":"Department of Finance, Tainan University of Technology, Tainan 71002, Taiwan"}]}],"member":"179","published-online":{"date-parts":[[2014,7,6]]},"reference":[{"first-page":"137","volume-title":"Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI \u201903)","author":"Good N. S.","key":"B1-2014-792407"},{"key":"B2-2014-792407","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2004.826277"},{"key":"B3-2014-792407","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-89828-5_9"},{"key":"B4-2014-792407","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2005.1498344"},{"key":"B5-2014-792407","doi-asserted-by":"publisher","DOI":"10.1145\/1064009.1064017"},{"key":"B6-2014-792407","doi-asserted-by":"publisher","DOI":"10.1145\/1244002.1244340"},{"key":"B7-2014-792407","doi-asserted-by":"publisher","DOI":"10.1145\/1141277.1141720"},{"key":"B8-2014-792407","doi-asserted-by":"publisher","DOI":"10.1145\/1177080.1177125"},{"key":"B9-2014-792407","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2006.232"},{"key":"B10-2014-792407","doi-asserted-by":"publisher","DOI":"10.1145\/1111322.1111339"},{"key":"B11-2014-792407","doi-asserted-by":"publisher","DOI":"10.1109\/GCC.2007.44"},{"first-page":"138","volume-title":"Proceedings of the ACM SIGCOMM Workshop on Economics of Peer-to-Peer Systems","author":"Walsh K.","key":"B12-2014-792407"},{"key":"B13-2014-792407","doi-asserted-by":"publisher","DOI":"10.1007\/11599593_1"},{"key":"B14-2014-792407","doi-asserted-by":"publisher","DOI":"10.1109\/12.364531"},{"key":"B15-2014-792407","doi-asserted-by":"publisher","DOI":"10.1145\/1140103.1140316"},{"key":"B16-2014-792407","doi-asserted-by":"publisher","DOI":"10.1145\/1326320.1326324"},{"key":"B17-2014-792407","doi-asserted-by":"publisher","DOI":"10.1145\/1071690.1064218"},{"key":"B18-2014-792407","doi-asserted-by":"publisher","DOI":"10.1109\/IPDPS.2008.4536253"},{"key":"B19-2014-792407","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2006.101"},{"key":"B20-2014-792407","doi-asserted-by":"publisher","DOI":"10.1109\/CCNC.2006.1593195"},{"key":"B21-2014-792407","first-page":"1","volume-title":"Proceedings of the International Workshop on Peer-to-Peer Systems","volume":"6","author":"Lee U."},{"key":"B22-2014-792407","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2009.06.004"},{"key":"B23-2014-792407","doi-asserted-by":"publisher","DOI":"10.1109\/ICDIM.2007.369248"},{"key":"B24-2014-792407","doi-asserted-by":"publisher","DOI":"10.1145\/1529282.1529288"},{"key":"B25-2014-792407","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.1635"},{"key":"B26-2014-792407","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2011.02.015"},{"key":"B27-2014-792407","doi-asserted-by":"publisher","DOI":"10.1137\/0108018"},{"first-page":"1","volume-title":"Proceedings of the 3rd USENIX Conference on File and Storage Technologies (FAST \u201904)","author":"Corbett P.","key":"B28-2014-792407"},{"key":"B29-2014-792407","doi-asserted-by":"publisher","DOI":"10.1109\/18.746809"},{"key":"B30-2014-792407","doi-asserted-by":"publisher","DOI":"10.1109\/18.782102"},{"key":"B31-2014-792407","doi-asserted-by":"publisher","DOI":"10.1109\/18.485722"},{"key":"B32-2014-792407","doi-asserted-by":"publisher","DOI":"10.1093\/ietfec\/e89-a.2.583"},{"key":"B33-2014-792407","doi-asserted-by":"publisher","DOI":"10.1093\/ietfec\/e89-a.2.592"},{"key":"B37-2014-792407","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2010.06.010"},{"key":"B38-2014-792407","doi-asserted-by":"publisher","DOI":"10.1117\/1.1388610"},{"key":"B39-2014-792407","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2008.11.040"},{"key":"B40-2014-792407","doi-asserted-by":"publisher","DOI":"10.1016\/j.cosrev.2012.01.002"},{"key":"B41-2014-792407","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2011.03.011"}],"container-title":["International Journal of Distributed Sensor Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/journals.sagepub.com\/doi\/pdf\/10.1155\/2014\/792407","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/journals.sagepub.com\/doi\/full-xml\/10.1155\/2014\/792407","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/journals.sagepub.com\/doi\/pdf\/10.1155\/2014\/792407","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,16]],"date-time":"2021-05-16T19:06:36Z","timestamp":1621191996000},"score":1,"resource":{"primary":{"URL":"http:\/\/journals.sagepub.com\/doi\/10.1155\/2014\/792407"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,7,1]]},"references-count":38,"journal-issue":{"issue":"7","published-print":{"date-parts":[[2014,7,1]]}},"alternative-id":["10.1155\/2014\/792407"],"URL":"https:\/\/doi.org\/10.1155\/2014\/792407","relation":{},"ISSN":["1550-1477","1550-1477"],"issn-type":[{"type":"print","value":"1550-1477"},{"type":"electronic","value":"1550-1477"}],"subject":[],"published":{"date-parts":[[2014,7,1]]}}}