CFP last date
20 January 2025
Reseach Article

A Depth Survey on Peer to Peer Systems

by G. Selvavinayagam, U. Sahana
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 86 - Number 15
Year of Publication: 2014
Authors: G. Selvavinayagam, U. Sahana
10.5120/15063-3502

G. Selvavinayagam, U. Sahana . A Depth Survey on Peer to Peer Systems. International Journal of Computer Applications. 86, 15 ( January 2014), 35-37. DOI=10.5120/15063-3502

@article{ 10.5120/15063-3502,
author = { G. Selvavinayagam, U. Sahana },
title = { A Depth Survey on Peer to Peer Systems },
journal = { International Journal of Computer Applications },
issue_date = { January 2014 },
volume = { 86 },
number = { 15 },
month = { January },
year = { 2014 },
issn = { 0975-8887 },
pages = { 35-37 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume86/number15/15063-3502/ },
doi = { 10.5120/15063-3502 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:04:18.864156+05:30
%A G. Selvavinayagam
%A U. Sahana
%T A Depth Survey on Peer to Peer Systems
%J International Journal of Computer Applications
%@ 0975-8887
%V 86
%N 15
%P 35-37
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

A trust model for P2P networks is presented, in which a peer can develop a trust network in its proximity. A peer can isolate malicious peers around itself as it develops trust relationships with good peers. Two context of trust, service and recommendation contexts are defined to measure capabilities of peers in providing services and giving recommendations. Interactions and recommendations are considered with satisfaction, weight, and fading effect parameters. A recommendation contains the recommender's own experience, information from its acquaintances, and level of confidence in the recommendation. These parameters provided us a better assessment of trustworthiness. Individual, collaborative, and pseudonym changing attackers are studied in the experiments. Damage of collaboration and pseudo spoofing is dependent to attack behavior. Although recommendations are important in hypocritical and oscillatory attackers, pseudo spoofers, and collaborators, they are less useful in naive and discriminatory attackers.

References
  1. Ahmet Burak Can and Bharat Bhargava . "SORT: A Self ORganizing Trust Model for Peer-to-Peer Systems", IEEE Trans. Dependable And Secure Computing, VOL. 10, NO. 1. JANUARY/FEBRUARY 2013.
  2. M. Srikanth and K. B. Madhuri, "Secure and Effective P2P Reputation System using Trust Management and Self Certified Cryptographic Exchanges", IJCSI International Journal of Computer Science Issues, Vol. 10, Issue 2, No 2, March 2013
  3. S. Kamvar, M. Schlosser, and H. Garcia-Molina, "The (Eigen trust) Algorithm for Reputation Management in P2P Networks," Proc. 12th World Wide Web Conf. (WWW), 2003.
  4. A. A. Selcuk, E. Uzun, and M. R. Pariente, "A Reputation-Based Trust Management System for P2P Networks," Proc. IEEE/ACM Fourth Int'l Symp. Cluster Computing and the Grid (CCGRID), 2004.
  5. R. Zhou, K. Hwang, and M. Cai, "Gossip trust for Fast Reputation Aggregation in Peer-to-Peer Networks," IEEE Trans. Knowledge and Data Eng. , vol. 20, no. 9, pp. 1282-1295, Sept. 2008.
  6. M. Ripeanu, I. Foster, and A. Iamnitchi, "Mapping the Gnutella Network: Properties of Large-Scale Peer-to-Peer Systems and Implications for System Design," IEEE Internet Computing, vol. 6, no. 1, pp. 50-57, Jan. 2002.
  7. S. Marsh, "Formalising Trust as a Computational Concept," PhD thesis, Dept. of Math. And Computer Science, Univ. of Stirling, 1994.
Index Terms

Computer Science
Information Sciences

Keywords

Trust management Reputation peer to peer systems security