IMPLEMENTATION OF REPUTATION EXCHANGE PROTOCOL IN PEER-TO-PEER SYSTEM

Journal Title: International Journal on Computer Science and Engineering - Year 2011, Vol 3, Issue 3

Abstract

The motivation behind basing applications on peer-to-peer architectures derives to a large extent from their ability to function, scale and self-organize in the presence of a highly transient population of nodes, network and computer failures, without the need of a central server and the overhead of its administration. P2P networks are vulnerable to peers, who cheat, propagate malicious codes, or peers who do not cooperate. Traditional client-server security models are not sufficient to P2P networks because of their centralized nature. Absence of central authority in P2P poses unique challenges like identity management of the peers, secure reputation data management and Sybil attack for reputation management in the network. In this paper we present a cryptographic protocol for ensuring secure and timely availability of the reputation data of a peer extremely at low cost. The past behavior of the peer is encapsulated in its digital reputation and is subsequently used to predict the future actions. The cryptographic protocol is coupled with self-certification and cryptographic mechanisms for identity management and countering Sybil attacks. The latency associated with a file replication in a P2P system consists of two components: the query search time and the time required by the peers to transmit the file. In order to model the peer level latency, we develop a queuing model to evaluate the time required at each peer to serve its replication requests.

Authors and Affiliations

B. Udhaya , J. Jeysree

Keywords

Related Articles

Supply and demand vs. price driven graphs financial data visualization

In the financial world, people almost every day, argue whether the price of a financial instrument will go up or down. While long term investors use fundamental data to create their view, mid & short term investors a...

Comparison of Novel Semi supervised Text classification using BPNN by Active search with KNN Algorithm

With the availability of huge amount of text in internet, news, institutes, organization etc need of automatic text classification also increases, The proposed work comprised to deal with the major challenge of getting l...

Adaptation of Optimal Methods In Resource Utilization, Job Scheduling In Grids

A Optimal Grid should have Three characterstics : It should not allow resource providers to increase prices continuously, No provider should reject to provide resources to certain type of jobs due to risk associated in e...

Two-Level Dynamic Load Balancing Algorithm Using Load Thresholds and Pairwise Immigration

This paper proposes a two-level dynamic load balancing scheme for grid and distributed systems. We focus on reducing average task response time. In order to achieve the goals, efficient dynamic load balancing is required...

Provide a method to Prediction of nodes movement to optimize Routing Algorithms in Ad Hoc Networks

Ad hoc networks have been of great interest among scholars of the field, due to their flexibility, quick setup, high potentiality, and also their application in the battle field, fire, earthquakes, where there is no hope...

Download PDF file
  • EP ID EP97306
  • DOI -
  • Views 99
  • Downloads 0

How To Cite

B. Udhaya, J. Jeysree (2011). IMPLEMENTATION OF REPUTATION EXCHANGE PROTOCOL IN PEER-TO-PEER SYSTEM. International Journal on Computer Science and Engineering, 3(3), 1290-1294. https://europub.co.uk/articles/-A-97306