Identity Systematizing Conviction Model For Peer To Peer Systems

Durga Bhavani K, Rajesh A

Abstract


Open nature of peer-to-peer systems exposes them to malicious activity. Building trust relationships among peers can mitigate attacks of malicious peers. Peer to peer network is decentralized and distributed network, which is useful for file sharing via internet. Due to malicious activity, still it is insecure during file sharing. Depending on the past interaction and their recommendation, trustworthiness of a peer can be build. In order to measure the trustworthiness, two constraints are considered namely, services and recommendations. Peer to peer is an advanced computer networking where all computers contribute to equivalent task for processing data. A Peer to peer network can be an ad hoc connection in which a pair of computers attached by means of a universal serial bus to transmit files. Security is not much effective in this type of systems it is because if the connections are not fixed to the computers appropriately then there will be difficulty in accessing certain files and the relationship is untrusted. Hence security in peer to peer systems is complex since disputes are created by lack of integrated authority. This paper presents distributed algorithms that enable a peer to reason about trustworthiness of other peers based on past interactions and recommendations. Peers create their own trust network in their proximity by using local information available and do not try to learn global trust information. Two contexts of trust, service, and recommendation contexts, are defined to measure trustworthiness in providing services and giving recommendations.


Keywords


Peer to Peer, Reputation, Trust management, security.

References


AhmetBurakCan and Bharat(2013),‟A Self-Organizing Trust Model for Peer-to-Peer Systems‟IEEE Trans.Dependable and Secure Computing,vol 10,No.1.

Aberer.K and Despotovic.Z(2001), „Managing Trust in a Peer-2-Peer Information System‟ Proc. 10th Intl Conf. Information and Knowledge Management (CIKM).

Kamvar.S, Schlosser.M, and Garcia-Molina.H,(2003) „The (Eigentrust) Algorithm for Reputation Management in P2P Networks‟ Proc. 12th World Wide Web Conf. (WWW).

SelcukA.A ,Uzun.E, and Pariente.M.R(2004), „A Reputation-Based Trust Management System for P2P Networks‟ Proc. IEEE/ACM Fourth Int‟l Symp. Cluster Computing and the Grid (CCGRID).

Zhou. R, Hwang. K, and Cai. M(2008), „Gossiptrust for Fast Reputation Aggregation in Peer-to-Peer Networks‟ IEEE Trans. Knowledge and Data Eng., vol. 20, no. 9.

Abdul-Rahman. A and Hailes.S(2008), „Supporting Trust in Virtual Communities‟ Proc. 33rd Hawaii Int‟l Conf. System Sciences (HICSS).

Yu. B and Singh.M(2000), „A Social Mechanism of Reputation Management in Electronic Communities‟ Proc. Cooperative Information Agents (CIA)


Full Text: PDF [Full Text]

Refbacks

  • There are currently no refbacks.


Copyright © 2013, All rights reserved.| ijseat.com

Creative Commons License
International Journal of Science Engineering and Advance Technology is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJSEat , Permissions beyond the scope of this license may be available at http://creativecommons.org/licenses/by/3.0/deed.en_GB.