We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 December 2024
Reseach Article

False Proof Reputation Management for P2P Networks

by V. Thejaswini Reddy, B. Lalitha
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 42 - Number 8
Year of Publication: 2012
Authors: V. Thejaswini Reddy, B. Lalitha
10.5120/5710-7763

V. Thejaswini Reddy, B. Lalitha . False Proof Reputation Management for P2P Networks. International Journal of Computer Applications. 42, 8 ( March 2012), 1-7. DOI=10.5120/5710-7763

@article{ 10.5120/5710-7763,
author = { V. Thejaswini Reddy, B. Lalitha },
title = { False Proof Reputation Management for P2P Networks },
journal = { International Journal of Computer Applications },
issue_date = { March 2012 },
volume = { 42 },
number = { 8 },
month = { March },
year = { 2012 },
issn = { 0975-8887 },
pages = { 1-7 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume42/number8/5710-7763/ },
doi = { 10.5120/5710-7763 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:30:45.769888+05:30
%A V. Thejaswini Reddy
%A B. Lalitha
%T False Proof Reputation Management for P2P Networks
%J International Journal of Computer Applications
%@ 0975-8887
%V 42
%N 8
%P 1-7
%D 2012
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The wide qualities of peer-to-peer (P2P) network have given us many advantages and threats for enhancement of distributed computing. The best way to reduce threats is adding a reputation-based globally trusted model. Many present trust models are failing to restrain effectively some behaviors like collusive attacks, but pay no heed towards the security of this mechanism.

References
  1. Prashant Dewan and Partha Dasgupta,"P2P Reputation Management Using Distributed Identities and Decentralized Recommendation Chains", IEEE Transaction On Knowledge and Data Engineering, VOL. 22, NO. 7, JULY 2010, PP. 1000-1013.
  2. M. Ripeanu, I. Foster, and A. Iamnitchi, "Mapping the gnutella network: Properties of large-scale peer-to-peer systems and implications for system design," IEEE Internet Computing Journal, vol. 6, no. 1, 2002.
  3. S. Ratnasamy, P. Francis, M. Handley, R. Karp, and S. Shenker, "A scalable content addressable network," in ACM SIGCOMM, Aug. 2001.
  4. E. Adar and B. A. Huberman,"Free Riding on Guntella" Tech. Rep. Xerox PARC 2000.
  5. N. Li and J. C. Mitchell,"RT:A Role Based Trust management frame work",proc. Third DARPA Information survivability conference and Exposition(DISCEX III)Apr,2003.
  6. S. Saroiu, P. K. Gummadi, and S. D. Gribble, A measurement study of peer-to-peer sharing systems," in SPIE Conference on Multimedia Computing and Networking (MMCN), Jan. 2002.
  7. Karl. Aberer and Z. Despotovic, "Managing trust in a peer-2-peer information system," in Ninth International Conference on Information and Knowledge Management (CIKM), Nov. 2001.
  8. S. D. Kamvar, M. Schlosser, and H. Garcia-Molina, "Eigenrep: Reputation management in p2p networks," Unpublished work, 2003.
  9. I. Stoica, R. Morris, D. Karger, F. Kaashoek, and H. Balakrishnan, "Chord: A scalable Peer-To-Peer lookup service for internet applications," in ACM SIGCOMM, Aug. 2001, PP. 149-160.
  10. J. Docuccur,"The Sybil attack", proc IPTPS 02 workshop 2002.
  11. Gnucleus home page," http://www. gnucleus. com/.
  12. P. Resnick, R. Zeckhauser, E. Friedman and K. Kuwabara "Reputation systems" communication ACM, Vol 43 PP 44-45 Dec 2000.
  13. eBay website www. ebay. com.
  14. C. Dellarocas,"immunizing online reputation reporting systems against unfair ratings and discriminating behavior", Proc. ACM Conf. Electronic Commerce. PP. 150-157, oct 2000.
  15. R. Dewan,"Injecting Trust in peer-to-peer systems", technical report, Arizona state univ 2002.
  16. L. Rivest and B. Lampson,"SDSI: A simple distributed security infrastructure" proc. crypto 96 pp 104-109 aug 1996.
  17. R. L. Rivest, A. shamir and L. adleman. "A method for obtaining digital signatures and public-key cryptosystems communications" of the ACM, Feb 1978 21(2):120-126
  18. J. M. Park, E. Chong, H. J. Siegel and I. Ray "constructing fair exchange protocols for e-commerce via distributed computations of RSA signatures" In: Proc of 22th annual ACM symp on principles of distributed computing (PODC'03) PP 172-181.
  19. R. Gennaro, T. Rabin and H. Krawczyk. "RSA based undeniable signature journal of cryptology" 13(4):397-416, 2000. A preliminary version of this paper appeared in the proceedings of CRYPTO'97.
Index Terms

Computer Science
Information Sciences

Keywords

Peer-to-peer Networks Distributed System Reputation-based Trust Model Security