Modern Framework for P2P Integrated Systems over Trust Model for Self-Organizing Nodes

  IJCTT-book-cover
 
International Journal of Computer Trends and Technology (IJCTT)          
 
© 2014 by IJCTT Journal
Volume-18 Number-3
Year of Publication : 2014
Authors : A. Sarath Chaitanya , K.Govardhan Babu , Abdul Vahed

MLA

A. Sarath Chaitanya , K.Govardhan Babu , Abdul Vahed "Modern Framework for P2P Integrated Systems over Trust Model for Self-Organizing Nodes". International Journal of Computer Trends and Technology (IJCTT) V18(3):120-124, Dec 2014. ISSN:2231-2803. www.ijcttjournal.org. Published by Seventh Sense Research Group.

Abstract -
The open nature of the peer-to-peer systems exposes them to malicious actions. Here in this paper we introdusing distributed algorithms that can enable peer to get the trustworthiness of other peers based on interactions of those peers in the past with other peers. The peers in the network are able of creating a trust network on their own proximity by the help of the local information it already have with it and without trying to learn any global trust information. The contexts of the trust, recommendation and service contexts are defined for measuring the trustworthiness in providing services to the other peers and giving recommendations about the other peers. Interactions done with other peers and recommendation about other peers are evaluated based upon the recentness of the information, importance and the satisfaction of the peer parameters. As the satisfaction of the peer is also considered as the most vital one because the recommendation will be always based upon the satisfaction of the peer that is a peer will recommend any other peer only if it is satisfied by the interaction with that peer. In addition to this the recommender’s trust worthiness about a recommendation given about a peer will be considered important while evaluating the recommendations. While moving with the simulation experiments on file sharing application it showed that this proposed trust model can reduce attacks on nearly 16 different types of behaviour models. In these experiments we see that good peers were able to form trust relationships in their own proximity and are able of isolating the untrusted peers

References
[1] A. C. Weaver and M. W. Condtry, “Distributing Internet Services to The Networks Edge”, IEEE Trans. Ind. Electron., vol. 50, no. 3, pp. 404-411, Jun. 2003.
[2] L. Barolli and F. Xhafa, “JXTA-OVERLAY: A P2P Platform for Distributed, Collaborative and Ubiquitous Computing”, IEEE Trans. Ind. Electron., vol. 58, no. 6, pp. 2163-2172, Oct. 2010.
[3] L. Lamport, “Password Authentication with Insecure Communication”, Commun. ACM, vol. 24, no. 11, pp. 770-772, Nov. 1981.
[4] F. Bao, R. H. Deng, “Privacy Protection for Transactions of Digital Goods”, Proceedings of the Third International Conference on Information and Communications Security (ICICS ’01), Springer-Verlag, London, UK, pp. 202-213.
[6] W. B. Lee and C. C. Chang, “User Identification and Key Distribution Maintaining Anonymity for Distributed Computer Networks”, Computer Systems Science and Engineering, vol. 15, no. 4, pp. 113-116, 2000.
[7] T.-S.Wu and C.-L. Hsu, “Efficient User Identification SchemePerspective,” Proc. 32nd ACM Symp. Theory of Computing, 2000.
[8] S. Saroiu, P. Gummadi, and S. Gribble, “A Measurement Study of Peer-to-Peer File Sharing Systems,” Proc. Multimedia Computing and Networking, 2002.

Keywords
Trust Model, Peer-to-peer Systems, trust management