Model and Design of System in Peer to Peer Network for Balanced Data Transfer

  IJCTT-book-cover
 
International Journal of Computer Trends and Technology (IJCTT)
 
© 2014 by IJCTT Journal
Volume-16 Number-2
Year of Publication : 2014
Authors : K. Sai Kanthi Siri , Bhaludra Raveendranadh Singh , Mahesh Akuthota , Moligi Sangeetha

MLA

K. Sai Kanthi Siri , Bhaludra Raveendranadh Singh , Mahesh Akuthota , Moligi Sangeetha. "Model and Design of System in Peer to Peer Network for Balanced Data Transfer". International Journal of Computer Trends and Technology (IJCTT) V16(2):54-58, Oct 2014. ISSN:2231-2803. www.ijcttjournal.org. Published by Seventh Sense Research Group.

Abstract -
Open nature of peer-to-peer systems exposes them to vindictive activity. Building trust relationships among peers can diminish attacks of vindictive peers. This paper presents distributed algorithms that entitle a peer to reason about trustworthiness of the other peers based on previous recommendations and interactions. Peers create their own trust network in their propinquity by using local information available and they do not try to learn global trust information. Two contexts of service, trust, and recommendation contexts, are defined to measure trustworthiness in providing the services and giving recommendations. Interactions and recommendations are assessed based on recentness, importance and peer satisfaction parameters. Additionally, recommender’s confidence and trustworthiness about a recommendation are considered while evaluating the recommendations. In this proposed system we are making a model by which the trustness and loyality of peer will maintain by peer itself .In this way the other peer will make communication with those peer who having high loyality and trustness with him. This trustness and loyality is made by older interaction and feedback of peers. This model will make every peer to make a information regarding his trustness and loyality to other peers. So peers can make connection to other peer with high trustness and loyalty. In this system we will also use cryptography technique to provide security to data in between communication Simulation experiment on a file sharing application shows that the proposed model can diminish attacks on 16 different malicious behavior models

References
[1]K. Hoffman, D. Zage, and C. Nita-Rotaru, “A Survey of Attack and Defense Techniques for Reputation Systems,” ACM Computing Surveys, vol. 42, no. 1, pp. 1:1-1:31, 2009.
[2] K. Aberer, A. Datta, and M. Hauswirth, “P-Grid: Dynamics of Self- Organization Processes in Structured P2P Systems,” Peer-to-Peer Systems and Applications, vol. 3845, 2005.
[3] S. Ratnasamy, P. Francis, M. Handley, R. Karp, and S. Shenker, “A Scalable Content-Addressable Network,” ACM SIGCOMM Computer Comm. Rev., vol. 31, no. 4, pp. 161-172, 2001.
[4] S. Song, K. Hwang, R. Zhou, and Y.-K. Kwok, “Trusted P2P Transactions with Fuzzy Reputation Aggregation,” IEEE Internet Computing, vol. 9, no. 6, pp. 24-34, Nov.-Dec. 2005.
[5] I. Stoica, R. Morris, D. Karger, M.F. Kaashoek, and H. Balakrishnan, “Chord: A Scalable Peer-to-Peer Lookup Service for Internet Applications,” ACM SIGCOMM Computer Comm. Rev., vol. 31, no. 4, pp. 149-160, 2001.
[6] R. Zhou and K. Hwang, “Powertrust: A Robust and Scalable Reputation System for Trusted Peer-to-Peer Computing,” IEEE Trans. Parallel and Distributed Systems, vol. 18, no. 4, pp. 460-473,Apr. 2007

Keywords
trust management, Peer-to-peer systems, security, and reputation.