Managing Trust Relationships in Peer 2 Peer Systems

R.S.SINJU, C.FELSY

Abstract: Peer-2-Peer system exposes them to malicious activity. Peer-2-Peer system means computer in the system can act as both client and server. In a Peer-2-Peer network, the peers are computer systems which are connected to each other via the internet. Files can be shared directly between systems on the network without the need of a central server. Building trust relationships among peers can decrease the attacks of malicious peers. A good peer uploads authentic files and gives fair recommendations. A malicious peer performs both service and recommendation-based attacks. Uploading a virus infected (or) an inauthentic file is a service based attack. Giving a misleading recommendation intentionally is a recommendation based attack. Self Organizing Trust Model (SORT) detects the service based attack and recommendation based attack. If one peer wants to upload/download file from another peer means peer will send the query to peer that interacted in the past for learn the trust information of other peers. So, neighboring node will give the recommendation to peer. Based on the recommendation only Peer decides whether the node is good (or) malicious. Find the node is malicious node means peer will not interact with malicious node. Isolate the malicious node from the network. Find the node is good means peer interact with good peer. Peer stores a separate history of interactions for each Acquaintance.

Keywords: Peer-to-peer systems, trust management, reputation, security.

TItle: Managing Trust Relationships in Peer 2 Peer Systems

Author: R.S.SINJU, C.FELSY

International Journal of Computer Science and Information Technology Research

ISSN 2348-120X (online), ISSN 2348-1196 (print)

Research Publish Journals

Vol. 2, Issue 2, April - June 2014

Citation
Share : Facebook Twitter Linked In

Citation
Managing Trust Relationships in Peer 2 Peer Systems by R.S.SINJU, C.FELSY