Secure Group Communication by Establishing a Novel Trust Relationship Model and Detecting Malicious nodes in Peer to Peer Systems
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2015, Vol 4, Issue 12
Abstract
Trust administration in P2P framework is utilized to distinguish vindictive practices and to advance legitimate and agreeable communications. The fundamental objective of the prior P2P frameworks is the capacity of conglomerating assets, which expect certain trustworthiness level of companions. In any case, as P2P frameworks become immensely in size, there will be an impressive number of vindictive companions who convey security assaults and dangers to the entire system. In a disseminated foundation without concentrated server for power, giving security instrument is more confused than in server-driven arrangements, as the presence of different locales builds the defenselessness and security endeavors must be reproduced at various destinations. In this way security issues are one of the significant difficulties that should be deliberately dissected and tended to, particularly for completely decentralized unstructured P2P frameworks. A ton of examines are being directed to enhance the trust administration in shared framework. A few notoriety based trust administration frameworks are investigated here. In this paper, we present building trust connections among associates can alleviate assaults of malevolent companions. This paper presents dispersed calculations that empower a companion to reason about reliability of different associates in view of past cooperation’s and suggestions. Companions make their own particular trust system in their nearness by utilizing nearby data accessible and don't attempt to learn worldwide trust data.
Authors and Affiliations
M Ruby, K Venkatarao
An Efficient Content Sharing Scheme For Delay-Tolerant Smart Phone Networks
Some smart phones in the network store content that they are ready to share with others. All Smartphone users are eager to assist and provide a limited amount of their resources such as bandwidth, storage and process...
Image Compression through Data Representation in Frequency Domain
Data compression is a very important field these days. You can find it in any web page, network devices, application files etc. Its importance has grown during the years as a necessity of storage and time of transpor...
Computing In the Iaas To Provide Mobile Based Cloud Service
Videos are an integral part of current information technologies and the snare. The demand for efficient retrieval rises with the increasing number of videos, which is equally true for video annotation techniques as m...
Survey Paper on Music Beat Tracking
Tempo in music is beats perceived by us in unit time. The tempo is measured as number of beats per minute (BPM) in a music clip. This paper includes two algorithms used to measure tempo of music file. First one is an...
A Model for WAP-Based Mobile Banking Services
Mobile banking has emerged as a wireless service delivery channel in order to create added value for customers’ banking transactions. Previous studies indicate that factors contributing to the adoption of mobile ban...