Making Trust Relationship For Peer To Peer System With Secure Protocol

Journal Title: International Journal of Modern Engineering Research (IJMER) - Year 2014, Vol 4, Issue 5

Abstract

 In the peer-to-peer systems exposes them to malicious activity. Building trust relationships among peers can mitigate attacks of malicious peers. This paper presents distributed algorithms that enable a peer to reason about trust worthiness of other peers based on past interactions and recommendations. Peers create their own trust network in their proximity by using local information available and do not try to learn global trust information. Two contexts of trust, service, and recommendation contexts are defined to measure trustworthiness in providing services and giving recommendations. So, neighbouring node will give the recommendation to peer. Based on the recommendation only Peer decides whether the node is good (or) malicious. Find the node is malicious node means peer will not interact with malicious node. Isolate the malicious node from the network. Find the node is good means peer interact with good peer. Peer stores a separate history of interactions for each Acquaintance. This paper also discuss the malicious threats, privacy concerns, and security risks of three commonpeer-to-peer network systems that are gaining popularity today. The malicious threats discussed willinclude how malicious threats can harness existing peer-to-peer networks, and how peer-to-peernetworking provides an additional (potentially unprotected) vector of delivery for malicious code.

Authors and Affiliations

Miss. I. Jancy1 , Mr. S. Balamurugan2

Keywords

Related Articles

 Performance Analysis of Multicarrier SPWM Strategies for Three Phase Z - Source Seven Level Cascaded Inverter

 ABSTRACT: This paper presents multicarrier PWM strategies for three phase cascaded seven level Z-source inverter. Multilevel inverters posses the advantage of reduced harmonics, high-power capability and high-volta...

 Modeling & Simulation of PMSM Drives with Fuzzy Logic Controller

 The Permanent-magnet-synchronous-machine (PMSM) drives have been increasingly applied in a variety of industrial applications which require fast dynamic response and accurate control over wide speed ranges. In this...

To Improve Thermal Efficiency of 27mw Coal Fired Power Plant

Booming demand for electricity, especially in the developing countries, has raised power generation technologies in the headlines. At the same time the discussion about causes of global warming has focused on emissions o...

 Aggrandize the Reliability by Bug Retrieval (ARBR)

A complex software system has numerous defect prone tasks. There are many reasons for the defects in software. Many of these defects lead to failure of software. Software Reliability is the probability of failure-free so...

 Finite Element Modeling of Magnetic Flux Leakage Technique in Plates with Defect and without Defect

In the area of non destructive testing ultrasonic testing using wave propagation is an emerging field. Ultrasonic testing uses transmission of high frequency sound waves into a material to object and reflections (echoes)...

Download PDF file
  • EP ID EP121457
  • DOI -
  • Views 98
  • Downloads 0

How To Cite

Miss. I. Jancy1, Mr. S. Balamurugan2 (2014).  Making Trust Relationship For Peer To Peer System With Secure Protocol. International Journal of Modern Engineering Research (IJMER), 4(5), 42-46. https://europub.co.uk/articles/-A-121457