SlideShare a Scribd company logo
1 of 39
A Novel Approach for Trust
Management in Peer-Peer Network
System
Guided By:
Dr. A.V.K.SHANTHI M.Sc., M.Phill., Ph.D
Presented by:
SNEHITH PANGULURI (3011211)
TUMMALA SATYAKAMA (3011298)
Abstract
 Malicious attacks are a major problem in peer to peer networks. To overcome this
problem, trust relations are shared with the peers in proximity within the network.
The trust relationship is made based upon the local level information, but not the
global level information. Distributed algorithm is used to make trust relations from
the past transactions and recommendations.
 SORT provides services and giving recommendation to the peers using two
different metrics. They are service and recommendation metrics. The service metric
is used to give the service to the peers and the recommendation metric is used to
give the recommendations to the system. The interaction and recommendations are
evaluated based on the recentness, importance and peer satisfaction parameters. It
evaluates the recommendations for finding the trustworthiness of recommendation
and confidence of the recommendation.
 This work deals with the issues of network security and attacks. By implementing
the SORT model, malicious activity on peer to peer networks is reduced. Trust and
reputation information that is passed across the peers in the network is used as the
main factor to find the peers that are trustworthy.
Objective
 The proposed system, Self-Organizing Trust model (SORT) that aims to decrease
malicious activity in a P2P system by establishing trust relations among peers in
their proximity.
 The final node in the chain of mimics acts as the Network Address Translator(NAT)
for the transport layer, and sends the packet to its final destination through the
Internet. This final node must know the content and destination, but has no
information about the sender.
 Web Services Trust Language brings trust management into the environment of web
services. The core proposition remains generally unchanged: the Web Service
(verifier) is accepting a request if the request contains proofs of credentials that
satisfy the a Web Service.
Introduction
 PEER-PEER:- It’s a decentralized network, in which all the in the network
acts as client and server.
 REPUTATION:- A peer’s trust in another peer based on the experiences of
other peers.
 TRUST:- A peer’s trust in other peers based on his own past experience.
 SORT:- Self-Organizing Trust model (SORT) that aims to decrease malicious
activity in a P2P system by establishing trust relations among peers in their
proximity.
 NS:- Network Simulator, A package of tools that simulates behavior of
networks. NS are a discrete event simulator targeted at networking
research.
Sl.
No
Year Researchers Discussions Description
1 2006 R. Zhou, K. Hwang,
and M. Cai,
“Gossiptrust
Fast Reputation Aggregation in Peer-to-
Peer Networks
In peer-to-peer (P2P) networks,
reputation aggregation and ranking
are the most time-consuming and
space-demanding operations.
2 2007 A. Jøsang, R. Ismail,
and C. Boyd
A Survey of Trust and Reputation
Systems for Online Service Provision
Trust and reputation systems
represent a significant trend in
decision support for Internet
mediated service provision.
3 2008 H. Yu, M. Kaminsky,
P.B. Gibbons, and A.
Flaxman
Sybil guard: Defending against Sybil
Attacks via Social Networks
Peer-to-peer and other
decentralized, distributed systems
are known to be particularly
vulnerable to Sybil attacks.
Literature Survey
Literature Survey (Contd.)
Sl. No Year Researchers Discussions Description
4 2010 Bin Yu, Muninder P.
Singh
Propogation of Trust and Distrust Obtaining user opinion (using votes) is
essential to ranking user-generated
online content. However, any content
voting system is susceptible to the Sybil
attack where adversaries can out-vote
real users by creating many Sybil
identities
5 2011 Li Xiong,
Ling Lin
Peer Trust: Supporting reputation based trust
for Peer-Peer Electronic Communication.
Reputation systems provide mechanisms
to produce a metric encapsulating
reputation for a given domain for each
identity within the system.
6 2011 Bin Yu,
Muninder P. Singh
A Social Mechanism of reputation
management in Electronic Communities
Internet commerce and online
commodity exchanges suffer from
distrust among sellers and buyers, who
are often strangers to each other.
Problem Statement
The existing system has a problem of how to
trace the users behavior dynamically and
guarantee that their behavior is within the
limits imposed by the role they hold.
The number of uncertain interpretations is
evaluated during build trust relationship.
This increases the resource usage.
Existing system
 In existing system, RBAC (Role Based Access Control)
methods for building secure systems that operate efficiently
in large-scale environments is used.
 Adapting RBAC to enforce security in the Web is
increasingly seen as a solution for scalability issues,
because permissions are associated to roles instead of users
and the number of roles is much smaller than the number of
users.
 The merit of the existing system is to build a prototype of a
Role Server that securely assigns roles to users.
Proposed System
 To overcome the problem identified in the existing system, the method of SORT is
used. SORT provides services to the system and giving recommendations about
another system to the peer as different tasks.
 The SORT defines two contexts of trust. One is service and another is
recommendation contexts. Information about past interactions and
recommendations are stored in separate histories to assess competence and integrity
of acquaintances in these contexts.
 The recommendation trust metric is important when requesting recommendations.
When calculating the reputation metric, recommendations are evaluated based on
the recommendation trust metric.
 Recommender’s trustworthiness and confidence about recommendation are
considered when evaluating recommendations. Additionally, service and
recommendation contexts are separated. This enabled us to measure trustworthiness
in a wide variety of attack scenarios. Most trust models do not consider how
interactions are rated and assume that a rating mechanism exists.
System Architecture
Algorithms
SORT algorithm.
 In SORT, instead of considering a particular trust holder’s
feedback as authentic, public opinion from all acquaintances is
considered as more credible information.
Modules
1) Cluster head selection
2) Issue certificate
3) Validate certificate
4) Revoke function
5) Reconstruction of peer
Module Explanation
CLUSTER HEAD SELECTION:-
 The cluster is formed on that peer to peer network. From that cluster we have to
choose one head called cluster head. For that cluster selection, the cluster members
in the cluster send the hello packet to the nearest members.
 Clustering, one of the fundamental data mining tasks, in P2P systems. Clustering,
which groups a set of data objects into clusters of similar data objects, can be
applied in many different problem domains, such as spatial data analysis, scientific
pattern discovery, document categorization, taxonomy generation, customer/market
analysis, etc. Various clustering techniques have been proposed for either
centralized systems or distributed systems.
 In addition, these clustering techniques were designed to minimize the computation
cost and/or disk access cost. However, minimization of the communication cost is
the primary goal for the design of clustering techniques in P2P systems.
ISSUE CERTIFICATE:-
 The certificate means we generate the signature for each and every peer in the peer
network. There are two different kinds of attacks are involved in the peer
construction. To resolve or identify these two attacks we issue the certificate to each
peer.
 After selecting the cluster head then issue the certificate to the peers for security
purpose. The certificate means that to generate the signature for each and every
peer in the peer network. There are two different kinds of attacks are involved in the
peer construction. They are service attack and recommendation attack. Service
attack means providing the misbehave service to the peer. Recommendation attack
means recommending the unauthorized peer for the transaction.
 To resolve or identify these two attacks we issue the certificate to each peer. And
also it gives some access control permission to the system for more security. The
permissions are read write and forward permissions. This is the future concept we
implement it. The access permission is provided to the system because the SORT is
trust worthiness and maintains more security.
VALIDATE CERTIFICATE:-
 In that situation the certificate is verified. This means the created signature
is verified. We can transmit the file from one peer system to another peer in
secure manner.
 The process of certificate validation takes place simultaneously with
various aspects of the program. After the certificate is successfully
validated, the process transfers to the next level where the information is
secured and the certificate is then revoked using the revoke function.
 At the certificate validation level, the network is simulated on the basic
principle of certificate validation. The validated certificate contains
information that explains the reputation metrics of all the peers. In simple
terms can be said as between the sender and receiver.
 This model is very exhaustive as the information between both the peers is
passed, the necessary certificates that explain to the network the reputation
of these peers in the neighborhood.
REVOKE FUNCTION:-
 The Revoke function is used for preventing the system from the two attacks
such as service based attack and recommendation based attack. These two
peer can be revoked and act as normal peer for transaction. These
operations are performed in the revoke function. First it identifies which
peer can act as malicious during the transaction after that it revokes or
changes the malicious peer into the normal peer. This process is called as
the revoke function.
 The revoke function acts to stop the functions of the certificate and all other
activities of that certificate. The actual implementation of this function is
that the certificate and all the associated functions of this certificate are
revoked and are dumped as well.
 This module of the program ensures that the certificate is revoked
completely and the this function also helps to reduce any malicious activity
that is to take place in this program successfully using the above explained
trust model that is the basis and structure of the complete program.
RECONSTRUCTION OF PEER:-
 The final stage is the reconstruction of peers. Once it identifies and
removes the attacks present in the peer to peer system, the network
will be reconstructed. This reconstruction network or the peer to
peer system act as the self organized and provide more security.
 For that reason, it has to reconstruct our network. The reconstructed
system does not contain not contain any malicious peer. It acts as a
good peer.
 Using this functional module of the program, the peers are
reconstructed using the explained trust model. The process restarts
from the beginning with the resection of the program with all its
modules successfully and executing all the modules in the code.
Nam Generator
Node Formation
Cluster Formation
Cluster Head Selection
Issue Certificate
Validate Certificate
Revoke Function
Reconstruction of peer
Performance Analysis
X Axis: Frequency Y Axis: Time
(Cont…)
 When the communication between two peers is
happening, the frequency will be shown high. It may
have some malicious attacks while the
communication is done. To overcome the attacks the
certificate is being issued to the peers. It will reduce
the time and gives more secure data.
Output
Conclusion
 A new approach is proposed for trust management in peer to peer network
communications. It will generate the own peer networks, after that it forms
the cluster in the peer networks. Each cluster member in the cluster sends
the hello packets to each other. From those packets they choose the cluster
head for providing services.
 The service based attacks and recommendation based attacks are involved.
To overcome and identify these attacks the certificate authority to each
member in the cluster is done. Certificate authority means first it issue the
certificate to the each nodes in the network and then it uploads the files
from one system to another. That situation the certificate is validated.
 The revoke function is used to resolve the two attacks and make the system
as normal node. After that it reconstructs the network. That network
contains only good peer not the malicious attacker in the network.
Future work
 The current model SORT can be extended in various
new dimensions to serve for some real time application
models that have peers spread across a large extent and
also ensure faster and smarter data flow across with
better redundancy and can also create a system that is
sustainable for the future, through all the advancements
that may come into existence in the future with it’s
better packet routing over the peer network
environment.
References
[1] Abdul-Rahman.S and Hailes.S, “Supporting Trust in Virtual Communities,” Proc.
33rd Hawaii Int’l Conf. System Sciences (HICSS), 2000.
[2] Almeroth.K.C, Swamynathan.G and Zhao.B.Y, “Decoupling Service and Feedback
Trust in a Peer-to-Peer Reputation System,” Proc. Int’l Conf. Parallel and
Distributed Processing and Applications (ISPA), 2005.
[3] Atallah.M, Bhargava.B, Chuang.J, Habib.A and Xu.D, “A Tree- Based Forward
Digest Protocol to Verify Data Integrity in Distributed Media Streaming,” IEEE
Trans. Knowledge and Data Eng., vol. 17, no. 7, pp. 1010-1014, July 2005.
[4] Bhattacharjee.B, Lee.S, and Sherwood.R, “Cooperative Peer Groups in Nice,”
Computer Networks, vol. 50, no. 4, pp. 523-544, 2006.
[5] Boyd.S, Ghosh.A, Prabhakar.B, and Shah.D, “Randomized Gossip Algorithms,”
IEEE/ACM Trans. Networking, vol. 52, no. 6, pp. 2508-2530, June 2006.
(Cont…)
[6] Boyd.S, Ismail.R, and Jøsang.A, “A Survey of Trust and Reputation Systems for
Online Service Provision,” Decision Support Systems, vol. 43, no. 2, pp. 618-644,
2007.
[7] Cai.M, Hwang.K and Zojkua.C, “Gossiptrust for Fast Reputation Aggregation in
Peer-to-Peer Networks,” IEEE Trans. Knowledge and Data Eng., vol. 20, no. 9, pp.
1282-1295, Sept. 2008
[8] Can.A.B, “Trust and Anonymity in Peer-to-Peer Systems,” PhD thesis, Dept. of
Computer Science, Purdue Univ., 2007.
[9] Chandrasekaran.M, Jadliwala.M, Upadhyaya.S and Virendra.M, “Quantifying Trust
in Mobile Ad-Hoc Networks,” Proc. IEEE Int’l Conf. Integration of Knowledge
Intensive Multi-Agent Systems (KIMAS), 2005.
[10] Cornelis.C, De Cock.M, Pinheiro da Silva.P and Victor.P, “Gradual Trust and
Distrust in Recommender Systems,” Fuzzy Sets Systems, vol. 160, no. 10, pp.
1367-1382, 2009.
A novel approach for trust management for peer peer

More Related Content

What's hot

Privacy preserving distributed profile matching in proximity-based mobile soc...
Privacy preserving distributed profile matching in proximity-based mobile soc...Privacy preserving distributed profile matching in proximity-based mobile soc...
Privacy preserving distributed profile matching in proximity-based mobile soc...IEEEFINALYEARPROJECTS
 
A Computational Dynamic Trust Model for User Authorization
A Computational Dynamic Trust Model for User AuthorizationA Computational Dynamic Trust Model for User Authorization
A Computational Dynamic Trust Model for User Authorization1crore projects
 
Trustworthy Service Enhancement in Mobile Social Network
Trustworthy Service Enhancement in Mobile Social NetworkTrustworthy Service Enhancement in Mobile Social Network
Trustworthy Service Enhancement in Mobile Social Networkijsrd.com
 
TRUST MODEL WITH DEFENSE SCHEME IN MANETS
TRUST MODEL WITH DEFENSE SCHEME IN MANETS TRUST MODEL WITH DEFENSE SCHEME IN MANETS
TRUST MODEL WITH DEFENSE SCHEME IN MANETS IAEME Publication
 
Social Network Analysis
Social Network AnalysisSocial Network Analysis
Social Network AnalysisWael Elrifai
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
Exploiting service similarity for privacy in location based search queries
Exploiting service similarity for privacy in location based search queriesExploiting service similarity for privacy in location based search queries
Exploiting service similarity for privacy in location based search queriesShakas Technologies
 
Location based spatial query processing in wireless broadcast environments(sy...
Location based spatial query processing in wireless broadcast environments(sy...Location based spatial query processing in wireless broadcast environments(sy...
Location based spatial query processing in wireless broadcast environments(sy...Mumbai Academisc
 
Privacy preserving relative location based services for mobile users
Privacy preserving relative location based services for mobile usersPrivacy preserving relative location based services for mobile users
Privacy preserving relative location based services for mobile usersLeMeniz Infotech
 
An efficient distributed trust model for wireless sensor networks
An efficient distributed trust model for wireless sensor networksAn efficient distributed trust model for wireless sensor networks
An efficient distributed trust model for wireless sensor networksPvrtechnologies Nellore
 
A novel approach a hybrid semantic
A novel approach a hybrid semanticA novel approach a hybrid semantic
A novel approach a hybrid semanticIJNSA Journal
 
Privacy protection for role based access control in service oriented architec...
Privacy protection for role based access control in service oriented architec...Privacy protection for role based access control in service oriented architec...
Privacy protection for role based access control in service oriented architec...IJNSA Journal
 
An efficient distributed trust model for wireless sensor networks
An efficient distributed trust model for wireless sensor networksAn efficient distributed trust model for wireless sensor networks
An efficient distributed trust model for wireless sensor networksLogicMindtech Nologies
 

What's hot (16)

Privacy preserving distributed profile matching in proximity-based mobile soc...
Privacy preserving distributed profile matching in proximity-based mobile soc...Privacy preserving distributed profile matching in proximity-based mobile soc...
Privacy preserving distributed profile matching in proximity-based mobile soc...
 
A Computational Dynamic Trust Model for User Authorization
A Computational Dynamic Trust Model for User AuthorizationA Computational Dynamic Trust Model for User Authorization
A Computational Dynamic Trust Model for User Authorization
 
Agent basedqos
Agent basedqosAgent basedqos
Agent basedqos
 
Trustworthy Service Enhancement in Mobile Social Network
Trustworthy Service Enhancement in Mobile Social NetworkTrustworthy Service Enhancement in Mobile Social Network
Trustworthy Service Enhancement in Mobile Social Network
 
Introductionto agents
Introductionto agentsIntroductionto agents
Introductionto agents
 
TRUST MODEL WITH DEFENSE SCHEME IN MANETS
TRUST MODEL WITH DEFENSE SCHEME IN MANETS TRUST MODEL WITH DEFENSE SCHEME IN MANETS
TRUST MODEL WITH DEFENSE SCHEME IN MANETS
 
Social Network Analysis
Social Network AnalysisSocial Network Analysis
Social Network Analysis
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
Exploiting service similarity for privacy in location based search queries
Exploiting service similarity for privacy in location based search queriesExploiting service similarity for privacy in location based search queries
Exploiting service similarity for privacy in location based search queries
 
Location based spatial query processing in wireless broadcast environments(sy...
Location based spatial query processing in wireless broadcast environments(sy...Location based spatial query processing in wireless broadcast environments(sy...
Location based spatial query processing in wireless broadcast environments(sy...
 
Privacy preserving relative location based services for mobile users
Privacy preserving relative location based services for mobile usersPrivacy preserving relative location based services for mobile users
Privacy preserving relative location based services for mobile users
 
An efficient distributed trust model for wireless sensor networks
An efficient distributed trust model for wireless sensor networksAn efficient distributed trust model for wireless sensor networks
An efficient distributed trust model for wireless sensor networks
 
A novel approach a hybrid semantic
A novel approach a hybrid semanticA novel approach a hybrid semantic
A novel approach a hybrid semantic
 
Privacy protection for role based access control in service oriented architec...
Privacy protection for role based access control in service oriented architec...Privacy protection for role based access control in service oriented architec...
Privacy protection for role based access control in service oriented architec...
 
PACE-IT, Security + 5.1: Summary of Authentication Services
PACE-IT, Security + 5.1: Summary of Authentication ServicesPACE-IT, Security + 5.1: Summary of Authentication Services
PACE-IT, Security + 5.1: Summary of Authentication Services
 
An efficient distributed trust model for wireless sensor networks
An efficient distributed trust model for wireless sensor networksAn efficient distributed trust model for wireless sensor networks
An efficient distributed trust model for wireless sensor networks
 

Similar to A novel approach for trust management for peer peer

Sort a self organizing trust model for peer-to-peer systems
Sort a self organizing trust model for peer-to-peer systemsSort a self organizing trust model for peer-to-peer systems
Sort a self organizing trust model for peer-to-peer systemsIEEEFINALYEARPROJECTS
 
JAVA 2013 IEEE NETWORKSECURITY PROJECT SORT: A Self-ORganizing Trust Model fo...
JAVA 2013 IEEE NETWORKSECURITY PROJECT SORT: A Self-ORganizing Trust Model fo...JAVA 2013 IEEE NETWORKSECURITY PROJECT SORT: A Self-ORganizing Trust Model fo...
JAVA 2013 IEEE NETWORKSECURITY PROJECT SORT: A Self-ORganizing Trust Model fo...IEEEGLOBALSOFTTECHNOLOGIES
 
IMPROVING HYBRID REPUTATION MODEL THROUGH DYNAMIC REGROUPING
IMPROVING HYBRID REPUTATION MODEL THROUGH DYNAMIC REGROUPINGIMPROVING HYBRID REPUTATION MODEL THROUGH DYNAMIC REGROUPING
IMPROVING HYBRID REPUTATION MODEL THROUGH DYNAMIC REGROUPINGijp2p
 
Sort a self o rganizing trust model for peer-to-peer systems
Sort a self o rganizing trust model for peer-to-peer systemsSort a self o rganizing trust model for peer-to-peer systems
Sort a self o rganizing trust model for peer-to-peer systemsJPINFOTECH JAYAPRAKASH
 
Sort a self o rganizing trust model for peer-to-peer systems
Sort a self o rganizing trust model for peer-to-peer systemsSort a self o rganizing trust model for peer-to-peer systems
Sort a self o rganizing trust model for peer-to-peer systemsJPINFOTECH JAYAPRAKASH
 
Trust Based Content Distribution for Peer-ToPeer Overlay Networks
Trust Based Content Distribution for Peer-ToPeer Overlay NetworksTrust Based Content Distribution for Peer-ToPeer Overlay Networks
Trust Based Content Distribution for Peer-ToPeer Overlay NetworksIJNSA Journal
 
AN EXAUSTIVE SURVEY OF TRUST MODELS IN P2P NETWORK
AN EXAUSTIVE SURVEY OF TRUST MODELS IN P2P NETWORKAN EXAUSTIVE SURVEY OF TRUST MODELS IN P2P NETWORK
AN EXAUSTIVE SURVEY OF TRUST MODELS IN P2P NETWORKijwscjournal
 
AN EXAUSTIVE SURVEY OF TRUST MODELS IN P2P NETWORK
AN EXAUSTIVE SURVEY OF TRUST MODELS IN P2P NETWORKAN EXAUSTIVE SURVEY OF TRUST MODELS IN P2P NETWORK
AN EXAUSTIVE SURVEY OF TRUST MODELS IN P2P NETWORKijwscjournal
 
In this paper we present a necessary and sufficient condition for Hamiltonian...
In this paper we present a necessary and sufficient condition for Hamiltonian...In this paper we present a necessary and sufficient condition for Hamiltonian...
In this paper we present a necessary and sufficient condition for Hamiltonian...graphhoc
 
Rep on the Roll A peer to peer reputation system based on a rolling blockchain
Rep on the Roll A peer to peer reputation system based on a rolling blockchainRep on the Roll A peer to peer reputation system based on a rolling blockchain
Rep on the Roll A peer to peer reputation system based on a rolling blockchainRichard Dennis
 
Making Trust Relationship For Peer To Peer System With Secure Protocol
Making Trust Relationship For Peer To Peer System With Secure  ProtocolMaking Trust Relationship For Peer To Peer System With Secure  Protocol
Making Trust Relationship For Peer To Peer System With Secure ProtocolIJMER
 
A computational dynamic trust model for user authorization
A computational dynamic trust model for user authorizationA computational dynamic trust model for user authorization
A computational dynamic trust model for user authorizationKamal Spring
 
Modelling of A Trust and Reputation Model in Wireless Networks
Modelling of A Trust and Reputation Model in Wireless NetworksModelling of A Trust and Reputation Model in Wireless Networks
Modelling of A Trust and Reputation Model in Wireless Networksijeei-iaes
 
Reputation-Based Consensus for Blockchain Technology in Smart Grid
Reputation-Based Consensus for Blockchain Technology in Smart GridReputation-Based Consensus for Blockchain Technology in Smart Grid
Reputation-Based Consensus for Blockchain Technology in Smart GridIJNSA Journal
 
TRUST ORIENTED SECURITY FRAMEWORK FOR AD HOC NETWORK
TRUST ORIENTED SECURITY FRAMEWORK FOR AD HOC NETWORKTRUST ORIENTED SECURITY FRAMEWORK FOR AD HOC NETWORK
TRUST ORIENTED SECURITY FRAMEWORK FOR AD HOC NETWORKcscpconf
 
A survey on trust based routing in manet
A survey on trust based routing in manetA survey on trust based routing in manet
A survey on trust based routing in manetIAEME Publication
 
A survey on trust based routing in manet
A survey on trust based routing in manetA survey on trust based routing in manet
A survey on trust based routing in manetIAEME Publication
 
Trust management in p2 p systems
Trust management in p2 p systemsTrust management in p2 p systems
Trust management in p2 p systemseSAT Journals
 
PROOF-OF-REPUTATION: AN ALTERNATIVE CONSENSUS MECHANISM FOR BLOCKCHAIN SYSTEMS
PROOF-OF-REPUTATION: AN ALTERNATIVE CONSENSUS MECHANISM FOR BLOCKCHAIN SYSTEMSPROOF-OF-REPUTATION: AN ALTERNATIVE CONSENSUS MECHANISM FOR BLOCKCHAIN SYSTEMS
PROOF-OF-REPUTATION: AN ALTERNATIVE CONSENSUS MECHANISM FOR BLOCKCHAIN SYSTEMSIJNSA Journal
 

Similar to A novel approach for trust management for peer peer (20)

Sort a self organizing trust model for peer-to-peer systems
Sort a self organizing trust model for peer-to-peer systemsSort a self organizing trust model for peer-to-peer systems
Sort a self organizing trust model for peer-to-peer systems
 
JAVA 2013 IEEE NETWORKSECURITY PROJECT SORT: A Self-ORganizing Trust Model fo...
JAVA 2013 IEEE NETWORKSECURITY PROJECT SORT: A Self-ORganizing Trust Model fo...JAVA 2013 IEEE NETWORKSECURITY PROJECT SORT: A Self-ORganizing Trust Model fo...
JAVA 2013 IEEE NETWORKSECURITY PROJECT SORT: A Self-ORganizing Trust Model fo...
 
IMPROVING HYBRID REPUTATION MODEL THROUGH DYNAMIC REGROUPING
IMPROVING HYBRID REPUTATION MODEL THROUGH DYNAMIC REGROUPINGIMPROVING HYBRID REPUTATION MODEL THROUGH DYNAMIC REGROUPING
IMPROVING HYBRID REPUTATION MODEL THROUGH DYNAMIC REGROUPING
 
Sort a self o rganizing trust model for peer-to-peer systems
Sort a self o rganizing trust model for peer-to-peer systemsSort a self o rganizing trust model for peer-to-peer systems
Sort a self o rganizing trust model for peer-to-peer systems
 
Sort a self o rganizing trust model for peer-to-peer systems
Sort a self o rganizing trust model for peer-to-peer systemsSort a self o rganizing trust model for peer-to-peer systems
Sort a self o rganizing trust model for peer-to-peer systems
 
Trust Based Content Distribution for Peer-ToPeer Overlay Networks
Trust Based Content Distribution for Peer-ToPeer Overlay NetworksTrust Based Content Distribution for Peer-ToPeer Overlay Networks
Trust Based Content Distribution for Peer-ToPeer Overlay Networks
 
AN EXAUSTIVE SURVEY OF TRUST MODELS IN P2P NETWORK
AN EXAUSTIVE SURVEY OF TRUST MODELS IN P2P NETWORKAN EXAUSTIVE SURVEY OF TRUST MODELS IN P2P NETWORK
AN EXAUSTIVE SURVEY OF TRUST MODELS IN P2P NETWORK
 
AN EXAUSTIVE SURVEY OF TRUST MODELS IN P2P NETWORK
AN EXAUSTIVE SURVEY OF TRUST MODELS IN P2P NETWORKAN EXAUSTIVE SURVEY OF TRUST MODELS IN P2P NETWORK
AN EXAUSTIVE SURVEY OF TRUST MODELS IN P2P NETWORK
 
In this paper we present a necessary and sufficient condition for Hamiltonian...
In this paper we present a necessary and sufficient condition for Hamiltonian...In this paper we present a necessary and sufficient condition for Hamiltonian...
In this paper we present a necessary and sufficient condition for Hamiltonian...
 
Rep on the Roll A peer to peer reputation system based on a rolling blockchain
Rep on the Roll A peer to peer reputation system based on a rolling blockchainRep on the Roll A peer to peer reputation system based on a rolling blockchain
Rep on the Roll A peer to peer reputation system based on a rolling blockchain
 
Making Trust Relationship For Peer To Peer System With Secure Protocol
Making Trust Relationship For Peer To Peer System With Secure  ProtocolMaking Trust Relationship For Peer To Peer System With Secure  Protocol
Making Trust Relationship For Peer To Peer System With Secure Protocol
 
A computational dynamic trust model for user authorization
A computational dynamic trust model for user authorizationA computational dynamic trust model for user authorization
A computational dynamic trust model for user authorization
 
Modelling of A Trust and Reputation Model in Wireless Networks
Modelling of A Trust and Reputation Model in Wireless NetworksModelling of A Trust and Reputation Model in Wireless Networks
Modelling of A Trust and Reputation Model in Wireless Networks
 
Reputation-Based Consensus for Blockchain Technology in Smart Grid
Reputation-Based Consensus for Blockchain Technology in Smart GridReputation-Based Consensus for Blockchain Technology in Smart Grid
Reputation-Based Consensus for Blockchain Technology in Smart Grid
 
TRUST ORIENTED SECURITY FRAMEWORK FOR AD HOC NETWORK
TRUST ORIENTED SECURITY FRAMEWORK FOR AD HOC NETWORKTRUST ORIENTED SECURITY FRAMEWORK FOR AD HOC NETWORK
TRUST ORIENTED SECURITY FRAMEWORK FOR AD HOC NETWORK
 
Do4301690695
Do4301690695Do4301690695
Do4301690695
 
A survey on trust based routing in manet
A survey on trust based routing in manetA survey on trust based routing in manet
A survey on trust based routing in manet
 
A survey on trust based routing in manet
A survey on trust based routing in manetA survey on trust based routing in manet
A survey on trust based routing in manet
 
Trust management in p2 p systems
Trust management in p2 p systemsTrust management in p2 p systems
Trust management in p2 p systems
 
PROOF-OF-REPUTATION: AN ALTERNATIVE CONSENSUS MECHANISM FOR BLOCKCHAIN SYSTEMS
PROOF-OF-REPUTATION: AN ALTERNATIVE CONSENSUS MECHANISM FOR BLOCKCHAIN SYSTEMSPROOF-OF-REPUTATION: AN ALTERNATIVE CONSENSUS MECHANISM FOR BLOCKCHAIN SYSTEMS
PROOF-OF-REPUTATION: AN ALTERNATIVE CONSENSUS MECHANISM FOR BLOCKCHAIN SYSTEMS
 

Recently uploaded

HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSRajkumarAkumalla
 
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...RajaP95
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerAnamika Sarkar
 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLDeelipZope
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024Mark Billinghurst
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)Suman Mia
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 

Recently uploaded (20)

HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
 
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCL
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 

A novel approach for trust management for peer peer

  • 1. A Novel Approach for Trust Management in Peer-Peer Network System Guided By: Dr. A.V.K.SHANTHI M.Sc., M.Phill., Ph.D Presented by: SNEHITH PANGULURI (3011211) TUMMALA SATYAKAMA (3011298)
  • 2. Abstract  Malicious attacks are a major problem in peer to peer networks. To overcome this problem, trust relations are shared with the peers in proximity within the network. The trust relationship is made based upon the local level information, but not the global level information. Distributed algorithm is used to make trust relations from the past transactions and recommendations.  SORT provides services and giving recommendation to the peers using two different metrics. They are service and recommendation metrics. The service metric is used to give the service to the peers and the recommendation metric is used to give the recommendations to the system. The interaction and recommendations are evaluated based on the recentness, importance and peer satisfaction parameters. It evaluates the recommendations for finding the trustworthiness of recommendation and confidence of the recommendation.  This work deals with the issues of network security and attacks. By implementing the SORT model, malicious activity on peer to peer networks is reduced. Trust and reputation information that is passed across the peers in the network is used as the main factor to find the peers that are trustworthy.
  • 3. Objective  The proposed system, Self-Organizing Trust model (SORT) that aims to decrease malicious activity in a P2P system by establishing trust relations among peers in their proximity.  The final node in the chain of mimics acts as the Network Address Translator(NAT) for the transport layer, and sends the packet to its final destination through the Internet. This final node must know the content and destination, but has no information about the sender.  Web Services Trust Language brings trust management into the environment of web services. The core proposition remains generally unchanged: the Web Service (verifier) is accepting a request if the request contains proofs of credentials that satisfy the a Web Service.
  • 4. Introduction  PEER-PEER:- It’s a decentralized network, in which all the in the network acts as client and server.  REPUTATION:- A peer’s trust in another peer based on the experiences of other peers.  TRUST:- A peer’s trust in other peers based on his own past experience.  SORT:- Self-Organizing Trust model (SORT) that aims to decrease malicious activity in a P2P system by establishing trust relations among peers in their proximity.  NS:- Network Simulator, A package of tools that simulates behavior of networks. NS are a discrete event simulator targeted at networking research.
  • 5. Sl. No Year Researchers Discussions Description 1 2006 R. Zhou, K. Hwang, and M. Cai, “Gossiptrust Fast Reputation Aggregation in Peer-to- Peer Networks In peer-to-peer (P2P) networks, reputation aggregation and ranking are the most time-consuming and space-demanding operations. 2 2007 A. Jøsang, R. Ismail, and C. Boyd A Survey of Trust and Reputation Systems for Online Service Provision Trust and reputation systems represent a significant trend in decision support for Internet mediated service provision. 3 2008 H. Yu, M. Kaminsky, P.B. Gibbons, and A. Flaxman Sybil guard: Defending against Sybil Attacks via Social Networks Peer-to-peer and other decentralized, distributed systems are known to be particularly vulnerable to Sybil attacks. Literature Survey
  • 6. Literature Survey (Contd.) Sl. No Year Researchers Discussions Description 4 2010 Bin Yu, Muninder P. Singh Propogation of Trust and Distrust Obtaining user opinion (using votes) is essential to ranking user-generated online content. However, any content voting system is susceptible to the Sybil attack where adversaries can out-vote real users by creating many Sybil identities 5 2011 Li Xiong, Ling Lin Peer Trust: Supporting reputation based trust for Peer-Peer Electronic Communication. Reputation systems provide mechanisms to produce a metric encapsulating reputation for a given domain for each identity within the system. 6 2011 Bin Yu, Muninder P. Singh A Social Mechanism of reputation management in Electronic Communities Internet commerce and online commodity exchanges suffer from distrust among sellers and buyers, who are often strangers to each other.
  • 7. Problem Statement The existing system has a problem of how to trace the users behavior dynamically and guarantee that their behavior is within the limits imposed by the role they hold. The number of uncertain interpretations is evaluated during build trust relationship. This increases the resource usage.
  • 8. Existing system  In existing system, RBAC (Role Based Access Control) methods for building secure systems that operate efficiently in large-scale environments is used.  Adapting RBAC to enforce security in the Web is increasingly seen as a solution for scalability issues, because permissions are associated to roles instead of users and the number of roles is much smaller than the number of users.  The merit of the existing system is to build a prototype of a Role Server that securely assigns roles to users.
  • 9. Proposed System  To overcome the problem identified in the existing system, the method of SORT is used. SORT provides services to the system and giving recommendations about another system to the peer as different tasks.  The SORT defines two contexts of trust. One is service and another is recommendation contexts. Information about past interactions and recommendations are stored in separate histories to assess competence and integrity of acquaintances in these contexts.  The recommendation trust metric is important when requesting recommendations. When calculating the reputation metric, recommendations are evaluated based on the recommendation trust metric.  Recommender’s trustworthiness and confidence about recommendation are considered when evaluating recommendations. Additionally, service and recommendation contexts are separated. This enabled us to measure trustworthiness in a wide variety of attack scenarios. Most trust models do not consider how interactions are rated and assume that a rating mechanism exists.
  • 11. Algorithms SORT algorithm.  In SORT, instead of considering a particular trust holder’s feedback as authentic, public opinion from all acquaintances is considered as more credible information.
  • 12. Modules 1) Cluster head selection 2) Issue certificate 3) Validate certificate 4) Revoke function 5) Reconstruction of peer
  • 13. Module Explanation CLUSTER HEAD SELECTION:-  The cluster is formed on that peer to peer network. From that cluster we have to choose one head called cluster head. For that cluster selection, the cluster members in the cluster send the hello packet to the nearest members.  Clustering, one of the fundamental data mining tasks, in P2P systems. Clustering, which groups a set of data objects into clusters of similar data objects, can be applied in many different problem domains, such as spatial data analysis, scientific pattern discovery, document categorization, taxonomy generation, customer/market analysis, etc. Various clustering techniques have been proposed for either centralized systems or distributed systems.  In addition, these clustering techniques were designed to minimize the computation cost and/or disk access cost. However, minimization of the communication cost is the primary goal for the design of clustering techniques in P2P systems.
  • 14. ISSUE CERTIFICATE:-  The certificate means we generate the signature for each and every peer in the peer network. There are two different kinds of attacks are involved in the peer construction. To resolve or identify these two attacks we issue the certificate to each peer.  After selecting the cluster head then issue the certificate to the peers for security purpose. The certificate means that to generate the signature for each and every peer in the peer network. There are two different kinds of attacks are involved in the peer construction. They are service attack and recommendation attack. Service attack means providing the misbehave service to the peer. Recommendation attack means recommending the unauthorized peer for the transaction.  To resolve or identify these two attacks we issue the certificate to each peer. And also it gives some access control permission to the system for more security. The permissions are read write and forward permissions. This is the future concept we implement it. The access permission is provided to the system because the SORT is trust worthiness and maintains more security.
  • 15. VALIDATE CERTIFICATE:-  In that situation the certificate is verified. This means the created signature is verified. We can transmit the file from one peer system to another peer in secure manner.  The process of certificate validation takes place simultaneously with various aspects of the program. After the certificate is successfully validated, the process transfers to the next level where the information is secured and the certificate is then revoked using the revoke function.  At the certificate validation level, the network is simulated on the basic principle of certificate validation. The validated certificate contains information that explains the reputation metrics of all the peers. In simple terms can be said as between the sender and receiver.  This model is very exhaustive as the information between both the peers is passed, the necessary certificates that explain to the network the reputation of these peers in the neighborhood.
  • 16. REVOKE FUNCTION:-  The Revoke function is used for preventing the system from the two attacks such as service based attack and recommendation based attack. These two peer can be revoked and act as normal peer for transaction. These operations are performed in the revoke function. First it identifies which peer can act as malicious during the transaction after that it revokes or changes the malicious peer into the normal peer. This process is called as the revoke function.  The revoke function acts to stop the functions of the certificate and all other activities of that certificate. The actual implementation of this function is that the certificate and all the associated functions of this certificate are revoked and are dumped as well.  This module of the program ensures that the certificate is revoked completely and the this function also helps to reduce any malicious activity that is to take place in this program successfully using the above explained trust model that is the basis and structure of the complete program.
  • 17. RECONSTRUCTION OF PEER:-  The final stage is the reconstruction of peers. Once it identifies and removes the attacks present in the peer to peer system, the network will be reconstructed. This reconstruction network or the peer to peer system act as the self organized and provide more security.  For that reason, it has to reconstruct our network. The reconstructed system does not contain not contain any malicious peer. It acts as a good peer.  Using this functional module of the program, the peers are reconstructed using the explained trust model. The process restarts from the beginning with the resection of the program with all its modules successfully and executing all the modules in the code.
  • 25.
  • 26.
  • 27.
  • 29.
  • 30.
  • 31.
  • 32. Performance Analysis X Axis: Frequency Y Axis: Time
  • 33. (Cont…)  When the communication between two peers is happening, the frequency will be shown high. It may have some malicious attacks while the communication is done. To overcome the attacks the certificate is being issued to the peers. It will reduce the time and gives more secure data.
  • 35. Conclusion  A new approach is proposed for trust management in peer to peer network communications. It will generate the own peer networks, after that it forms the cluster in the peer networks. Each cluster member in the cluster sends the hello packets to each other. From those packets they choose the cluster head for providing services.  The service based attacks and recommendation based attacks are involved. To overcome and identify these attacks the certificate authority to each member in the cluster is done. Certificate authority means first it issue the certificate to the each nodes in the network and then it uploads the files from one system to another. That situation the certificate is validated.  The revoke function is used to resolve the two attacks and make the system as normal node. After that it reconstructs the network. That network contains only good peer not the malicious attacker in the network.
  • 36. Future work  The current model SORT can be extended in various new dimensions to serve for some real time application models that have peers spread across a large extent and also ensure faster and smarter data flow across with better redundancy and can also create a system that is sustainable for the future, through all the advancements that may come into existence in the future with it’s better packet routing over the peer network environment.
  • 37. References [1] Abdul-Rahman.S and Hailes.S, “Supporting Trust in Virtual Communities,” Proc. 33rd Hawaii Int’l Conf. System Sciences (HICSS), 2000. [2] Almeroth.K.C, Swamynathan.G and Zhao.B.Y, “Decoupling Service and Feedback Trust in a Peer-to-Peer Reputation System,” Proc. Int’l Conf. Parallel and Distributed Processing and Applications (ISPA), 2005. [3] Atallah.M, Bhargava.B, Chuang.J, Habib.A and Xu.D, “A Tree- Based Forward Digest Protocol to Verify Data Integrity in Distributed Media Streaming,” IEEE Trans. Knowledge and Data Eng., vol. 17, no. 7, pp. 1010-1014, July 2005. [4] Bhattacharjee.B, Lee.S, and Sherwood.R, “Cooperative Peer Groups in Nice,” Computer Networks, vol. 50, no. 4, pp. 523-544, 2006. [5] Boyd.S, Ghosh.A, Prabhakar.B, and Shah.D, “Randomized Gossip Algorithms,” IEEE/ACM Trans. Networking, vol. 52, no. 6, pp. 2508-2530, June 2006.
  • 38. (Cont…) [6] Boyd.S, Ismail.R, and Jøsang.A, “A Survey of Trust and Reputation Systems for Online Service Provision,” Decision Support Systems, vol. 43, no. 2, pp. 618-644, 2007. [7] Cai.M, Hwang.K and Zojkua.C, “Gossiptrust for Fast Reputation Aggregation in Peer-to-Peer Networks,” IEEE Trans. Knowledge and Data Eng., vol. 20, no. 9, pp. 1282-1295, Sept. 2008 [8] Can.A.B, “Trust and Anonymity in Peer-to-Peer Systems,” PhD thesis, Dept. of Computer Science, Purdue Univ., 2007. [9] Chandrasekaran.M, Jadliwala.M, Upadhyaya.S and Virendra.M, “Quantifying Trust in Mobile Ad-Hoc Networks,” Proc. IEEE Int’l Conf. Integration of Knowledge Intensive Multi-Agent Systems (KIMAS), 2005. [10] Cornelis.C, De Cock.M, Pinheiro da Silva.P and Victor.P, “Gradual Trust and Distrust in Recommender Systems,” Fuzzy Sets Systems, vol. 160, no. 10, pp. 1367-1382, 2009.