Group Formation with Neighbour Similarity Trust in P2P E-Commerce

Journal Title: International Journal of Science and Research (IJSR) - Year 2015, Vol 4, Issue 3

Abstract

This paper is based on networking in predicting the trust between Peer to peer (P2P) e-commerce applications with liabilities to passive and active attacks. These attacks have turned out the potential business firms and individuals whose aim is to get the best benefit in e-commerce with minimal losses. The attacks occur when contacts between the swapping peers as an execution occurs In this paper,Sybil attack is proposed as an active attack, in which peers can have asserts, and can be considered as numerous identities to fake their owns. In our approach, traced Sybil attack peers can be recognized as the adjacent peers and became more trusted to each other. Security and performance analysis shows that Sybil attack can be reduced by our proposed neighbour similarity trust. The peer identities are then occupied to drag the behaviour of the system. However, if a single flawed entity can present multiple identities, it can control a massive proportion. All the resources utilized in the P2P infrastructure are contributed by the peers itself unless a traditional approaches where a central authority control is used. A peer gives illegal tributes will have its trust level minimised. In case it reaches a certain threshold level, the peer can be expelled from the group. Each peer has an identity, which is either honest or Sybil.

Authors and Affiliations

Keywords

Related Articles

Optical Properties of (PVA-PAA-Ag) Nanocomposites

In this paper, the effect of silver nanoparticles on optical properties of (PVA-PAA) nanocomposites has been investigated. The silver nanoparticles were added to the polymers (polyvinyl alcohol 80 wt.% and poly-acrylic...

A Review on use of Computational Fluid Dynamics in Gas Turbine Combustor Analysis and its Scope

Computational fluid dynamics (CFD) modeling is now widely applied as combustion optimization tool. The steady increase in computer power over recent years has enabled combustion engineers to model reacting multi-phase fl...

Analysis and Implementation of Time-Varying Least Mean Square Algorithm and Modified Time-Varying LMS for Speech Enhancement

This paper aims to investigate performance analysis and enhancements for the adaptive algorithms in speech enhancement and develop refined algorithms. The speech signal may get corrupted due to different types of noise....

Developing Firefox add-on for DOM vulnerability Assessment

Cross-site scripting (XSS) is a type of security vulnerability typically found in web applications which allows the attackers to inject malicious script into web pages/servers. XSS is the main cause of DOM attack. This a...

Socio-Economic Conditions of Female Workers in Brick Kilns - An Exploitation to Healthy Social Structure: A Case Study on Khejuri CD Blocks in Purba Medinipur, West Bengal

Brick Industry is one of the informal/unorganized industries in India. This industry is booming with the expansion of real estate business. It is a labor intensive industry. The industry employs millions of workers. Siza...

Download PDF file
  • EP ID EP357276
  • DOI -
  • Views 51
  • Downloads 0

How To Cite

(2015). Group Formation with Neighbour Similarity Trust in P2P E-Commerce. International Journal of Science and Research (IJSR), 4(3), -. https://europub.co.uk/articles/-A-357276