{"id":"https://openalex.org/W2166817291","doi":"https://doi.org/10.1109/p2p.2015.7328527","title":"Sociallink: utilizing social network and transaction links for effective trust management in P2P file sharing systems","display_name":"Sociallink: utilizing social network and transaction links for effective trust management in P2P file sharing systems","publication_year":2015,"publication_date":"2015-09-01","ids":{"openalex":"https://openalex.org/W2166817291","doi":"https://doi.org/10.1109/p2p.2015.7328527","mag":"2166817291"},"language":"en","primary_location":{"id":"doi:10.1109/p2p.2015.7328527","is_oa":false,"landing_page_url":"https://doi.org/10.1109/p2p.2015.7328527","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2015 IEEE International Conference on Peer-to-Peer Computing (P2P)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100447188","display_name":"Kang Chen","orcid":"https://orcid.org/0000-0002-2376-2898"},"institutions":[{"id":"https://openalex.org/I110378019","display_name":"Southern Illinois University Carbondale","ror":"https://ror.org/049kefs16","country_code":"US","type":"education","lineage":["https://openalex.org/I110378019","https://openalex.org/I2801502357"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Kang Chen","raw_affiliation_strings":["Department of Electrical and Computer Engineering, Southern Illinois University, Carbondale, IL"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, Southern Illinois University, Carbondale, IL","institution_ids":["https://openalex.org/I110378019"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5102915554","display_name":"Guoxin Liu","orcid":"https://orcid.org/0000-0003-3525-6930"},"institutions":[{"id":"https://openalex.org/I8078737","display_name":"Clemson University","ror":"https://ror.org/037s24f05","country_code":"US","type":"education","lineage":["https://openalex.org/I8078737"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Guoxin Liu","raw_affiliation_strings":["Department of Electrical and Computer Engineering, Clemson University, Clemson, SC, USA"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, Clemson University, Clemson, SC, USA","institution_ids":["https://openalex.org/I8078737"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5064217355","display_name":"Haiying Shen","orcid":"https://orcid.org/0000-0002-7681-6255"},"institutions":[{"id":"https://openalex.org/I8078737","display_name":"Clemson University","ror":"https://ror.org/037s24f05","country_code":"US","type":"education","lineage":["https://openalex.org/I8078737"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Haiying Shen","raw_affiliation_strings":["Department of Electrical and Computer Engineering, Clemson University, Clemson, SC, USA"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, Clemson University, Clemson, SC, USA","institution_ids":["https://openalex.org/I8078737"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5101887977","display_name":"Fang Qi","orcid":"https://orcid.org/0000-0003-2227-9340"},"institutions":[{"id":"https://openalex.org/I8078737","display_name":"Clemson University","ror":"https://ror.org/037s24f05","country_code":"US","type":"education","lineage":["https://openalex.org/I8078737"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Fang Qi","raw_affiliation_strings":["Department of Electrical and Computer Engineering, Clemson University, Clemson, SC, USA"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, Clemson University, Clemson, SC, USA","institution_ids":["https://openalex.org/I8078737"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5100447188"],"corresponding_institution_ids":["https://openalex.org/I110378019"],"apc_list":null,"apc_paid":null,"fwci":8.1971,"has_fulltext":false,"cited_by_count":12,"citation_normalized_percentile":{"value":0.96955142,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"10"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10742","display_name":"Peer-to-Peer Network Technologies","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.811612606048584},{"id":"https://openalex.org/keywords/database-transaction","display_name":"Database transaction","score":0.750751256942749},{"id":"https://openalex.org/keywords/collusion","display_name":"Collusion","score":0.7149477005004883},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6371785402297974},{"id":"https://openalex.org/keywords/file-sharing","display_name":"File sharing","score":0.6153973340988159},{"id":"https://openalex.org/keywords/reputation","display_name":"Reputation","score":0.6147168278694153},{"id":"https://openalex.org/keywords/transaction-processing","display_name":"Transaction processing","score":0.5165983438491821},{"id":"https://openalex.org/keywords/trust-management","display_name":"Trust management (information system)","score":0.49318140745162964},{"id":"https://openalex.org/keywords/social-network","display_name":"Social network (sociolinguistics)","score":0.4840628206729889},{"id":"https://openalex.org/keywords/distributed-transaction","display_name":"Distributed transaction","score":0.4422603249549866},{"id":"https://openalex.org/keywords/ssh-file-transfer-protocol","display_name":"SSH File Transfer Protocol","score":0.4408166706562042},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.41880926489830017},{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.4173208773136139},{"id":"https://openalex.org/keywords/file-system","display_name":"File system","score":0.359144389629364},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.3281599283218384},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.23771417140960693},{"id":"https://openalex.org/keywords/self-certifying-file-system","display_name":"Self-certifying File System","score":0.1976054608821869},{"id":"https://openalex.org/keywords/social-media","display_name":"Social media","score":0.18492701649665833},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.1590019166469574},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.1359727680683136},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.13241329789161682}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.811612606048584},{"id":"https://openalex.org/C75949130","wikidata":"https://www.wikidata.org/wiki/Q848010","display_name":"Database transaction","level":2,"score":0.750751256942749},{"id":"https://openalex.org/C2781198186","wikidata":"https://www.wikidata.org/wiki/Q701521","display_name":"Collusion","level":2,"score":0.7149477005004883},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6371785402297974},{"id":"https://openalex.org/C551386961","wikidata":"https://www.wikidata.org/wiki/Q22666","display_name":"File sharing","level":3,"score":0.6153973340988159},{"id":"https://openalex.org/C48798503","wikidata":"https://www.wikidata.org/wiki/Q877546","display_name":"Reputation","level":2,"score":0.6147168278694153},{"id":"https://openalex.org/C72108876","wikidata":"https://www.wikidata.org/wiki/Q844565","display_name":"Transaction processing","level":3,"score":0.5165983438491821},{"id":"https://openalex.org/C2776384856","wikidata":"https://www.wikidata.org/wiki/Q17145767","display_name":"Trust management (information system)","level":2,"score":0.49318140745162964},{"id":"https://openalex.org/C4727928","wikidata":"https://www.wikidata.org/wiki/Q17164759","display_name":"Social network (sociolinguistics)","level":3,"score":0.4840628206729889},{"id":"https://openalex.org/C25185021","wikidata":"https://www.wikidata.org/wiki/Q4053284","display_name":"Distributed transaction","level":4,"score":0.4422603249549866},{"id":"https://openalex.org/C88520388","wikidata":"https://www.wikidata.org/wiki/Q1126823","display_name":"SSH File Transfer Protocol","level":4,"score":0.4408166706562042},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.41880926489830017},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.4173208773136139},{"id":"https://openalex.org/C2780940931","wikidata":"https://www.wikidata.org/wiki/Q174989","display_name":"File system","level":2,"score":0.359144389629364},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.3281599283218384},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.23771417140960693},{"id":"https://openalex.org/C82820731","wikidata":"https://www.wikidata.org/wiki/Q2640620","display_name":"Self-certifying File System","level":3,"score":0.1976054608821869},{"id":"https://openalex.org/C518677369","wikidata":"https://www.wikidata.org/wiki/Q202833","display_name":"Social media","level":2,"score":0.18492701649665833},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.1590019166469574},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.1359727680683136},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.13241329789161682},{"id":"https://openalex.org/C144024400","wikidata":"https://www.wikidata.org/wiki/Q21201","display_name":"Sociology","level":0,"score":0.0},{"id":"https://openalex.org/C36289849","wikidata":"https://www.wikidata.org/wiki/Q34749","display_name":"Social science","level":1,"score":0.0},{"id":"https://openalex.org/C40700","wikidata":"https://www.wikidata.org/wiki/Q1411783","display_name":"Industrial organization","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/p2p.2015.7328527","is_oa":false,"landing_page_url":"https://doi.org/10.1109/p2p.2015.7328527","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2015 IEEE International Conference on Peer-to-Peer Computing (P2P)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":41,"referenced_works":["https://openalex.org/W36943603","https://openalex.org/W641132676","https://openalex.org/W1513751655","https://openalex.org/W1650252156","https://openalex.org/W1982563029","https://openalex.org/W1994747310","https://openalex.org/W2016743875","https://openalex.org/W2036154348","https://openalex.org/W2049958314","https://openalex.org/W2064540034","https://openalex.org/W2079041580","https://openalex.org/W2104565120","https://openalex.org/W2105594609","https://openalex.org/W2109001163","https://openalex.org/W2115814729","https://openalex.org/W2117469071","https://openalex.org/W2121621358","https://openalex.org/W2147824439","https://openalex.org/W2153204928","https://openalex.org/W2156523427","https://openalex.org/W2156937700","https://openalex.org/W2157112940","https://openalex.org/W2165393831","https://openalex.org/W2165847233","https://openalex.org/W2199592881","https://openalex.org/W2295063687","https://openalex.org/W2432978112","https://openalex.org/W2520602384","https://openalex.org/W4254761308","https://openalex.org/W6601536704","https://openalex.org/W6630972833","https://openalex.org/W6636915500","https://openalex.org/W6645868275","https://openalex.org/W6659473181","https://openalex.org/W6663051864","https://openalex.org/W6670166031","https://openalex.org/W6682042974","https://openalex.org/W6682892775","https://openalex.org/W6683244469","https://openalex.org/W6697083065","https://openalex.org/W7055517062"],"related_works":["https://openalex.org/W2364250032","https://openalex.org/W2123909466","https://openalex.org/W2588999713","https://openalex.org/W2090136942","https://openalex.org/W590454891","https://openalex.org/W2371295991","https://openalex.org/W2169387894","https://openalex.org/W2368459272","https://openalex.org/W1568312998","https://openalex.org/W2382633788"],"abstract_inverted_index":{"Current":[0],"reputation":[1],"systems":[2,8],"for":[3],"peer-to-peer":[4],"(P2P)":[5],"file":[6,49,68,112,137,169],"sharing":[7,170],"either":[9],"fail":[10],"to":[11,85,96,135,139],"utilize":[12],"existing":[13],"trust":[14,34,75,100],"within":[15],"social":[16,41,54,79],"networks":[17,80],"or":[18],"suffer":[19],"from":[20],"certain":[21],"attacks":[22],"(e.g.,":[23],"free-riding":[24],"and":[25,43,56,113,141,154,166,171],"collusion).":[26],"To":[27],"handle":[28],"these":[29],"problems,":[30],"we":[31],"introduce":[32],"a":[33,57,105],"management":[35],"system,":[36],"called":[37],"SocialLink,":[38],"that":[39,160],"utilizes":[40],"network":[42,55,93,148],"historical":[44],"transaction":[45,60,69,92,147],"links.":[46],"SocialLink":[47,72,124,150,161],"manages":[48],"transactions":[50,128],"through":[51],"both":[52],"the":[53,74,90,99,102,110,116,119,145,173],"novel":[58],"weighted":[59,91,146],"network,":[61],"which":[62],"is":[63,94],"built":[64],"based":[65],"on":[66,104],"previous":[67],"history.":[70],"First,":[71],"exploits":[73],"among":[76],"friends":[77,84],"in":[78,107],"by":[81],"enabling":[82],"two":[83],"share":[86],"files":[87],"directly.":[88],"Second,":[89],"utilized":[95],"1)":[97],"deduce":[98],"of":[101,118],"client":[103],"server":[106],"reliably":[108],"providing":[109,130],"requested":[111],"2)":[114],"check":[115],"fairness":[117],"transaction.":[120],"In":[121],"this":[122],"way,":[123],"prevents":[125],"potential":[126],"misbehaving":[127],"(i.e.,":[129],"faulty":[131],"files),":[132],"encourages":[133],"nodes":[134],"contribute":[136],"resources":[138],"non-friends,":[140],"avoids":[142],"free-riding.":[143],"Furthermore,":[144],"helps":[149],"resist":[151,172],"whitewashing,":[152],"collusion":[153],"Sybil":[155],"attacks.":[156,175],"Extensive":[157],"simulation":[158],"demonstrates":[159],"can":[162],"efficiently":[163],"ensure":[164],"trustable":[165],"fair":[167],"P2P":[168],"aforementioned":[174]},"counts_by_year":[{"year":2021,"cited_by_count":3},{"year":2019,"cited_by_count":1},{"year":2018,"cited_by_count":2},{"year":2017,"cited_by_count":3},{"year":2016,"cited_by_count":2},{"year":2015,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
