Implementation of unconstitutional approach model for P2P

Authors

  • Kalagatla SD Department of Computer Engineering, Caledonian College of Engineering, Muscat, Sultanate of OMAN
  • Vadlamudi M Department of Computer Science Engineering, Narayana Engineering College, Nellore, Andhra Pradesh, INDIA

Keywords:

Land unconstitutional, security, P2P

Abstract

An open nature of peer-to-peer systems exposes to malicious activity. Peers can mitigate attacks of malicious peers to develop trust relationships. This report presents the distributed algorithms are enable a peer to trustworthiness of other peers. Based on available information (from local network), peers are created their own trust network in their proximity and do not receive any information from global trust relationships. Based on trust, service, and recommendation contexts are used to measure trustworthiness for providing services and giving recommendations. To evaluate the interactions and recommendations based on importance, recentness and peer satisfaction parameters. While evaluating the recommendations from the recommender’s are considered. To simulate experimentally on file sharing application shows that the proposed model can mitigate attacks on 16 different malicious behaviour models, good peers were able to form trust relationships in their proximity and isolate malicious peers.

References

K. Aberer and Z. Despotovic. Managing Trust in Peer-2-Peer Information Systems. Proceeding of the 10th International conference on Information and knowledge management, 310–317, 2001. doi:10.1145/502585.502638.

K. Hoffman, D. Zage, and C. Nita-Rotaru. A survey of Attack and Defense Techniques for Reputation Systems. ACM Computing Surveys (CSUR), 42 (1), 1, 2009.

F. Cornelli, E. Damiani, S.D.C. Vimercati, S. Paraboschi and P. Samarati. Choosing reputable servents in P2P network. Proceedings of 11th International Conference on World Wide Web (WWW’02), 376–386, 2002. doi:10.1145/511446.511496

W. W. Smari, P. Clemente and F.L. Jean. An extended attribute based access control model with trust and privacy: Application to a collaborative crisis management system. Future Generation Computer System, 31, 147–168, 2014

Sai Divya Kalagatla, B. Ramana Reddy and Y. Mohana Roopa, “UAMPP: Unauthorized Access Model for Peerto-Peer System”. International Journal of Advanced Computational Engineering and Networking, Vol. 2 , No . 1 2 , (2014) pp 3 8 -42.

Downloads

Published

2024-02-26

How to Cite

Kalagatla, S., & Vadlamudi, M. (2024). Implementation of unconstitutional approach model for P2P. COMPUSOFT: An International Journal of Advanced Computer Technology, 6(07), 2368–2372. Retrieved from https://ijact.in/index.php/j/article/view/409

Issue

Section

Original Research Article

Similar Articles

<< < 3 4 5 6 7 8 9 10 11 > >> 

You may also start an advanced similarity search for this article.