P2P Reputation Management Using Recommendation Chains of Both Requester and Provider
#1

[attachment=15309]
Abstract
Peer-to-peer (P2P) networks are self-configuring networks which plays vital role in file sharing with minimal or no central control. The purpose of securing P2P networks essential in nature. P2P networks are vulnerable to peers who cheat, propagate malicious code, leech on the network, or simply do not cooperate. The Traditional security techniques developed for the centralized distributed systems like client-server networks are insufficient for P2P networks by the virtue of their centralized nature. The absence of a central authority in a P2P network poses unique challenges for reputation management in the network. These challenges include identity management of the peers, secure reputation data management, Sybil attacks, and above all, availability of reputation data. In the proposed system, we present a cryptographic protocol for ensuring secure and timely availability of the reputation data of a peer to other peers at extremely low costs. The past behaviour of the peer is encapsulated in its digital reputation, and is subsequently used to predict its future actions. As a result, a peer’s reputation motivates it to cooperate and desist from malicious activities. The cryptographic protocol is coupled with self-certification and cryptographic mechanisms for identity management and countering Sybil attack. The reputation of requester and provider, both are considered to ostracize malicious peer in the P2P network, which leads to data secrecy, less network traffic and no delay in the transaction.
Keywords-Peer-to-peer networks, Identity management, Reputations, Security, Recommendation Chain.
I INTRODUCTION
Peer-to-peer (P2P) computing or networking is a distributed application architecture that partitions tasks or workloads between peers. Peers are equally privileged, equipotent participants in the application. They are said to form a peer-to-peer network of nodes. Peers make a portion of their resources, such as processing power, disk storage or network bandwidth, directly available to other network participants, without the need for central coordination by servers or stable hosts. Peers are both suppliers and consumers of resources, in contrast to the traditional client–server model where only servers supply, and clients consume. The peer-to- peer application structure was popularized by file sharing systems like Napster. P2P networks are self-configuring networks with minimal or no central control. P2P networks are more vulnerable to dissemination of malicious or spurious content, malicious code, viruses, worms, andtrojans than the traditional client-server networks, due to their unregulated and unmanaged nature. The peers in the P2P network have to be discouraged from leeching on the network. Policing these networks is extremely difficult due to the decentralized and ad hoc nature of these networks. Besides, P2P networks, like the Internet, are physically spread across geographic boundaries and hence are subject to variable laws. The traditional mechanisms for generating trust and protecting client-server networks cannot be used for pure P2P networks. This is because the trusted central authority used in the traditional client-server networks is absent in P2P networks. Introduction of a central trusted authority like a Certificate Authority (CA) can reduce the difficulty of securing P2P networks. In the absence of any central authority, repository, or global information, there is no silver bullet for securing P2P networks.
In this paper, Reputation Systems for P2P networks are investigated—a more ambitious approach to protect the P2P network without using any central component, and thereby harnessing the full benefits of the P2P network. The reputations of the peers are used to determine whether a peer is a malicious peer or a good peer. Once detected, the malicious peers are ostracized from the network as the good peers do not perform any transactions with the malicious peers. Expulsion of malicious peers from the network significantly reduces the volume of malicious activities.
All peers in the P2P network are identified by identity certificates (aka identity). The reputation of a given peer is attached to its identity. The identity certificates are generated using self-certification, and all peers maintain their own (and hence trusted) certificate authority which issues the identity certificate(s) to the peer. Each peer owns the reputation information pertaining to all its past transactions with other peers in the network, and stores it locally. A two-party cryptographic protocol not only protects the reputation information from its owner, but also facilitates secure exchange of reputation information between the two peers participating in a transaction. The main contributions of this paper are:
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: main conclusions and recommendation of the dehejia committee, top ten theater chains, index recommendation, p2p reputation management using distributed identities, p2p reputation management using distributed identities and decentralized recommendation chains pdf, training for both ends, abstract for infrared motion detector using ic 555 of both transmitter and receiver,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  DESIGN AND IMPLEMENTATION OF GOLAY ENCODER AND DECODER computer science crazy 2 23,607 26-08-2016, 03:46 PM
Last Post: anasek
  SATELLITE REMOTE SENSING AND DISASTER MANAGEMENT smart paper boy 2 2,164 04-03-2016, 02:44 PM
Last Post: seminar report asees
  Brain Tumour Detection Using Water shedding and basic Image Processing Techniques smart paper boy 2 3,075 01-08-2015, 02:53 PM
Last Post: seminar report asees
  VEHICLE POSITION TRACKING USING GPS AND GSM RECIEVER WITH LICENCE Electrical Fan 5 9,739 22-06-2014, 12:34 AM
Last Post: Guest
  DESIGN AND IMPLEMENTATION OF RADIX-4 BOOTH MULTIPLIER USING VHDL project computer science technology 8 24,974 12-11-2013, 05:36 AM
Last Post: Guest
  ANTI THEFT ALERT AND AUTO ARRESTING SYSTEM FOR MUSEUMS AND JEWELRY SHOPS project report helper 11 14,603 12-08-2013, 09:57 AM
Last Post: computer topic
  Modeling and Testing of a Digital Distance Relay Using MATLAB/SIMULINK smart paper boy 6 4,040 09-08-2013, 10:56 AM
Last Post: computer topic
  Mobile Showroom Billing and Inventory Management System smart paper boy 3 4,382 06-05-2013, 11:12 AM
Last Post: computer topic
  AUTOMATED TOLL COLLECTION AND ALCHCOL DETECTION USING PSOC full report project topics 6 7,352 08-04-2013, 03:28 PM
Last Post: computer topic
  Wirelesss Data Encryptiion and Decryption using RF Communication project topics 17 11,489 03-02-2013, 10:30 PM
Last Post: mohanece401

Forum Jump: