Documente Academic
Documente Profesional
Documente Cultură
ABSTRACT
Peer-to-Peer (P2P) Systems have
attracted significant interest in recent years.
In P2P networks, each peer acts as both a
server and client. This characteristic makes
peers vulnerable to a wide variety of attacks.
Having robust trust management is very
critical for such open environment to
exclude unreliable peer from the system.
Managing trust is a problem in peer to peer
environment, so our SORT model is built
based on trust metrics. The trust metrics
such as reputation, service trust,
recommendation trust are defined to
precisely measure trustworthiness of peers.
A peers trustworthiness is evaluated by
considering provided services and given
recommendations
with
service
and
recommendation contexts. When evaluating
recommendation,
recommenders
trustworthiness and confidence level about
the information provided are also
considered. Experiments on file sharing
application demonstrate that peers with the
highest trust value are considered and build
the trust model in their contiguity and
insulate malignant peers. Building trust
relationships among peers can mitigate
attacks of malicious peers. Peers create their
own trust network in their proximity by
I.
INTRODUCTION
219
www.iaetsd.in
ISBN: 378-26-138420-01
220
www.iaetsd.in
ISBN: 378-26-138420-01
221
www.iaetsd.in
ISBN: 378-26-138420-01
[7] Yao Wang[Ya Wan, 05 ]. Peerto-peer networks are networks in which all
peers cooperate with each other to perform
article function in a decentralized manner
All peers are both users and providers of
resources and can access each other directly
without intermediary agents. Compared with
a centralized system, a peer-to-peer (P2P)
system provides an easy way to aggregate
large amounts of resource residing on the
edge of Internet or in ad-hoc networks with
a low cost of system maintenance.
fuzzy
logic
uses
of
System
storage, selection
anonymity.
05].
servers,
222
www.iaetsd.in
ISBN: 378-26-138420-01
A. Method
cycle
223
www.iaetsd.in
ISBN: 378-26-138420-01
B. Attacker Model
Attackers can perform service-based
and
recommendation
based
attacks.
Uploading a virus infected or an inauthentic
file is a service-based attack. Giving a
misleading recommendation intentionally is
a recommendation-based attack.
A. CONCLUSION
Trust model for P2P networks is
presented, in which a peer can develop a
trust network in its proximity. A peer can
isolate malicious peers around itself as it
develops trust relationships with good peers.
Two context of trust, service and
recommendation contexts, are defined to
measure capabilities of peers in providing
services and giving recommendations.
Interactions and recommendations are
considered with satisfaction, weight, and
fading effect parameters. A recommendation
contains
the
recommenders
own
experience,
information
from
its
acquaintances, and level of confidence in the
recommendation.
These
parameters
provided us a better assessment of
trustworthiness. Individual, collaborative,
and pseudonym changing attackers are
studied in the experiments. Damage of
collaboration and pseudo spoofing is
dependent to attack behavior. Although
recommendations
are
important
in
hypocritical
discriminatory
attackers.
Attacks in most experiments. However, in
extremely malicious environments such as a
50 percent malicious network, collaborators
can continue to disseminate large amount of
misleading recommendations. Another issue
about SORT is maintaining trust all over the
network. If a peer changes its point of
attachment to the network, it might lose a
part of its trust network. These issues might
be studied as a future work to extend the
trust model. Using trust information does
not solve all security problems in P2P
systems but can enhance security and
effectiveness of systems. If interactions are
224
www.iaetsd.in
ISBN: 378-26-138420-01
B. Future Work
Managing trust is a problem of
particular importance in peer-to-peer
environments
where
one
frequently
encounters unknown agents. We present an
approach that addresses the problem of
reputation-based trust management at both
th data management and the scientific level.
We employ at both levels scalable data
structures and algorithm that require no
central control and allows assessing trust by
computing any agents reputation from its
former interactions with other agents. Thus
the method can be implemented in a p2p
environment and scales well for very large
number of participants. We expect that
scalable methods for trust management are
an important factor, if fully decentralized
peer-to-peer systems should become the
platform for more serious applications than
simple exchange.
Reference
[1] A Robust and Scalable Reputation
System for Trusted Peer-to-Peer
Computing: Run fang Zhou, Kai Hwang.,[R
Zhou, Kai Hw,06]
225
www.iaetsd.in