Downloads: 119 | Views: 310
Research Paper | Computer Science & Engineering | India | Volume 3 Issue 10, October 2014 | Popularity: 6.4 / 10
A Novel Routing Protocol to Enhance Trust in P2P Networks
Uppula Nagaiah, G. Kiran Kumar
Abstract: Accessible and hidden nature of peer to peer system makes it an ideal forum for traducer to spread malignant content. Managing trust is a problem in peer to peer environment, so a novel trust model is built supported on trust metrics. The trust metrics such as service trust, reputation and recommendation trust are defined to precisely measure trustworthiness of peers. A peers trustworthiness is evaluated by considering provided services and given recommendations with service and recommendation contexts. An interaction is evaluated based on importance, recentness and three parameters: satisfaction, weight, fading effect, when evaluating recommendation, recommenders trustworthiness and confidence level about the information provided are also considered. Experiments on file sharing application demonstrate that peers with the highest trust value are considered and build the trust model in their contiguity and insulate malignant peers.
Keywords: Accessible and hidden nature of peer to peer system makes it an ideal forum for traducer to spread malignant content Managing trust is a problem in peer to peer environment, so a novel trust model is built supported on trust metrics The trust metrics such as service trust, reputation and recommendation trust are defined to precisely measure trustworthiness of peers A peers trustworthiness is evaluated by considering provided services and given recommendations with service and recommendation contexts An interaction is evaluated based on importance, recentness and three parameterssatisfaction, weight, fading effect, when evaluating recommendation, recommenders trustworthiness and confidence level about the information provided are also considered Experiments on file sharing application demonstrate that peers with the highest trust value are considered and build the trust model in their contiguity and insulate malignant peers
Edition: Volume 3 Issue 10, October 2014
Pages: 1637 - 1642
Make Sure to Disable the Pop-Up Blocker of Web Browser
Downloads: 656 | Views: 2004
Computer Science & Engineering, India, Volume 9 Issue 7, July 2020
Pages: 1454 - 1458Heart Disease Prediction with Machine Learning Approaches
Megha Kamboj
Downloads: 401 | Views: 722
Computer Science & Engineering, India, Volume 7 Issue 11, November 2018
Pages: 1951 - 1955Hadoop Performance Improvement using Metadata and Securing with Oauth Token
Swapnali A. Salunkhe, Amol B. Rajmane
Downloads: 386 | Views: 703
Computer Science & Engineering, India, Volume 9 Issue 12, December 2020
Pages: 1 - 3Comparative Study of Conventional Desktop Computer and Compute Stick
Aadarsh Sooraj, Sooraj G.
Downloads: 354 | Views: 700
Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 629 - 632Review Paper on Secure Hashing Algorithm and Its Variants
Priyanka Vadhera, Bhumika Lall
Downloads: 336 | Views: 690
Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 2148 - 2152The Impact and Application of 3D Printing Technology
Thabiso Peter Mpofu, Cephas Mawere, Macdonald Mukosera