CFP last date
20 May 2024
Reseach Article

Secure Data and Service Access Model for Peer-to-Peer Systems using Trust Relations

by Sourabh S. Mahajan, S.k. Pathan
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 105 - Number 17
Year of Publication: 2014
Authors: Sourabh S. Mahajan, S.k. Pathan
10.5120/18466-9758

Sourabh S. Mahajan, S.k. Pathan . Secure Data and Service Access Model for Peer-to-Peer Systems using Trust Relations. International Journal of Computer Applications. 105, 17 ( November 2014), 1-5. DOI=10.5120/18466-9758

@article{ 10.5120/18466-9758,
author = { Sourabh S. Mahajan, S.k. Pathan },
title = { Secure Data and Service Access Model for Peer-to-Peer Systems using Trust Relations },
journal = { International Journal of Computer Applications },
issue_date = { November 2014 },
volume = { 105 },
number = { 17 },
month = { November },
year = { 2014 },
issn = { 0975-8887 },
pages = { 1-5 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume105/number17/18466-9758/ },
doi = { 10.5120/18466-9758 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:37:55.939445+05:30
%A Sourabh S. Mahajan
%A S.k. Pathan
%T Secure Data and Service Access Model for Peer-to-Peer Systems using Trust Relations
%J International Journal of Computer Applications
%@ 0975-8887
%V 105
%N 17
%P 1-5
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Peer-to-Peer systems are based on collaboration of peers to accomplish tasks. Trust relationship among peers can help to reduce attacks of peers with malicious intent. In this paper we presents algorithms which helps a peer to reason about trustworthiness of other peers based on interactions in the past and recommendations. Peers create trust network using local information and does not need to deal with global information. Service and recommendation metrics describes the trustworthiness of peers in providing services. Recentness, importance and peer satisfaction parameters are considered for evaluating interactions and recommendations. A good peer can isolate malicious peers with the help of trust relationships.

References
  1. K. Abererand Z. Despotovic,"Managing Trust in a Peer-2-Peer Information System," Proc. 10th Int'l Conf. Information and Knowledge Management (CIKM), 2001.
  2. F. Cornelli, E. Damiani, S. D. C. di Vimercati, S. Paraboschi, and P. Samarati, "Choosing Reputable Servents in a P2P Network," Proc. 11th World Wide Web Conf. (WWW), 2002.
  3. S. Kamvar, M. Schlosser, and H. Garcia-Molina, "The (Eigentrust) Algorithm for Reputation Management in P2P Networks," Proc. 12th World Wide Web Conf. (WWW), 2003.
  4. L. Xiong and L. Liu, "Peertrust: Supporting Reputation-Based Trust for Peer-to-Peer Ecommerce Communities," IEEE Trans.
  5. M. Ripeanu, I. Foster, and A. Iamnitchi, "Mapping the Gnutella Network: Properties of Large-Scale Peer-to-Peer Systems and Implications for System Design," IEEE Internet Computing, vol. 6, no. 1, pp. 50-57, Jan. 2002.
  6. S. Marsh, "Formalising Trust as a Computational Concept," PhD thesis, Dept. of Math. and Computer Science, Univ. of Stirling,1994.
  7. A. Abdul-Rahman and S. Hailes, "Supporting Trust in Virtual Communities," Proc. 33rd Hawaii Int'l Conf. System Sciences (HICSS), 2000.
  8. B. Yu and M. Singh, "A Social Mechanism of Reputation Management in Electronic Communities," Proc. Cooperative Information Agents (CIA), 2000.
  9. L. Mui, M. Mohtashemi, and A. Halberstadt, "A Computational Model of Trust and Reputation for E-Businesses," Proc. 35th Hawaii Int'l Conf. System Sciences (HICSS), 2002.
  10. A. Jøsang, E. Gray, and M. Kinateder, "Analysing Topologies of Transitive Trust," Proc. First Int'l Workshop Formal Aspects in Security and Trust (FAST), 2003.
  11. S. Song, K. Hwang, R. Zhou, and Y. -K. Kwok, "Trusted P2P Transactions with Fuzzy Reputation Aggregation," IEEE Internet Computing, vol. 9, no. 6, pp. 24-34, Nov. -Dec. 2005.
  12. M. Virendra, M. Jadliwala, M. Chandrasekaran, and S. Upadhyaya, "Quantifying Trust in Mobile Ad-Hoc Networks," Proc. IEEE Int'l Conf. Integration of Knowledge Intensive Multi-Agent Systems (KIMAS), 2005.
  13. Z. Despotovic and K. Aberer, "Trust-Aware Delivery of Composite Goods," Proc. First Int'l Conf. Agents and Peer-to-Peer Computing, 2002.
  14. A. Jøsang, R. Ismail, and C. Boyd, "A Survey of Trust and Reputation Systems for Online Service Provision," Decision Support Systems, vol. 43, no. 2, pp. 618-644, 2007.
Index Terms

Computer Science
Information Sciences

Keywords

Recommendations trustworthiness