Abstract

Peer-to-Peer systems enables the interactions of peers to accomplish tasks. Attacks of peers with malicious can be reduced by establishing trust relationship among peers. In this paper we presents algorithms which helps a peer to reason about trustworthiness of other peers based on interactions in the past and recommendations. Local information is used to create trust network of peers and does not need to deal with global information. Trustworthiness of peers in providing services can be describedby Service metric and recommendation metric. Parameters considered for evaluating interactions and recommendations are Recentness, Importance and Peer Satisfaction. Trust relationships helps a good peer to isolate malicious peers.

Highlights

  • In fuzzy trust system based on distributed hash table (DHT), each peer maintains transaction record table and local score table

  • In peer to peer systems individual machine can communicate with each others and share resources without dealing the central coordinator

  • Structure of P2P systems resolves management of trust information. In approaches such as distributed hash table (DHT), feedback storing about other peers which made peer as trust holder [1], [3], [4]

Read more

Summary

LITERATURE REVIEW

There are different models are described related to the protection in peer to peer environment. Mui et al [9] developed statistical model based on trust, reputation, and reciprocity. Song et al [11] suggests a fuzzy logic trust model that performs same as Eigntrust [13] but with lower message overhead. There are two major steps performed by the fuzzy system: Local score calculation and Global reputation aggregation. Local trust scores which are collected from all peers are aggregated by fuzzy system in order to generate global reputation for each peers. Fuzzy inference is used by the system to get global reputation aggregation weights. In fuzzy trust system based on DHT, each peer maintains transaction record table and local score table. When nodes are attached to the network, nodes sends message to interact with each other where message can be broadcasted in the network or backpropogated

INTRODUCTION
Oscillatory
CONCLUSION AND FUTURE WORK
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.