Secure Trust Model for Peer to Peer Network

Authors

  • Bhandure R Computer Engineering, Pune University,India
  • Gujrathi S Computer Engineering, Pune University,India
  • Basumatary J Computer Engineering, Pune University,India
  • Padekar P Computer Engineering, Pune University,India
  • Shirsath R Computer Engineering, Pune University,India

Keywords:

Peer to Peer Systems, Trust Models, Trust Relationships, Reputation, Networking, Network Security

Abstract

The peer to peer network has open nature which leads to exposure of various malicious activities. To eradicate these malicious activities, peers can build trust relationships among them. This paper presents distributed algorithm that enable a peer to reason about trustworthiness of other peers based on past interaction and recommendation. Using this algorithm peers will have their own adjacency trust network. Two modules of trust, service and recommendation are proposed to measure trustworthiness for providing services and giving recommendation. Interactions and recommendations are computed based on importance, recentness and peer satisfaction parameter. Also, while computing recommendation, recommender’s trustworthiness and confidence will be considered.

References

F. Cornelli, E. Damiani, S .D. C. di Vimercati, S. Paraboschi, and P. Samarati,” Choosing Reputable Servents in P2P Network,” Proc. 11th World Wide Web Conf. (WWW), 2002

A.A. Selcuk, E. Uzun, and M.R. Pariente, “A Reputation-Based Trust Management System for P2P Networks, ” Proc. IEEE/ ACM Forth Int’I Symp. Cluster Computing and the Grid (CCGRID) , 2004.

J. Kleinberg, “ The Small-World Phenomenon: An Algorithmic Perspective,” Proc. 32nd ACM Symp. Theory of Computing, 2000

S. Saroiu, P. Gummadi, and S. Gribble, “A Measurement Study of Peer-to-Peer File Sharing Systems, “Proc. Multimedia Computing and Networking, 2002.

M. Ripeanu, I. Foster, and A. Lamnitchi, “Mapping The Gnutella Network: Properties of Large-scale Peer-to-Peer Systems and Implications for System Design, “IEEE Internet Computing, Vol.6,no. 1,pp. 50-57, Jan. 2002

S. Saroiu, K. Gnummadi, R. Dunn, S.D. Gribble, and H.M. Levy, “An Analysis of Internet Content Delivery System, “ Proc. Fifth USENIX Symp. Operating System Design and Implementation (OSDI), 2002.

Y. Zhong, “Formation of Dynamic Trust and Uncertain Evidence for User Authorization,” PhD thesis, Dept. of Computer Science, Purdue Univ., 2004.

D.H. McKnight, “Conceptualizing Trust: A Typology and E-Commerce Customer relationships Model,” Proc. 34th Ann. Hawaii Int’I conf. System Science (HICSS) , 2001.

C. Dellarocas, “Immunizing Online Reputation Reporting Systems Against Unfair Ratings and Discriminatory Behavior,” Proc. Second ACM Conf. Electronic Commerce (EC), 2000.

S. Xiao and I. Benbasat,” The Formation of Trust and Distrust in Recommendation agents in Repeated Interactions: A process-tracing Analysis,” Proc. Fifth ACM Conf. Electronic Commerce (EC), 2003.

Downloads

Published

2015-01-31

How to Cite

[1]
R. Bhandure, S. Gujrathi, J. Basumatary, P. Padekar, and R. Shirsath, “Secure Trust Model for Peer to Peer Network”, Int. J. Comp. Sci. Eng., vol. 3, no. 1, pp. 118–126, Jan. 2015.

Issue

Section

Research Article