An Algorithm for Creating Malicious Free Absolute Trust Peers in P2P Networks

Abstract

Peer-to-peer (P2P) computing or networking is a distributed application architecture that partitions tasks or workloads between peers. The peers evaluate other peers based on their past interactions and then aggregate this information in the whole network. However it may not be the true reflection of past behavior of the peers. Moreover such type of aggregation gives only the relative ranking of peers without any absolute evaluation of their past. This is more significant when all the peers responding to a query, are malicious. In such a situation only the peer came to know that who is better among them without knowing their rank in the whole network. Hence to mitigate the attacks by malicious peers and to motivate the peers to share the resources effectively and securely, in this paper, a new algorithm is proposed which accounts for the past behavior of the peers and will estimate the absolute value of the trust of peers. Consequently, good peers or malicious peers are identified. The proposed algorithm converges at some global consensus much faster by choosing suitable parameters. Because of its absolute nature it will equally load all the peers in network. It will also reduce the inauthentic download in the network which was not possible in existing algorithms.

Authors and Affiliations

M. Janani, R. Jeevitha

Keywords

Related Articles

Cloud Computing Service and Deployment Models

Cloud computing is a new era it started after the development of parallel computing, grid computing and distributed computing. Many organizations have been started to use cloud computing store their data and provide sec...

Towards a Digital Home

The Digital Home refers to a residence with devices that are connected through a computer network. Though Digital Home technology and standards are evolving towards an integrated electronic home system, currently the di...

A Review Paper on Analysis Of I/Q Imbalance and Impact of Timing Jitter and In OFDM Transmission Systems for ICI Reduction

in the past years tremendous progress has been made on the ofdm (orthogonal frequency division multiplexing) communication model and its applications, although all this progress, still impairments like timing jitter and...

Studies on Self Compacting Fuel Dispenser Hose Pipe Rubber in Concrete

The experimental study undertaken to investigate the influence of partial replacement of Coarse aggregate with Fuel dispenser hose pipe rubber in concrete. Tests were conducted to determine the optimum level of replacem...

Flow Analysis of Air in a Rectangular Channel Using Perforated Rectangular Rib

In this particular work the flow analysis of air in a rectangular channel with perforated ribs were investigated. Calculations are made for rectangular channel. Pitch to height ratio (p/e) of 4,8,12 and 16 on friction f...

Download PDF file
  • EP ID EP23630
  • DOI http://doi.org/10.22214/ijraset.2017.3170
  • Views 286
  • Downloads 5

How To Cite

M. Janani, R. Jeevitha (2017). An Algorithm for Creating Malicious Free Absolute Trust Peers in P2P Networks. International Journal for Research in Applied Science and Engineering Technology (IJRASET), 5(3), -. https://europub.co.uk/articles/-A-23630