Secure Group Communication by Establishing a Novel Trust Relationship Model and Detecting Malicious nodes in Peer to Peer Systems
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2015, Vol 4, Issue 12
Abstract
Trust administration in P2P framework is utilized to distinguish vindictive practices and to advance legitimate and agreeable communications. The fundamental objective of the prior P2P frameworks is the capacity of conglomerating assets, which expect certain trustworthiness level of companions. In any case, as P2P frameworks become immensely in size, there will be an impressive number of vindictive companions who convey security assaults and dangers to the entire system. In a disseminated foundation without concentrated server for power, giving security instrument is more confused than in server-driven arrangements, as the presence of different locales builds the defenselessness and security endeavors must be reproduced at various destinations. In this way security issues are one of the significant difficulties that should be deliberately dissected and tended to, particularly for completely decentralized unstructured P2P frameworks. A ton of examines are being directed to enhance the trust administration in shared framework. A few notoriety based trust administration frameworks are investigated here. In this paper, we present building trust connections among associates can alleviate assaults of malevolent companions. This paper presents dispersed calculations that empower a companion to reason about reliability of different associates in view of past cooperation’s and suggestions. Companions make their own particular trust system in their nearness by utilizing nearby data accessible and don't attempt to learn worldwide trust data.
Authors and Affiliations
M Ruby, K Venkatarao
Security Approach Induction of Client Transferred Pictures on Content Sharing Website
Online Social networking’s gotten to be a standout amongst the most critical piece of our daily life as it empowers us to correspond with many people. Production of interpersonal interaction locales, for example, Mys...
Performance Analysis of RTOS with GPOS for Heart Rate and Temperature Measurement Wireless System Using Raspberry Pi
The objective of the project is to analyze the General Purpose Operation System (GPOS) performance with Real Time Operating System (RTOS) using a Heartbeat sensor and temperature sensor as a real time application. Me...
http://www.ijrcct.org/index.php/ojs/article/view/555/pdf
Cloud computing provides a huge data services to the user in an easy and comfortable way over the internet. We presenting a new platform for cloud computing called Data Protection as a Service which is significantly...
Public Transportation Management Service using GPS-GSM
Transportation management service includes vehicle tracking & security system by embedding of an electronic device in a vehicle, or fleet of vehicles, with purpose-designed computer software to enable the owner or a...
A comprehensive survey on restructuring user search results with Feedback sessions
Search engine relevance and user experience is very important in web search applications. It can be improved by inferring and analyzing user search goals. This paper proposes a novel approach to infer user goals by a...