Stature System Protocols for Peer to Peer Networks: A Survey
Keywords:
peer to peer network, privacy preserving, stature systemAbstract
There are various websites presently used by us so the situation arises where people transact with unknown agents and take decision for these agents for by considering the stature score. Central idea of this paper is to compare online stature reporting systems that are particularly suitable for the peer to peer network but uses different approaches for calculating the stature of an entity. This paper describes the working of these stature systems, their properties and various parameters advantages and disadvantages. Finally, it concludes by comparison of all these stature system protocols.
References
Mui, Lik, MojdehMohtashemi, and Ari Halbersta dt., A computational model of trust and reputation.,System Sciences, 2002. HICSS. Proceedings of the 35th Annual Hawaii International Conference on. IEEE, 2002.
Jøsang, Audun, Roslan Ismail, and Colin Boyd. A survey of trust and reputation systems for online service provision, Decision support systems 43.2 (2007): 618-644.
Hoffman, Kevin, David Zage, and Cristina NitaRotaru., A survey of attack and defense techniques for reputation systems. ACM Computing Surveys (CSUR) 42.1 (2009): 1.
Jøsang, Audun, and Roslan Ismail,The beta reputation system, Proceedings of the 15th bled electronic commerce conference. 2002.
Clifton, Chris, et al,Tools for privacy preserving distributed data mining.ACM SIGKDD Explorations Newsletter 4.2 (2002): 28-34.
B. Schneier, Applied Cryptography. John Wiley & Sons,2nd edition, 1995.
Gupta, Minaxi, Paul Judge, and MostafaAmmar., A reputation system for peer-to-peer networks, Proceedings of the 13th international workshop on Network and operating systems support for digital audio and video. ACM, 2003.
Zhou, Runfang, and Kai Hwang, Powertrust: A robust and scalable reputation system for trusted peer-to-peer computing, Parallel and Distributed Systems, IEEE Transactions on18.4 ,2007.
I. Stoica, R. Morris, D. Nowell, D.Karger, M. Kaashoek, F. Dabek, and H. Balakrishnan, Chord: A Scalable Peer-to-Peer Lookup Protocol
for Internet applications”, Proceedings ofACM SIGCOMM, SanDiego, Aug. 2001.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2014 COMPUSOFT: An International Journal of Advanced Computer Technology
This work is licensed under a Creative Commons Attribution 4.0 International License.
©2023. COMPUSOFT: AN INTERNATIONAL OF ADVANCED COMPUTER TECHNOLOGY by COMPUSOFT PUBLICATION is licensed under a Creative Commons Attribution 4.0 International License. Based on a work at COMPUSOFT: AN INTERNATIONAL OF ADVANCED COMPUTER TECHNOLOGY. Permissions beyond the scope of this license may be available at Creative Commons Attribution 4.0 International Public License.