EigenTrust Algorithm for Reputation Management in P2P Networks full report
#1

The EigenTrust Algorithm for Reputation Management in P2P Networks

Presented By:
Sepandar D. Kamvar
Mario T. Schlosser
Hector Garcia-Molina


ABSTRACT
Peer-to-peer le-sharing networks are currently receiving much at- tention as a means of sharing and distributing information. How- ever, as recent experience shows, the anonymous, open nature of these networks offers an almost ideal environment for the spread of self-replicating inauthentic les. We describe an algorithm to decrease the number of downloads of inauthentic les in a peer-to-peer le-sharing network that as- signs each peer a unique global trust value, based on the peerâ„¢s history of uploads. We present a distributed and secure method to compute global trust values, based on Power iteration. By having peers use these global trust values to choose the peers from whom they download, the network effectively identies malicious peers and isolates them from the network. In simulations, this reputation system, called EigenTrust, has been shown to signicantly decrease the number of inauthentic les on the network, even under a variety of conditions where malicious peers cooperate in an attempt to deliberately subvert the system.


read report and presentation
http://kamvarassets/papers/eigentrust.pdf
http://cs.ucsb.edu/~gayatri/Presentation...NTRUST.ppt
http://stanford.edu/~sdkamvar/talks/EigenTrust.ppt
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: ants p2p architecture, jeu de mario, p2p networks anonymous, reputation, p2p networks for mac, napster p2p architecture, p2p reputation management using distributed identities and decentralized recomdation chains with ppt,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  APRIORI Algorithm project report helper 1 10,948 07-02-2019, 10:19 AM
Last Post:
  computer networks full report seminar topics 8 42,356 06-10-2018, 12:35 PM
Last Post: jntuworldforum
  OBJECT TRACKING AND DETECTION full report project topics 9 30,849 06-10-2018, 12:20 PM
Last Post: jntuworldforum
  Vertical Handoff Decision Algorithm Providing Optimized Performance in Heterogeneous Wireless Networks computer science topics 2 30,430 07-10-2016, 09:02 AM
Last Post: ijasti
  imouse full report computer science technology 3 25,088 17-06-2016, 12:16 PM
Last Post: ashwiniashok
  Implementation of RSA Algorithm Using Client-Server full report seminar topics 6 26,803 10-05-2016, 12:21 PM
Last Post: dhanabhagya
  Optical Computer Full Seminar Report Download computer science crazy 46 66,654 29-04-2016, 09:16 AM
Last Post: dhanabhagya
  ethical hacking full report computer science technology 41 74,783 18-03-2016, 04:51 PM
Last Post: seminar report asees
  broadband mobile full report project topics 7 23,546 27-02-2016, 12:32 PM
Last Post: Prupleannuani
  steganography full report project report tiger 15 41,595 11-02-2016, 02:02 PM
Last Post: seminar report asees

Forum Jump: