Call for Paper - January 2023 Edition
IJCA solicits original research papers for the January 2023 Edition. Last date of manuscript submission is December 20, 2022. Read More

Result and Analysis: Data Sharing between Peer-to-Peer using Trust Model

Print
PDF
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Year of Publication: 2017
Authors:
Janmejay Kale, V. R.Chirchi
10.5120/ijca2017912791

Janmejay Kale and V R.Chirchi. Result and Analysis: Data Sharing between Peer-to-Peer using Trust Model. International Journal of Computer Applications 157(8):30-33, January 2017. BibTeX

@article{10.5120/ijca2017912791,
	author = {Janmejay Kale and V. R.Chirchi},
	title = {Result and Analysis: Data Sharing between Peer-to-Peer using Trust Model},
	journal = {International Journal of Computer Applications},
	issue_date = {January 2017},
	volume = {157},
	number = {8},
	month = {Jan},
	year = {2017},
	issn = {0975-8887},
	pages = {30-33},
	numpages = {4},
	url = {http://www.ijcaonline.org/archives/volume157/number8/26853-2017912791},
	doi = {10.5120/ijca2017912791},
	publisher = {Foundation of Computer Science (FCS), NY, USA},
	address = {New York, USA}
}

Abstract

In this implemented project, using open nature of Peer to Peer systems that helps to expose the malicious activity. Building trust relationships among peers can reduce attacks of malicious peers. Peers create its own trust network in their proximity by using local information available and do not try to learn global trust information. Based on trust information it classifies the peers whether peer is trustworthy or not. In this paper used the technique called Self Organizing Trust Model (SORT) that aims to reduce malicious activity in Peer to Peer system by establishing trust relations among peers in their proximity. Trust information is evaluated based on service, trust values of each peers and it is based on past interactions. Which one peer having highest trust ratio that is computed using service and trust values of earlier interaction that peer to be selected for next interaction. This trust information helps to build a secure environment to transmit a packet. Simulation experiments on a file sharing application show that the proposed model can mitigate attacks on different malicious behavior models. In the experiments, good peers were able to form trust relationships in their proximity and isolate malicious peers.

References

  1. A.B.Can and B.Bhargava,"SORT: Self ORganizing Trust Model for Peer-to-Peer Systems," IEEE Transactions on Dependable and Secure Computing,vol.10,no.1,pp.14-27,Jan.2013
  2. K. Abere and Z. Despotovic, “Managing Trust in a Peer to peer Information System,” Proc.10th Int’l Conf.Information and Knoewledge Management (CIKM), 2001.
  3. F. Cornelli, E. Damiani, S.D.C di Vimercati,S. Paraboschi, and P.Samarati, “Choosing Reputable Servents in a Peer to peer Network,” Proc. 11th World Wide Web Conf.(WWW),2002.
  4. S. Kamvar, M.Schlosser, and H. Garcia-Molina, “The (Eigentrust) Algorithm for Reputation Management in Peer to peer Network,” Proc. 12th world Wide Web Conf.(WWW),2003.
  5. L.Xiong and L.Liu, “Peertrust: Supporting Reputation-Based Trust for Peer to Peer Ecommerce Communities,” IEEE Trans. Knowledge and Data Eng.,Vol. 16, no. 7, pp.843-857, July 2004.
  6. A.A. Seluk, E. Uzun, and M.R. Pariente, “A Reputation- Based trust Management System for Peer to peer Network,” Proc. IEEE/ACM Fourth Int’l Symp. Cluster Computing and the Grid(CCGRID), 2004.
  7. R. Zhou, K. Hwang, and M. Cai, “Gossiptrust for Fast Reputation Aggregation in Peer to peer Network,” IEEE Trans. Knowledge and Data Eng., vol.20,no.pp. 1282-1295,Sept.2008.
  8. J . Kleingberg, “The Small-World Phenomenon: An Algorithmic Perspective,” Proc. 32nd ACM Symp. Theory of Computing, 2000.
  9. S . Saroiu, P. Gummadi, and S. Gribble, “A Measurement Study of peer to peer File sharing Systems,”Proc.MultimediaComputingand Networking,2002.
  10. M . Ripeanu, I.Foster, and A. Iamnitchi, “mapping the Gnutella Network: Properties of Large- Scale Peer to Peer Systems and Implications for System Design,” IEEE Internet Computing, vol. 6, no. 1,pp. 50-57 Jan 2002.
  11. S. Saroiu, K. Gummadi, R. Dunn, S.D.Gribble, and H.M. Levy, “ An Analysis of internet Conent Delivery Systems,” Proc. Fifth USENIX Symp. Operating Systems Design and Implemenation(OSDI),2002.

Keywords

Peer to Peer system, Trust Management, Security, Establishing Trust Information, Past Interaction