Stature System Protocols for Peer to Peer Networks: A Survey

Authors

  • Thadani A Department of Computer Engineering, Hasmukh Goswami College of Engineering, Vehlal
  • Gupta VK Department of Computer Engineering, Hasmukh Goswami College of Engineering, Vehlal
  • Rajput I Department of Computer Engineering, Hasmukh Goswami College of Engineering, Vehlal

Keywords:

peer to peer network, privacy preserving, stature system

Abstract

There are various websites presently used by us so the situation arises where people transact with unknown agents and take decision for these agents for by considering the stature score. Central idea of this paper is to compare online stature reporting systems that are particularly suitable for the peer to peer network but uses different approaches for calculating the stature of an entity. This paper describes the working of these stature systems, their properties and various parameters advantages and disadvantages. Finally, it concludes by comparison of all these stature system protocols.

References

Mui, Lik, MojdehMohtashemi, and Ari Halbersta dt., A computational model of trust and reputation.,System Sciences, 2002. HICSS. Proceedings of the 35th Annual Hawaii International Conference on. IEEE, 2002.

Jøsang, Audun, Roslan Ismail, and Colin Boyd. A survey of trust and reputation systems for online service provision, Decision support systems 43.2 (2007): 618-644.

Hoffman, Kevin, David Zage, and Cristina NitaRotaru., A survey of attack and defense techniques for reputation systems. ACM Computing Surveys (CSUR) 42.1 (2009): 1.

Jøsang, Audun, and Roslan Ismail,The beta reputation system, Proceedings of the 15th bled electronic commerce conference. 2002.

Clifton, Chris, et al,Tools for privacy preserving distributed data mining.ACM SIGKDD Explorations Newsletter 4.2 (2002): 28-34.

B. Schneier, Applied Cryptography. John Wiley & Sons,2nd edition, 1995.

Gupta, Minaxi, Paul Judge, and MostafaAmmar., A reputation system for peer-to-peer networks, Proceedings of the 13th international workshop on Network and operating systems support for digital audio and video. ACM, 2003.

Zhou, Runfang, and Kai Hwang, Powertrust: A robust and scalable reputation system for trusted peer-to-peer computing, Parallel and Distributed Systems, IEEE Transactions on18.4 ,2007.

I. Stoica, R. Morris, D. Nowell, D.Karger, M. Kaashoek, F. Dabek, and H. Balakrishnan, Chord: A Scalable Peer-to-Peer Lookup Protocol

for Internet applications”, Proceedings ofACM SIGCOMM, SanDiego, Aug. 2001.

Downloads

Published

2024-02-26

How to Cite

Thadani, A., Gupta, V., & Rajput, I. (2024). Stature System Protocols for Peer to Peer Networks: A Survey. COMPUSOFT: An International Journal of Advanced Computer Technology, 3(12), 1386–1396. Retrieved from https://ijact.in/index.php/j/article/view/240

Issue

Section

Review Article

Similar Articles

1 2 3 4 5 6 7 8 9 10 > >> 

You may also start an advanced similarity search for this article.