Effective recommendation chains for large scale distributed decentralized P2P systems
Keywords:
Security Model, Cryptographic ProtocolAbstract
The security model used for centralized systems is not suitable for P2P networks as it is centralized in nature. The security challenges in the P2P networks are secure reputation data management, availability of reputation data, Sybil attacks and identity management of peers. In this paper we present a cryptographic protocol for ensuring secure and timely availability of the reputation data of a peer extremely at low cost. We also investigate Reputation Systems for P2P networks more ambitious approach to protect the P2P network without using any central component, and thereby harnessing the full benefits of the P2P network. The results in the form of simulations reveal that the new cryptographic protocol is secure and efficient in a decentralized peer – to – peer network.
References
J. Douceure, ―The Sybil Attack‖, Proc, IPTPS ’02 Workshop, 2002.
A. Abdul-Rahman and S. Hailes, ―Supporting Trust in Virtual Communities‖, Proc. Hawaii Intl Conf. System Sciences, Jan 2000.
M. Gupta, P. Judge, and M. Ammar, ―A Reputation System for Peer-to-Peer Networks,‖Proc. 13th Int’l Workshop Network and Operating systems Support for Digital Audio and Video (NOSSDAV) , 2003.
L. Liu, S. Zhang, K.D. Ryu, and P. Dasgupta, ―R-Chain: A self Maintained Reputation Management System in p2p Networks,‖ Broc. 17th Int’l Conf. Parallel and Distributed Computing Systems (PDCS), Nov. 2004.
Prashant Dewan and Partha Dasgupta,‖ P2P reputation Exchange Protocol Using Distributed and Decentralized Recommendation Chains, IEEE Transaction on Knowledge and Data Engineering vol 22, No.7, July 2010.
H.Garett, ―Tragedy of Commons,‖ Science, vol.162, pp.1243-1248, 1968.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2013 COMPUSOFT: An International Journal of Advanced Computer Technology
This work is licensed under a Creative Commons Attribution 4.0 International License.
©2023. COMPUSOFT: AN INTERNATIONAL OF ADVANCED COMPUTER TECHNOLOGY by COMPUSOFT PUBLICATION is licensed under a Creative Commons Attribution 4.0 International License. Based on a work at COMPUSOFT: AN INTERNATIONAL OF ADVANCED COMPUTER TECHNOLOGY. Permissions beyond the scope of this license may be available at Creative Commons Attribution 4.0 International Public License.