Implementation of unconstitutional approach model for P2P
Keywords:
Land unconstitutional, security, P2PAbstract
An open nature of peer-to-peer systems exposes to malicious activity. Peers can mitigate attacks of malicious peers to develop trust relationships. This report presents the distributed algorithms are enable a peer to trustworthiness of other peers. Based on available information (from local network), peers are created their own trust network in their proximity and do not receive any information from global trust relationships. Based on trust, service, and recommendation contexts are used to measure trustworthiness for providing services and giving recommendations. To evaluate the interactions and recommendations based on importance, recentness and peer satisfaction parameters. While evaluating the recommendations from the recommender’s are considered. To simulate experimentally on file sharing application shows that the proposed model can mitigate attacks on 16 different malicious behaviour models, good peers were able to form trust relationships in their proximity and isolate malicious peers.
References
K. Aberer and Z. Despotovic. Managing Trust in Peer-2-Peer Information Systems. Proceeding of the 10th International conference on Information and knowledge management, 310–317, 2001. doi:10.1145/502585.502638.
K. Hoffman, D. Zage, and C. Nita-Rotaru. A survey of Attack and Defense Techniques for Reputation Systems. ACM Computing Surveys (CSUR), 42 (1), 1, 2009.
F. Cornelli, E. Damiani, S.D.C. Vimercati, S. Paraboschi and P. Samarati. Choosing reputable servents in P2P network. Proceedings of 11th International Conference on World Wide Web (WWW’02), 376–386, 2002. doi:10.1145/511446.511496
W. W. Smari, P. Clemente and F.L. Jean. An extended attribute based access control model with trust and privacy: Application to a collaborative crisis management system. Future Generation Computer System, 31, 147–168, 2014
Sai Divya Kalagatla, B. Ramana Reddy and Y. Mohana Roopa, “UAMPP: Unauthorized Access Model for Peerto-Peer System”. International Journal of Advanced Computational Engineering and Networking, Vol. 2 , No . 1 2 , (2014) pp 3 8 -42.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2017 COMPUSOFT: An International Journal of Advanced Computer Technology
This work is licensed under a Creative Commons Attribution 4.0 International License.
©2023. COMPUSOFT: AN INTERNATIONAL OF ADVANCED COMPUTER TECHNOLOGY by COMPUSOFT PUBLICATION is licensed under a Creative Commons Attribution 4.0 International License. Based on a work at COMPUSOFT: AN INTERNATIONAL OF ADVANCED COMPUTER TECHNOLOGY. Permissions beyond the scope of this license may be available at Creative Commons Attribution 4.0 International Public License.