Maintaining Trust Relationships between Peer – To – Peer Systems
Abstract
This paper presents an automated trust model which takes into consideration peers past interaction and recommendations to choose trustworthy peer. While evaluating trustworthiness parameters like importance, recentness and peer satisfaction is taken into consideration. Recommenders’ trustworthiness and confidence about a recommendation are also considered while evaluating recommendations. We have implemented access control technology in the P2P file sharing system and for that we have used symmetric encryption with shared secrete key. Proposed automated trust model can mitigate attacks on different malicious behavior models
An interaction is evaluated based on importance, recentness and three parameters: satisfaction, weight, fading effect, when evaluating recommendation, recommender’s trustworthiness and confidence level about the information provided are also considered. Experiments on file sharing application demonstrate that peers with the highest trust value are considered and build the trust model in their contiguity and insulate malignant peers.
An interaction is evaluated based on importance, recentness and three parameters: satisfaction, weight, fading effect, when evaluating recommendation, recommender’s trustworthiness and confidence level about the information provided are also considered. Experiments on file sharing application demonstrate that peers with the highest trust value are considered and build the trust model in their contiguity and insulate malignant peers.
Keywords
trustworthiness; Peer-to-peer; recommendations
Full Text:
PDFCopyright (c) 2015 Kiran P, K.S. Vijaya Simha
![Creative Commons License](http://licensebuttons.net/l/by-nc-sa/4.0/88x31.png)
This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
All published Articles are Open Access at https://journals.pen2print.org/index.php/ijr/
Paper submission: ijr@pen2print.org