Open Access   Article Go Back

Secure Trust Model for Peer to Peer Network

Roshan Bhandure1 , Siddharth Gujrathi2 , Jangila Basumatary3 , Pooja Padekar4 , Rakesh Shirsath5

Section:Research Paper, Product Type: Journal Paper
Volume-3 , Issue-1 , Page no. 118-126, Jan-2015

Online published on Jan 31, 2015

Copyright © Roshan Bhandure, Siddharth Gujrathi, Jangila Basumatary, Pooja Padekar , Rakesh Shirsath . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Roshan Bhandure, Siddharth Gujrathi, Jangila Basumatary, Pooja Padekar , Rakesh Shirsath, “Secure Trust Model for Peer to Peer Network,” International Journal of Computer Sciences and Engineering, Vol.3, Issue.1, pp.118-126, 2015.

MLA Style Citation: Roshan Bhandure, Siddharth Gujrathi, Jangila Basumatary, Pooja Padekar , Rakesh Shirsath "Secure Trust Model for Peer to Peer Network." International Journal of Computer Sciences and Engineering 3.1 (2015): 118-126.

APA Style Citation: Roshan Bhandure, Siddharth Gujrathi, Jangila Basumatary, Pooja Padekar , Rakesh Shirsath, (2015). Secure Trust Model for Peer to Peer Network. International Journal of Computer Sciences and Engineering, 3(1), 118-126.

BibTex Style Citation:
@article{Bhandure_2015,
author = {Roshan Bhandure, Siddharth Gujrathi, Jangila Basumatary, Pooja Padekar , Rakesh Shirsath},
title = {Secure Trust Model for Peer to Peer Network},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {1 2015},
volume = {3},
Issue = {1},
month = {1},
year = {2015},
issn = {2347-2693},
pages = {118-126},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=375},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=375
TI - Secure Trust Model for Peer to Peer Network
T2 - International Journal of Computer Sciences and Engineering
AU - Roshan Bhandure, Siddharth Gujrathi, Jangila Basumatary, Pooja Padekar , Rakesh Shirsath
PY - 2015
DA - 2015/01/31
PB - IJCSE, Indore, INDIA
SP - 118-126
IS - 1
VL - 3
SN - 2347-2693
ER -

VIEWS PDF XML
2462 2327 downloads 2504 downloads
  
  
           

Abstract

The peer to peer network has open nature which leads to exposure of various malicious activities. To eradicate these malicious activities, peers can build trust relationships among them. This paper presents distributed algorithm that enable a peer to reason about trustworthiness of other peers based on past interaction and recommendation. Using this algorithm peers will have their own adjacency trust network. Two modules of trust, service and recommendation are proposed to measure trustworthiness for providing services and giving recommendation. Interactions and recommendations are computed based on importance, recentness and peer satisfaction parameter. Also, while computing recommendation, recommender’s trustworthiness and confidence will be considered.

Key-Words / Index Term

Peer to Peer Systems; Trust Models; Trust Relationships; Reputation; Networking; Network Security

References

[1] F. Cornelli, E. Damiani, S .D. C. di Vimercati, S. Paraboschi, and P. Samarati,” Choosing Reputable Servents in P2P Network,” Proc. 11th World Wide Web Conf. (WWW), 2002
[2] A.A. Selcuk, E. Uzun, and M.R. Pariente, “A Reputation-Based Trust Management System for P2P Networks, ” Proc. IEEE/ ACM Forth Int’I Symp. Cluster Computing and the Grid (CCGRID) , 2004.
[3] J. Kleinberg, “ The Small-World Phenomenon: An Algorithmic Perspective,” Proc. 32nd ACM Symp. Theory of Computing, 2000
[4] S. Saroiu, P. Gummadi, and S. Gribble, “A Measurement Study of Peer-to-Peer File Sharing Systems, “Proc. Multimedia Computing and Networking, 2002.
[5] M. Ripeanu, I. Foster, and A. Lamnitchi, “Mapping The Gnutella Network: Properties of Large-scale Peer-to-Peer Systems and Implications for System Design, “IEEE Internet Computing, Vol.6,no. 1,pp. 50-57, Jan. 2002
[6] S. Saroiu, K. Gnummadi, R. Dunn, S.D. Gribble, and H.M. Levy, “An Analysis of Internet Content Delivery System, “ Proc. Fifth USENIX Symp. Operating System Design and Implementation (OSDI), 2002.
[7] Y. Zhong, “Formation of Dynamic Trust and Uncertain Evidence for User Authorization,” PhD thesis, Dept. of Computer Science, Purdue Univ., 2004.
[8] D.H. McKnight, “Conceptualizing Trust: A Typology and E-Commerce Customer relationships Model,” Proc. 34th Ann. Hawaii Int’I conf. System Science (HICSS) , 2001.
[9] C. Dellarocas, “Immunizing Online Reputation Reporting Systems Against Unfair Ratings and Discriminatory Behavior,” Proc. Second ACM Conf. Electronic Commerce (EC), 2000.
[10] S. Xiao and I. Benbasat,” The Formation of Trust and Distrust in Recommendation agents in Repeated Interactions: A process-tracing Analysis,” Proc. Fifth ACM Conf. Electronic Commerce (EC), 2003.