An Algorithm for Creating Malicious Free Absolute Trust Peers in P2P Networks

Abstract

Peer-to-peer (P2P) computing or networking is a distributed application architecture that partitions tasks or workloads between peers. The peers evaluate other peers based on their past interactions and then aggregate this information in the whole network. However it may not be the true reflection of past behavior of the peers. Moreover such type of aggregation gives only the relative ranking of peers without any absolute evaluation of their past. This is more significant when all the peers responding to a query, are malicious. In such a situation only the peer came to know that who is better among them without knowing their rank in the whole network. Hence to mitigate the attacks by malicious peers and to motivate the peers to share the resources effectively and securely, in this paper, a new algorithm is proposed which accounts for the past behavior of the peers and will estimate the absolute value of the trust of peers. Consequently, good peers or malicious peers are identified. The proposed algorithm converges at some global consensus much faster by choosing suitable parameters. Because of its absolute nature it will equally load all the peers in network. It will also reduce the inauthentic download in the network which was not possible in existing algorithms.

Authors and Affiliations

M. Janani, R. Jeevitha

Keywords

Related Articles

Survey- Algorithms Used For Sentiment Analysis

Sentiment Analysis (SA), a subfield of NLP, is the computational handling of opinions, sentiments, feedback and subjectivity of text . It is based on Information Extraction task that aims to obtain writer’s feelings exp...

MATLAB Techniques for Enhancement of Liver DICOM Images

DICOM has become a standard for medical imaging. Its purpose is to standardize digital medical imaging and data for easy access and sharing. There are many commercial viewers that support DICOM image format and can read...

A Block Based Novel Digital Video Watermarking Scheme Using DCT

Today, there are lots of facilities such as video on demand, digital music downloads and multimedia social networks through internet which challenges to the design of content protection measures aimed at preventing copy...

Contribution of Foreign Direct Investment in India: Its Growth and Issues

Foreign Direct Investment acts as a bridge to fulfill the gap between investment and saving. In the process of economic development foreign capital helps to cover the domestic saving constraint and provide access to the...

Design and Development of Main Helicopter Rotor Blade

To determine the load distribution in main helicopter rotor blade in study Computational Fluid Dynamics (CFD) and Finite Element Method (FEM) software is used. The aim of the present investigation is the development of...

Download PDF file
  • EP ID EP23630
  • DOI http://doi.org/10.22214/ijraset.2017.3170
  • Views 279
  • Downloads 5

How To Cite

M. Janani, R. Jeevitha (2017). An Algorithm for Creating Malicious Free Absolute Trust Peers in P2P Networks. International Journal for Research in Applied Science and Engineering Technology (IJRASET), 5(3), -. https://europub.co.uk/articles/-A-23630