Call for Paper - September 2022 Edition
IJCA solicits original research papers for the September 2022 Edition. Last date of manuscript submission is August 22, 2022. Read More

A Depth Survey on Peer to Peer Systems

Print
PDF
International Journal of Computer Applications
© 2014 by IJCA Journal
Volume 86 - Number 15
Year of Publication: 2014
Authors:
G. Selvavinayagam
U. Sahana
10.5120/15063-3502

G Selvavinayagam and U Sahana. Article: A Depth Survey on Peer to Peer Systems. International Journal of Computer Applications 86(15):35-37, January 2014. Full text available. BibTeX

@article{key:article,
	author = {G. Selvavinayagam and U. Sahana},
	title = {Article: A Depth Survey on Peer to Peer Systems},
	journal = {International Journal of Computer Applications},
	year = {2014},
	volume = {86},
	number = {15},
	pages = {35-37},
	month = {January},
	note = {Full text available}
}

Abstract

A trust model for P2P networks is presented, in which a peer can develop a trust network in its proximity. A peer can isolate malicious peers around itself as it develops trust relationships with good peers. Two context of trust, service and recommendation contexts are defined to measure capabilities of peers in providing services and giving recommendations. Interactions and recommendations are considered with satisfaction, weight, and fading effect parameters. A recommendation contains the recommender's own experience, information from its acquaintances, and level of confidence in the recommendation. These parameters provided us a better assessment of trustworthiness. Individual, collaborative, and pseudonym changing attackers are studied in the experiments. Damage of collaboration and pseudo spoofing is dependent to attack behavior. Although recommendations are important in hypocritical and oscillatory attackers, pseudo spoofers, and collaborators, they are less useful in naive and discriminatory attackers.

References

  • Ahmet Burak Can and Bharat Bhargava . "SORT: A Self ORganizing Trust Model for Peer-to-Peer Systems", IEEE Trans. Dependable And Secure Computing, VOL. 10, NO. 1. JANUARY/FEBRUARY 2013.
  • M. Srikanth and K. B. Madhuri, "Secure and Effective P2P Reputation System using Trust Management and Self Certified Cryptographic Exchanges", IJCSI International Journal of Computer Science Issues, Vol. 10, Issue 2, No 2, March 2013
  • S. Kamvar, M. Schlosser, and H. Garcia-Molina, "The (Eigen trust) Algorithm for Reputation Management in P2P Networks," Proc. 12th World Wide Web Conf. (WWW), 2003.
  • A. A. Selcuk, E. Uzun, and M. R. Pariente, "A Reputation-Based Trust Management System for P2P Networks," Proc. IEEE/ACM Fourth Int'l Symp. Cluster Computing and the Grid (CCGRID), 2004.
  • R. Zhou, K. Hwang, and M. Cai, "Gossip trust for Fast Reputation Aggregation in Peer-to-Peer Networks," IEEE Trans. Knowledge and Data Eng. , vol. 20, no. 9, pp. 1282-1295, Sept. 2008.
  • M. Ripeanu, I. Foster, and A. Iamnitchi, "Mapping the Gnutella Network: Properties of Large-Scale Peer-to-Peer Systems and Implications for System Design," IEEE Internet Computing, vol. 6, no. 1, pp. 50-57, Jan. 2002.
  • S. Marsh, "Formalising Trust as a Computational Concept," PhD thesis, Dept. of Math. And Computer Science, Univ. of Stirling, 1994.