Making Trust Relationship For Peer To Peer System With Secure Protocol

Journal Title: International Journal of Modern Engineering Research (IJMER) - Year 2014, Vol 4, Issue 5

Abstract

 In the peer-to-peer systems exposes them to malicious activity. Building trust relationships among peers can mitigate attacks of malicious peers. This paper presents distributed algorithms that enable a peer to reason about trust worthiness of other peers based on past interactions and recommendations. Peers create their own trust network in their proximity by using local information available and do not try to learn global trust information. Two contexts of trust, service, and recommendation contexts are defined to measure trustworthiness in providing services and giving recommendations. So, neighbouring node will give the recommendation to peer. Based on the recommendation only Peer decides whether the node is good (or) malicious. Find the node is malicious node means peer will not interact with malicious node. Isolate the malicious node from the network. Find the node is good means peer interact with good peer. Peer stores a separate history of interactions for each Acquaintance. This paper also discuss the malicious threats, privacy concerns, and security risks of three commonpeer-to-peer network systems that are gaining popularity today. The malicious threats discussed willinclude how malicious threats can harness existing peer-to-peer networks, and how peer-to-peernetworking provides an additional (potentially unprotected) vector of delivery for malicious code.

Authors and Affiliations

Miss. I. Jancy1 , Mr. S. Balamurugan2

Keywords

Related Articles

 Artificial Intelligence based optimization of weld bead geometry in laser welding of Al-Mg alloy sheet

 This paper reports on a modeling and optimization of laser welding of aluminum-magnesium alloy thickness of 1.7mm. Regression analysis is used for modeling and Genetic algorithm is used for optimize the process par...

 On G#P-Continuous Maps In Topological Spaces

 Abstract: The aim of this paper is to introduce and study g#p-continuous maps. Basic characterizations and several properties concerning them are obtained.Further,g#p-irresolute map is also defined. Some of the pr...

 Natural Language Ambiguity and its Effect on Machine Learning

 Natural language processing" here refers to the use and ability of systems to process sentences in a natural language such as English, rather than in a specialized artificial computer language such as C++. The syst...

 Invention of the Plane Geometrical Formulae - Part II

 In this paper, I have invented the formulae for finding the area of an Isosceles triangle. My finding is based on Pythagoras theorem

Retrofitting and Strengthening of Damaged Reinforced Concrete Columns Using Steel Angels Wrapped with Steel Wire Mesh

Six reinforced concrete rectangular columns with a cross section 120x160 mm and 800 mm length were casted and tested until failure. Two control columns were tested under axial load and four columns were tested...

Download PDF file
  • EP ID EP121457
  • DOI -
  • Views 109
  • Downloads 0

How To Cite

Miss. I. Jancy1, Mr. S. Balamurugan2 (2014).  Making Trust Relationship For Peer To Peer System With Secure Protocol. International Journal of Modern Engineering Research (IJMER), 4(5), 42-46. https://europub.co.uk/articles/-A-121457