Effective recommendation chains for large scale distributed decentralized P2P systems

Authors

  • Bhushan YB Dept. of Computer science and Engineering, Sri Venkateswara Engineering College, Suryapet

Keywords:

Security Model, Cryptographic Protocol

Abstract

The security model used for centralized systems is not suitable for P2P networks as it is centralized in nature. The security challenges in the P2P networks are secure reputation data management, availability of reputation data, Sybil attacks and identity management of peers. In this paper we present a cryptographic protocol for ensuring secure and timely availability of the reputation data of a peer extremely at low cost. We also investigate Reputation Systems for P2P networks more ambitious approach to protect the P2P network without using any central component, and thereby harnessing the full benefits of the P2P network. The results in the form of simulations reveal that the new cryptographic protocol is secure and efficient in a decentralized peer – to – peer network.

References

J. Douceure, ―The Sybil Attack‖, Proc, IPTPS ’02 Workshop, 2002.

A. Abdul-Rahman and S. Hailes, ―Supporting Trust in Virtual Communities‖, Proc. Hawaii Intl Conf. System Sciences, Jan 2000.

M. Gupta, P. Judge, and M. Ammar, ―A Reputation System for Peer-to-Peer Networks,‖Proc. 13th Int’l Workshop Network and Operating systems Support for Digital Audio and Video (NOSSDAV) , 2003.

L. Liu, S. Zhang, K.D. Ryu, and P. Dasgupta, ―R-Chain: A self Maintained Reputation Management System in p2p Networks,‖ Broc. 17th Int’l Conf. Parallel and Distributed Computing Systems (PDCS), Nov. 2004.

Prashant Dewan and Partha Dasgupta,‖ P2P reputation Exchange Protocol Using Distributed and Decentralized Recommendation Chains, IEEE Transaction on Knowledge and Data Engineering vol 22, No.7, July 2010.

H.Garett, ―Tragedy of Commons,‖ Science, vol.162, pp.1243-1248, 1968.

Downloads

Published

2024-02-26

How to Cite

Bhushan, Y. B. (2024). Effective recommendation chains for large scale distributed decentralized P2P systems. COMPUSOFT: An International Journal of Advanced Computer Technology, 2(09), 300–306. Retrieved from https://ijact.in/index.php/j/article/view/54

Issue

Section

Original Research Article

Similar Articles

1 2 3 4 5 6 7 8 9 10 > >> 

You may also start an advanced similarity search for this article.