Making Trust Relationship For Peer To Peer System With Secure Protocol
Journal Title: International Journal of Modern Engineering Research (IJMER) - Year 2014, Vol 4, Issue 5
Abstract
In the peer-to-peer systems exposes them to malicious activity. Building trust relationships among peers can mitigate attacks of malicious peers. This paper presents distributed algorithms that enable a peer to reason about trust worthiness of other peers based on past interactions and recommendations. Peers create their own trust network in their proximity by using local information available and do not try to learn global trust information. Two contexts of trust, service, and recommendation contexts are defined to measure trustworthiness in providing services and giving recommendations. So, neighbouring node will give the recommendation to peer. Based on the recommendation only Peer decides whether the node is good (or) malicious. Find the node is malicious node means peer will not interact with malicious node. Isolate the malicious node from the network. Find the node is good means peer interact with good peer. Peer stores a separate history of interactions for each Acquaintance. This paper also discuss the malicious threats, privacy concerns, and security risks of three commonpeer-to-peer network systems that are gaining popularity today. The malicious threats discussed willinclude how malicious threats can harness existing peer-to-peer networks, and how peer-to-peernetworking provides an additional (potentially unprotected) vector of delivery for malicious code.
Authors and Affiliations
Miss. I. Jancy1 , Mr. S. Balamurugan2
Artificial Intelligence based optimization of weld bead geometry in laser welding of Al-Mg alloy sheet
This paper reports on a modeling and optimization of laser welding of aluminum-magnesium alloy thickness of 1.7mm. Regression analysis is used for modeling and Genetic algorithm is used for optimize the process par...
On G#P-Continuous Maps In Topological Spaces
Abstract: The aim of this paper is to introduce and study g#p-continuous maps. Basic characterizations and several properties concerning them are obtained.Further,g#p-irresolute map is also defined. Some of the pr...
Natural Language Ambiguity and its Effect on Machine Learning
Natural language processing" here refers to the use and ability of systems to process sentences in a natural language such as English, rather than in a specialized artificial computer language such as C++. The syst...
Invention of the Plane Geometrical Formulae - Part II
In this paper, I have invented the formulae for finding the area of an Isosceles triangle. My finding is based on Pythagoras theorem
Retrofitting and Strengthening of Damaged Reinforced Concrete Columns Using Steel Angels Wrapped with Steel Wire Mesh
Six reinforced concrete rectangular columns with a cross section 120x160 mm and 800 mm length were casted and tested until failure. Two control columns were tested under axial load and four columns were tested...