Ambit lick Solutions
Mail Id: Ambitlick@gmail.com , Ambitlicksolutions@gmail.Com
9. SORT: A Self-ORganizing Trust Model fo...
Upcoming SlideShare
Loading in...5
×

Sort a self o rganizing trust model for peer-to-peer systems

452

Published on


Bulk Projects For sale

IEEE 2009-10-11-12-13 PAPERS AVILABLE.

We are providing low cost project for final year student projects.

Solved 2010 -2011 -2012 - 2013 IEEE in all the domain

Mobile : 8940956123

E-Mail : ambitlick@gmail.com,

INNOVATIVE TITLES ARE ALSO WELLCOME TO DO WITH US


For All BE/BTech, ME/MTech, MSC/MCA/MS , and diplamo graduates

PROJECT SUPPORTS & DELIVERABLES

•Project Abstract
•IEEE Paper
•PPT / Review Details
•Project Report
•Working Procedure in Video
•Screen Shots
•Materials & Books in CD
•Project Certification

0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
452
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
4
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Transcript of "Sort a self o rganizing trust model for peer-to-peer systems"

  1. 1. Ambit lick Solutions Mail Id: Ambitlick@gmail.com , Ambitlicksolutions@gmail.Com 9. SORT: A Self-ORganizing Trust Model for Peer-to-Peer Systems Open nature of peer-to-peer systems exposes them to malicious activity. Building trust relationships among peers can mitigate attacks of malicious peers. This paper presents distributed algorithms that enable a peer to reason about trustworthiness of other peers based on past interactions and recommendations. Peers create their own trust network in their proximity by using local information available and do not try to learn global trust information. Two contexts of trust, service, and recommendation contexts, are defined to measure trustworthiness in providing services and giving recommendations. Interactions and recommendations are evaluated based on importance, recentness, and peer satisfaction parameters. Additionally, recommender’s trustworthiness and confidence about a recommendation are considered while evaluating recommendations. Simulation experiments on a file sharing application show that the proposed model can mitigate attacks on 16 different malicious behavior models. In the experiments, good peers were able to form trust relationships in their proximity and isolate malicious peers.

×