SlideShare a Scribd company logo
International Journal of Peer to Peer Networks (IJP2P) Vol.3, No.3/4, July 2012
DOI : 10.5121/ijp2p.2012.3301 1
IMPROVING HYBRID REPUTATION MODEL
THROUGH DYNAMIC REGROUPING
Sreenu G 1
and Dhanya P M 2
1
Department of Computer Science, RSET, Rajagiri valley, Cochin, India
gsreenug@gmail.com
2
Department of Computer Science, RSET, Rajagiri valley, Cochin, India
dhanya.rajeshks@gmail.com
ABSTRACT
Peer-to-Peer (P2P) systems have the ability to bond with millions of clients in business and knowledge
scenario. The mechanism that leads users to distribute files without the need of centralized servers has
achieved wide recognition among internet users. This also permits for a range of applications further than
simple file sharing. he main problem lies in the fact that peers have to customarily intermingle with
mysterious peers in the absence of trusted third parties. Usually the lack of incentives often makes these
strange peers to act as freeriders and thus reduce the system performance. The trustworthiness among
peers is portrayed by applying the knowledge obtained as a result of reputation mechanisms. This paper
endows with a new reputation model in association with a detailed survey of diverse reputation models. The
proposed model suggests a hybrid reputation model through dynamic regrouping..
KEYWORDS
Hybrid Reputation, Compatibility Coefficient, Group splitting
1. INTRODUCTION
Presently the thought of P2P system has been fascinated plenty of curiosity in the network field.
The sophisticated features like decentralized processing, independent nature of nodes and
scalability makes the system more advantageous. One of the prevailing features that differentiate
P2P system is the overlay network. Overlay network allows the P2P systems to connect diverse
systems on top of existing network configurations.
Overlay network supports an open environment which in turn supports participation of all types
of nodes. The presence of malicious nodes cannot be easily detected in the case of an open
network and it raises a severe problem to the security of the network. On the better side the open
nature of P2P network can be used to share the computing resources but the open nature itself
creates a hazardous state through the inclusion of malicious peers. These malicious peers can
diminish the system popularity by degrading the performance through malicious behavior like
altering the message when it is passing through the transmission medium and denial of services of
other peers.
To increase the number of participants the system must be competitive to provide good quality of
service. As the number of participants increases the performance of the system will increase. On
hand techniques to address these security issues include reputation mechanism, cryptographic
techniques, and access control and data integrity mechanisms.
International Journal of Peer to Peer Networks (IJP2P) Vol.3, No.3/4, July 2012
2
This paper summarizes features of different reputation models along with proposed hybrid
reputation model. Hybrid reputation model suggests a new reputation model for finding the
reputation score of each peer through group formation. It demonstrates the different procedures
involved in the formation of groups, trust calculation and behavior judgment. Furthermore, the
paper discusses the main advantages and issues identified in the model. Finally the projected
result analyses the possible outcome of the project.
2. EXISTING SOLUTIONS
The P2P systems are facing the main problem of communication with strangers. So the whole
thing is based on mutual trust among communicating peers. Trust value calculation can take input
from reputation systems in the form of predictions on peer behavior in future founded on past
behavior. Reputation value can also be extracted in the form of recommendations from other
participating peers. A detailed survey of various reputation mechanisms includes the following
methods.
1. eBAY [1]: This is a centralized reputation system as a solution to identify reputed peers
involved in the transaction. The participating peers uses an online feedback system to rate
other peers after each transaction and overall reputation of a participating peer is
calculated as the sum of ratings over previous six months.
2. Xrep [2]: The main procedures involved in resource searching are vote polling and vote
clustering. The peer will post the required service and collect the responses from all
participating peers. In vote polling phase the participating peers will record their opinion
about the peer. In vote clustering phase the recorded opinions will be aggregated. The
peer behaviour is predicted based on the total votes collected.
3. TrustMe [3] : A bootstrap server will assign the trust value of participating peers to
certain trust holding peers. These THA peers will give the trust values in response to the
broadcasted queries from requesting peers. Security, anonymity and use of cryptographic
keys are the main feature identified in the method.
4. NICE [4] : Cooperative distributed applications can be effectively implemented in a
NICE platform. The service provider can check the reputation of the peer by considering
the signed set of certificates. Moreover the service provider also conducts a search about
the reputation of the peer. So finally the reputation value will be a considered as a
combination of the certificates and referenced search.
5. EigenTrust [5]: EigenTrust uses concept of global trust value .Each peer is having a trust
value about the peer that is globally accepted inside the network. By considering the
global reputation the peer behavior can be determined as malicious or normal peer.
6. PeerTrust [6]:System architecture of PeerTrust has no central database. The trust data is
distributes across the network. The trust manager associated with each peer will perform
the functions of feedback submission and trust computation.
7. PowerTrust [7] : Trust overlay network is built on top of all peers in the network. Highly
reputed power nodes will be selected using a distributed ranking mechanism. The
PowerTrust system will take its input in the form of local trust scores send by peers after
each transaction. The global reputation value of each peer will be calculated by the
PowerTrust system by aggregating all the local trust scores.
8. FuzzyTrust [8]: Approximated reasoning is highly supported by FuzzyTrust. Uncertainty,
fuzziness and incomplete information is better handled by FuzzyTrust. FuzzyTrust
applies fuzzy inference on local trust value calculation and uses fuzzy inference to obtain
global reputation aggregation weights.
9. GossipTrust [9]: Suggests a reputation aggregation scheme for unstructured networks.The
process itself includes different steps and cycles. The peers are exchanging local scores
International Journal of Peer to Peer Networks (IJP2P) Vol.3, No.3/4, July 2012
3
with randomly chosen neighbours and update the peers trust value. This repeats and
finally the trust value congregates in one cycle. The next cycle will use the previous cycle
congregated value and again find the new congregated value.The main feature is the
method aggregate the reputation values in a completely distributed and scalable way.
10. Dual-EigenRep [10]: The method considers the recommended and recommending roles
of each peer. The unified association between these two behaviors finally forms different
trust communities which categorize different types of peers.
11. Three-Dimensional Based Trust Management Scheme for Virus Control in P2P Networks
[11]: The method reflects on the trust values of peers and infection values of both the
peers and content. A three dimensional normalization is used in ratio based normalization
models to enhance the efficiency on the trust value computation.
2.1. Assessment of assorted active Methods
The above methods can be analysed in different ways. The main advantages and disadvantages
analysed in different methods can be illustrated in the following way.
1. eBAY: A central server is present to manage the reputation values. The advantage is that
users can put their feedback in an online feedback form. It is an actually used reputation
system. The feedback can be recorded using numeric values. The main disadvantage is
the lack of security.
2. Xrep: The main advantage is that the method combines the peer based reputation and
resource based reputation. The disadvantage is that increase in the number of resources
compared to number of peers will create astorage overhead problems.
3. TrustMe: The anonymous nature of storage of reputation values will create a secure
environment. The performance will be affected if the network size is very large. As result
of this method lots of messages will be generated. Furthermore the large network size
will result a delay in time taken to transfer the global reputation value among peers.
4. NICE: The search and inference performance of the system will be enhanced if the users
store added information. One drawback is the method not describing about the speed of
transactions.
5. EigenTrust: Use of power iteration provides a distributed and secure method to compute
global trust value. The inference that the peers which exchange trusted files will report
sincere trust values is one disadvantage.
6. PeerTrust: The method will deal with the deceitful feedbacks and also handle the lack of
incentives problem. The problem identified in this method is that it is not easy to
implement in large scale P2P networks.
7. PowerTrust: The functioning competence can be achieved through the presence of power
nodes. Since the power nodes can act as hotspots there is a chance congestion in the
network.
8. FuzzyTrust: The malicious peers can be detected in a fast manner. The problem identified
is that the method is not handling the collusion attack and freeriding .
9. GossipTrust: The application of bloom filters can be used for efficient reputation storage
and identity based cryptography is used for secure communication. The drawback
identified is that there is no method is defined to punish the malicious nodes.
10. Dual-EigenRep: The method is very efficient against different types of security issues
like collusion,disguise and exaggeration.The method is not mentioning about the speed of
transactions.
11. Three-Dimensional Based Trust Management Scheme for Virus Control in P2P
Networks: The propagation of virus can be limited to a small number of peers. The main
feature is that these activities will not affect the file downloading process. The method is
not mentioning about the transaction speed.
International Journal of Peer to Peer Networks (IJP2P) Vol.3, No.3/4, July 2012
4
An assessment of above listed methods shows that some of them are efficient in detecting
malicious peers. Some methods are efficient in efficient storage of reputation scores, and others
are useful in efficient computation of trust values. This paper suggests a hybrid reputation model
which brings together all these factors to provide an efficient reputation model.
3. PROPOSED SOLUTION
The proposed model focuses on the group formation based on the similarity of functions. All the
participating peers will have a set of services and requirements. The requirements and services are
needed to be shared among other participating peers. Functions are the combinations of services
and requirements. Mutually complementing functions will share same group. The functional
similarity is evaluated with the help of Compatibility Coefficient (CC). The CC computation is
done through prefixed threshold values.
Different peers can communicate within their group through intra group communication and
different groups can communicate through inter group communication. In order to analyse the
peer behaviour the trust value is evaluated. The peers with a trust value below the fixed threshold
will consider as malicious and are prohibited from further communication. Furthermore based on
the transmission rate the groups will be regrouped. The necessity of group splitting and precise
behaviour forecasting will be explained in later sections. Figure 1 represents a model of the
proposed hybrid reputation model.
Figure 1. Model of the proposed system [12]
The detailed procedure of Hybrid Reputation Model is explained in following divisions.
3.1. Node Registration at central coordinator
The initial procedure of the system is node registration. This procedure is done at the entry point
of the system that is the central coordinator. During registration the nodes will list their services
and requirements.
International Journal of Peer to Peer Networks (IJP2P) Vol.3, No.3/4, July 2012
5
3.2. Compatibility Coefficient (CC)
The central coordinator will calculate the CC value. The function of central coordinator is the
computation of CC value and group peers according to CC value.
3.3. Calculation of CC
Based on the calculated CC value the participating peers are categorized into different groups.
Each group should have a coordinator. The peer which led to the formation of a new group will
act as the coordinator for that group. The CC value calculation is done by fixing two threshold
values t1 and t2. Initially the opening node will act as the coordinator for the first group. All the
arriving nodes will send their services and requirements with already existing group coordinators.
The group coordinators will calculate the CC value between their group and arriving node. The
central coordinator will compare the CC value calculated in all coordinators.
The CC value will be incremented by 1 if there is a match in between the services of arriving
node i and requirements of coordinator node j and vice versa. Finally the CC values will be
aggregated and compared with threshold values.
3.4. Group Formation
The central coordinator will compare the CC value of different group coordinators and initiate the
group formation.
1. If the CC value between arriving node i and coordinator j is above threshold t1 then node
i will join with coordinator j.
2. If the CC value is below threshold t2 the arriving node will form a new group.
3. If the CC value between arriving node and different coordinators is between t1 and t2 a
regrouping will be performed.
4. If there is more than one group having threshold value greater than t1 then the group with
highest CC value will be selected for group formation.
Figure 2 shows the diagram of peers in a group. Each peer is associated with reputation table.
Figure 2. Group of peers allocated with reputation table[12]
International Journal of Peer to Peer Networks (IJP2P) Vol.3, No.3/4, July 2012
6
3.5. Intra group Communication
Different peers in a group can communicate within their group. Each peer can satisfy other peers
requirements. Since the group formation is based on similarity of functions the time taken to
complete each request will be reduced.
3.6. Response Gathering
After the completion of each transaction the service requesting peers have to record their
feedback about service provider. All the peers will be associated with a reputation table. The
feedback about service provider should be recorded in the corresponding column of reputation
table of service requestor. The reputation table contains space for all participating nodes in their
group. After each local update the feedback scores will be globally updated using GossipTrust
algorithm.
3.7. Appraisal of aggregated response values
The feedback recorded will represent the corresponding trust value. Each successful transaction
will record a positive feedback. The positive feedback will be added by 1 and negative feedback
will be decremented by 1. Before each transaction the peers will verify the reputation table. If the
feedback (trust value) recorded for a node is below a fixed threshold the node will be consider as
malicious and avoid from the remaining communication.
3.8. Intergroup Communication
If the requests for a peer will not satisfied within their group the request will be forwarded to
other group coordinators. The group coordinators will check within their group and send a reply
to the requestor coordinator if the requested service is available with required trust value.
3.9. Dynamic Regrouping
The size of each group is fixed based on the transmission rate within their group. After the
joining of a new peer each group will be examined for its transmission criteria. The transmission
criterion is evaluated using following parameters.
1. Number of packets per second
2. The available bandwidth
If the number of packets per second exceeds the available bandwidth the group will be divided.
3.10. Group splitting
At regular intervals of time the central coordinator will split the groups and reorder the groups.
This reordering will help to avoid the malicious nodes from appearing to the next level. This will
also reorder the nodes based on the changes in services and requests.
International Journal of Peer to Peer Networks (IJP2P) Vol.3, No.3/4, July 2012
7
4. IDENTIFIED ISSUES AND RECOGNIZED SOLUTION IN PROPOSED
MODEL
The chance of failure of central coordinator and group coordinator should be handled effectively.
The failure of central coordinator can be handled by applying election algorithm [13] among the
existing group coordinators. The group coordinator failure can be handled by applying election
algorithm within the group itself.
5. GUARANTEED QUALITIES OF THE SYSTEM
5.1. Less Flooding
Since the peers are arranged in different groups most of the requests will be satisfied within the
group. So unnecessary flooding can be avoided.
5.2. Small Sized Reputation Table
Each peer has to store a reputation table which containe entries for the peers in the same group.
So the size of reputation table can be reduced.
5.3. Fast access
Less flooding will naturally reduce the access time.
5.4. Enhanced quality
The grouping of peers will limit the number of peers in each groups and that in turn reduce the
traffic in each group. Reduced traffic will avoid congestion and loss of packets. All the services
will be provided with less delay and high quality.
6. RESULT ANALYSIS
The proposed model suggests a less delayed high quality reputation model. The inclusion of
regrouping will increase the transmission quality and the inclusion of group splitting will reduce
the chance of malicious peers. The application of group splitting will not allow malicious peers
from past transactions to enter into new transactions. So the reduction of malicious peers can be
seen in each step after group splitting. The quality of a transmission consists of the reduction in
transmission delay, fast detection of malicious peers and the large number of successful requests.
The expected outcome of the project as plotted in Figure3, 4and 5 shown the above discussed
three factors.
International Journal of Peer to Peer Networks (IJP2P) Vol.3, No.3/4, July 2012
8
Figure 3. Transaction delay
Figure 4. Number of Successful Requests
Figure 5. Detection of Malicious peers
7. CONCLUSION
A detailed study of existing reputation models is presented with a good analysis. The proposed
model is a solution to the identified deficiencies in the existing methods. The entire working is
illustrated in different steps including group formation, trust calculation and behavior
determination. The paper also discusses the merits and demerits of the proposal. The identified
solutions for these drawbacks are also presented. Finally the expected result is explained with the
help of different pie charts.
International Journal of Peer to Peer Networks (IJP2P) Vol.3, No.3/4, July 2012
9
REFERENCES
[1] eBay. eBay home page, ( 2009) http://www.ebay.com..
[2] E. Damiani, S. Vimercati, S. Paraboschi, P. Samarati, and F. Violante, (2002) ”A Reputation-based
Approach for Choosing Reliable Resources in Peer-to-Peer Networks”, ACM Symposium on
Computer Communication Security, pp.207 -216.
[3] A. Singh and L. Liu, (2003) “TrustMe: Anonymous Management of Trust Relationships in
Decentralized P2P Systems”, IEEE IntI. Conf. on Peer-to-Peer Computing, pp.142-149.
[4] S. Lee, R. Sherwood, and B. Bhattacharjee, (2003) Cooperative peer groups in NICE.
[5] D. Kamvar, M. Schlosser, and H. Garcis-Molina, (2003) "The EigenTrust Algorithm for Reputation
Management in P2P Networks," Proc.Word Wide Web Conf. (WWW2003), ACM Press, pp. 640-
651.
[6] L. Xiong and L. Liu, (2004) “PeerTrust: Supporting Reputation-Based Trust for peer-to-peer
Electronic Communities”, IEEE Transactions on Knowledge and Data Engineering,16(7):843–
857,Second International Conference on Availability, Reliability and Security (ARES'07)
[7] R. Zhou and K. Hwang, (2006) "PowerTrust: A Robust and Scalable Reputation System for Trusted
Peer-to-Peer Computing" IEEE Trans. Parallel and Distributed Systems., vol. 18, no4 , ppA60-473.
[8] S. Song, K. Hwang, R. Zhou and YK. Kwok, (2005) ”Trusted P2P Transactions with Fuzzy
Reputation Aggregation”, IEEE Internet Computing, Vol. 9, No. 6, pp.24-34.
[9] R Zhou and K. Hwang, (2007) "Gossip-based reputation aggregation for unstructured peer-to-peer
networks," in Proceedings of IEEE International Conference Parallel and Distributed Processing
Symposium, pp. 1-10. V3-23.
[10] Xinxin Fan, Mingchu Li, Yizhi Ren and Jianhua Ma, (2010) “Dual-EigenRep: A Reputation-based
Trust Model for P2P File-Sharing Networks”uic-atc,pp.358-363, Symposia and Workshops on
Ubiquitous, Autonomic and Trusted Computing.
[11] Lin Cai and Roberto Rojas-Cessa, (2010) "Three-Dimensional Based Trust Management Scheme for
Virus Control in P2P Networks," Proc. IEEE ICC 2010, 5 pp., Cape Town, South Africa, May 23-27.
[12] Sreenu G, Dhanya P.M,(2012) “ A Hybrid Reputation Model through Federation of Peers Having
Analogous Function “ , Advances in Computer Science , eng.& Appl., AISC 166,pp.837-
846.springerlink.com
[13] Andrew S. Tanenbaum , (1994) Distributed Operating Systems, Prentice Hall; 1 edition
Authors
1. Sreenu G is a post graduate student in M.Tech CSESIS, Department of Computer
Science and Engineering, RSET, Kochi, INDIA. Her interested areas are reputation
models in P2P security and Distributed computing. She has been working as a
lecturer in the same department.
2. Dhanya P.M is working as Assistant professor in the Department of Computer
Science and Engineering, RSET, Kochi, INDIA. Her areas of interest are P2P
networking, Distributed Computing and natural language processing. She is now a
research scholar in CUSAT, KOCHI.

More Related Content

What's hot

MEKDA: Multi-Level ECC based Key Distribution and Authentication in Internet ...
MEKDA: Multi-Level ECC based Key Distribution and Authentication in Internet ...MEKDA: Multi-Level ECC based Key Distribution and Authentication in Internet ...
MEKDA: Multi-Level ECC based Key Distribution and Authentication in Internet ...
IJCNCJournal
 
TRUST ORIENTED SECURITY FRAMEWORK FOR AD HOC NETWORK
TRUST ORIENTED SECURITY FRAMEWORK FOR AD HOC NETWORKTRUST ORIENTED SECURITY FRAMEWORK FOR AD HOC NETWORK
TRUST ORIENTED SECURITY FRAMEWORK FOR AD HOC NETWORK
cscpconf
 
Inferring Peer Centrality in Socially-Informed Peer-to-Peer Systems
Inferring Peer Centrality in Socially-Informed Peer-to-Peer SystemsInferring Peer Centrality in Socially-Informed Peer-to-Peer Systems
Inferring Peer Centrality in Socially-Informed Peer-to-Peer Systems
Nicolas Kourtellis
 
Exploiting Service Similarity for Privacy in Location Based Search Queries
Exploiting Service Similarity for Privacy in Location Based Search QueriesExploiting Service Similarity for Privacy in Location Based Search Queries
Exploiting Service Similarity for Privacy in Location Based Search Queries
Migrant Systems
 
A Neighbourhood-Based Trust Protocol for Secure Collaborative Routing in Wire...
A Neighbourhood-Based Trust Protocol for Secure Collaborative Routing in Wire...A Neighbourhood-Based Trust Protocol for Secure Collaborative Routing in Wire...
A Neighbourhood-Based Trust Protocol for Secure Collaborative Routing in Wire...
IJCSIS Research Publications
 
A survey on cost effective survivable network design in wireless access network
A survey on cost effective survivable network design in wireless access networkA survey on cost effective survivable network design in wireless access network
A survey on cost effective survivable network design in wireless access network
ijcses
 
SECURITY CONSIDERATION IN PEER-TO-PEER NETWORKS WITH A CASE STUDY APPLICATION
SECURITY CONSIDERATION IN PEER-TO-PEER NETWORKS WITH A CASE STUDY APPLICATIONSECURITY CONSIDERATION IN PEER-TO-PEER NETWORKS WITH A CASE STUDY APPLICATION
SECURITY CONSIDERATION IN PEER-TO-PEER NETWORKS WITH A CASE STUDY APPLICATION
IJNSA Journal
 
LPM: A DISTRIBUTED ARCHITECTURE AND ALGORITHMS FOR LOCATION PRIVACY IN LBS
LPM: A DISTRIBUTED ARCHITECTURE AND ALGORITHMS FOR LOCATION PRIVACY IN LBSLPM: A DISTRIBUTED ARCHITECTURE AND ALGORITHMS FOR LOCATION PRIVACY IN LBS
LPM: A DISTRIBUTED ARCHITECTURE AND ALGORITHMS FOR LOCATION PRIVACY IN LBS
IJNSA Journal
 
Privacy Preserving Reputation Calculation in P2P Systems with Homomorphic Enc...
Privacy Preserving Reputation Calculation in P2P Systems with Homomorphic Enc...Privacy Preserving Reputation Calculation in P2P Systems with Homomorphic Enc...
Privacy Preserving Reputation Calculation in P2P Systems with Homomorphic Enc...
IJCNCJournal
 
Security Measure to Detect and Avoid Flooding Attacks using Multi-Agent Syste...
Security Measure to Detect and Avoid Flooding Attacks using Multi-Agent Syste...Security Measure to Detect and Avoid Flooding Attacks using Multi-Agent Syste...
Security Measure to Detect and Avoid Flooding Attacks using Multi-Agent Syste...
IJECEIAES
 
UTILIZING XAI TECHNIQUE TO IMPROVE AUTOENCODER BASED MODEL FOR COMPUTER NETWO...
UTILIZING XAI TECHNIQUE TO IMPROVE AUTOENCODER BASED MODEL FOR COMPUTER NETWO...UTILIZING XAI TECHNIQUE TO IMPROVE AUTOENCODER BASED MODEL FOR COMPUTER NETWO...
UTILIZING XAI TECHNIQUE TO IMPROVE AUTOENCODER BASED MODEL FOR COMPUTER NETWO...
IJCNCJournal
 
Iaetsd organizing the trust model in peer-to-peer system using
Iaetsd organizing the trust model in peer-to-peer system usingIaetsd organizing the trust model in peer-to-peer system using
Iaetsd organizing the trust model in peer-to-peer system using
Iaetsd Iaetsd
 
A SECURE CLUSTER BASED COMMUNICATION IN WIRELESS NETWORK USING CRYPTOGRAPHIC ...
A SECURE CLUSTER BASED COMMUNICATION IN WIRELESS NETWORK USING CRYPTOGRAPHIC ...A SECURE CLUSTER BASED COMMUNICATION IN WIRELESS NETWORK USING CRYPTOGRAPHIC ...
A SECURE CLUSTER BASED COMMUNICATION IN WIRELESS NETWORK USING CRYPTOGRAPHIC ...
IJNSA Journal
 
P2P DOMAIN CLASSIFICATION USING DECISION TREE
P2P DOMAIN CLASSIFICATION USING DECISION TREE P2P DOMAIN CLASSIFICATION USING DECISION TREE
P2P DOMAIN CLASSIFICATION USING DECISION TREE
ijp2p
 
Supporting Privacy Protection in Personalized Web Search
Supporting Privacy Protection in Personalized Web SearchSupporting Privacy Protection in Personalized Web Search
Supporting Privacy Protection in Personalized Web Search
Migrant Systems
 
12 SN&H Keynote: Thomas Valente, USC
12 SN&H Keynote: Thomas Valente, USC12 SN&H Keynote: Thomas Valente, USC
12 SN&H Keynote: Thomas Valente, USC
Duke Network Analysis Center
 
USER-DEFINED PRIVACY GRID SYSTEM FOR CONTINUOUS LOCATION-BASED SERVICES - IEE...
USER-DEFINED PRIVACY GRID SYSTEM FOR CONTINUOUS LOCATION-BASED SERVICES - IEE...USER-DEFINED PRIVACY GRID SYSTEM FOR CONTINUOUS LOCATION-BASED SERVICES - IEE...
USER-DEFINED PRIVACY GRID SYSTEM FOR CONTINUOUS LOCATION-BASED SERVICES - IEE...
Nexgen Technology
 
Study on security and quality of service implementations in p2 p overlay netw...
Study on security and quality of service implementations in p2 p overlay netw...Study on security and quality of service implementations in p2 p overlay netw...
Study on security and quality of service implementations in p2 p overlay netw...
eSAT Publishing House
 

What's hot (19)

MEKDA: Multi-Level ECC based Key Distribution and Authentication in Internet ...
MEKDA: Multi-Level ECC based Key Distribution and Authentication in Internet ...MEKDA: Multi-Level ECC based Key Distribution and Authentication in Internet ...
MEKDA: Multi-Level ECC based Key Distribution and Authentication in Internet ...
 
TRUST ORIENTED SECURITY FRAMEWORK FOR AD HOC NETWORK
TRUST ORIENTED SECURITY FRAMEWORK FOR AD HOC NETWORKTRUST ORIENTED SECURITY FRAMEWORK FOR AD HOC NETWORK
TRUST ORIENTED SECURITY FRAMEWORK FOR AD HOC NETWORK
 
Inferring Peer Centrality in Socially-Informed Peer-to-Peer Systems
Inferring Peer Centrality in Socially-Informed Peer-to-Peer SystemsInferring Peer Centrality in Socially-Informed Peer-to-Peer Systems
Inferring Peer Centrality in Socially-Informed Peer-to-Peer Systems
 
Exploiting Service Similarity for Privacy in Location Based Search Queries
Exploiting Service Similarity for Privacy in Location Based Search QueriesExploiting Service Similarity for Privacy in Location Based Search Queries
Exploiting Service Similarity for Privacy in Location Based Search Queries
 
A Neighbourhood-Based Trust Protocol for Secure Collaborative Routing in Wire...
A Neighbourhood-Based Trust Protocol for Secure Collaborative Routing in Wire...A Neighbourhood-Based Trust Protocol for Secure Collaborative Routing in Wire...
A Neighbourhood-Based Trust Protocol for Secure Collaborative Routing in Wire...
 
A survey on cost effective survivable network design in wireless access network
A survey on cost effective survivable network design in wireless access networkA survey on cost effective survivable network design in wireless access network
A survey on cost effective survivable network design in wireless access network
 
SECURITY CONSIDERATION IN PEER-TO-PEER NETWORKS WITH A CASE STUDY APPLICATION
SECURITY CONSIDERATION IN PEER-TO-PEER NETWORKS WITH A CASE STUDY APPLICATIONSECURITY CONSIDERATION IN PEER-TO-PEER NETWORKS WITH A CASE STUDY APPLICATION
SECURITY CONSIDERATION IN PEER-TO-PEER NETWORKS WITH A CASE STUDY APPLICATION
 
LPM: A DISTRIBUTED ARCHITECTURE AND ALGORITHMS FOR LOCATION PRIVACY IN LBS
LPM: A DISTRIBUTED ARCHITECTURE AND ALGORITHMS FOR LOCATION PRIVACY IN LBSLPM: A DISTRIBUTED ARCHITECTURE AND ALGORITHMS FOR LOCATION PRIVACY IN LBS
LPM: A DISTRIBUTED ARCHITECTURE AND ALGORITHMS FOR LOCATION PRIVACY IN LBS
 
Privacy Preserving Reputation Calculation in P2P Systems with Homomorphic Enc...
Privacy Preserving Reputation Calculation in P2P Systems with Homomorphic Enc...Privacy Preserving Reputation Calculation in P2P Systems with Homomorphic Enc...
Privacy Preserving Reputation Calculation in P2P Systems with Homomorphic Enc...
 
Security Measure to Detect and Avoid Flooding Attacks using Multi-Agent Syste...
Security Measure to Detect and Avoid Flooding Attacks using Multi-Agent Syste...Security Measure to Detect and Avoid Flooding Attacks using Multi-Agent Syste...
Security Measure to Detect and Avoid Flooding Attacks using Multi-Agent Syste...
 
UTILIZING XAI TECHNIQUE TO IMPROVE AUTOENCODER BASED MODEL FOR COMPUTER NETWO...
UTILIZING XAI TECHNIQUE TO IMPROVE AUTOENCODER BASED MODEL FOR COMPUTER NETWO...UTILIZING XAI TECHNIQUE TO IMPROVE AUTOENCODER BASED MODEL FOR COMPUTER NETWO...
UTILIZING XAI TECHNIQUE TO IMPROVE AUTOENCODER BASED MODEL FOR COMPUTER NETWO...
 
Iaetsd organizing the trust model in peer-to-peer system using
Iaetsd organizing the trust model in peer-to-peer system usingIaetsd organizing the trust model in peer-to-peer system using
Iaetsd organizing the trust model in peer-to-peer system using
 
G0434045
G0434045G0434045
G0434045
 
A SECURE CLUSTER BASED COMMUNICATION IN WIRELESS NETWORK USING CRYPTOGRAPHIC ...
A SECURE CLUSTER BASED COMMUNICATION IN WIRELESS NETWORK USING CRYPTOGRAPHIC ...A SECURE CLUSTER BASED COMMUNICATION IN WIRELESS NETWORK USING CRYPTOGRAPHIC ...
A SECURE CLUSTER BASED COMMUNICATION IN WIRELESS NETWORK USING CRYPTOGRAPHIC ...
 
P2P DOMAIN CLASSIFICATION USING DECISION TREE
P2P DOMAIN CLASSIFICATION USING DECISION TREE P2P DOMAIN CLASSIFICATION USING DECISION TREE
P2P DOMAIN CLASSIFICATION USING DECISION TREE
 
Supporting Privacy Protection in Personalized Web Search
Supporting Privacy Protection in Personalized Web SearchSupporting Privacy Protection in Personalized Web Search
Supporting Privacy Protection in Personalized Web Search
 
12 SN&H Keynote: Thomas Valente, USC
12 SN&H Keynote: Thomas Valente, USC12 SN&H Keynote: Thomas Valente, USC
12 SN&H Keynote: Thomas Valente, USC
 
USER-DEFINED PRIVACY GRID SYSTEM FOR CONTINUOUS LOCATION-BASED SERVICES - IEE...
USER-DEFINED PRIVACY GRID SYSTEM FOR CONTINUOUS LOCATION-BASED SERVICES - IEE...USER-DEFINED PRIVACY GRID SYSTEM FOR CONTINUOUS LOCATION-BASED SERVICES - IEE...
USER-DEFINED PRIVACY GRID SYSTEM FOR CONTINUOUS LOCATION-BASED SERVICES - IEE...
 
Study on security and quality of service implementations in p2 p overlay netw...
Study on security and quality of service implementations in p2 p overlay netw...Study on security and quality of service implementations in p2 p overlay netw...
Study on security and quality of service implementations in p2 p overlay netw...
 

Similar to IMPROVING HYBRID REPUTATION MODEL THROUGH DYNAMIC REGROUPING

International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
IJERD Editor
 
AN EXAUSTIVE SURVEY OF TRUST MODELS IN P2P NETWORK
AN EXAUSTIVE SURVEY OF TRUST MODELS IN P2P NETWORKAN EXAUSTIVE SURVEY OF TRUST MODELS IN P2P NETWORK
AN EXAUSTIVE SURVEY OF TRUST MODELS IN P2P NETWORK
ijwscjournal
 
AN EXAUSTIVE SURVEY OF TRUST MODELS IN P2P NETWORK
AN EXAUSTIVE SURVEY OF TRUST MODELS IN P2P NETWORKAN EXAUSTIVE SURVEY OF TRUST MODELS IN P2P NETWORK
AN EXAUSTIVE SURVEY OF TRUST MODELS IN P2P NETWORK
ijwscjournal
 
In this paper we present a necessary and sufficient condition for Hamiltonian...
In this paper we present a necessary and sufficient condition for Hamiltonian...In this paper we present a necessary and sufficient condition for Hamiltonian...
In this paper we present a necessary and sufficient condition for Hamiltonian...
graphhoc
 
Trust Based Content Distribution for Peer-ToPeer Overlay Networks
Trust Based Content Distribution for Peer-ToPeer Overlay NetworksTrust Based Content Distribution for Peer-ToPeer Overlay Networks
Trust Based Content Distribution for Peer-ToPeer Overlay Networks
IJNSA Journal
 
Rep on the Roll A peer to peer reputation system based on a rolling blockchain
Rep on the Roll A peer to peer reputation system based on a rolling blockchainRep on the Roll A peer to peer reputation system based on a rolling blockchain
Rep on the Roll A peer to peer reputation system based on a rolling blockchainRichard Dennis
 
Privacy Preserving Reputation Calculation in P2P Systems with Homomorphic Enc...
Privacy Preserving Reputation Calculation in P2P Systems with Homomorphic Enc...Privacy Preserving Reputation Calculation in P2P Systems with Homomorphic Enc...
Privacy Preserving Reputation Calculation in P2P Systems with Homomorphic Enc...
IJCNCJournal
 
Unification Algorithm in Hefty Iterative Multi-tier Classifiers for Gigantic ...
Unification Algorithm in Hefty Iterative Multi-tier Classifiers for Gigantic ...Unification Algorithm in Hefty Iterative Multi-tier Classifiers for Gigantic ...
Unification Algorithm in Hefty Iterative Multi-tier Classifiers for Gigantic ...
Editor IJAIEM
 
A COMPARATIVE STUDY OF INCENTIVE MECHANISMS USED IN PEER-TO-PEER SYSTEM
A COMPARATIVE STUDY OF INCENTIVE MECHANISMS USED IN PEER-TO-PEER SYSTEMA COMPARATIVE STUDY OF INCENTIVE MECHANISMS USED IN PEER-TO-PEER SYSTEM
A COMPARATIVE STUDY OF INCENTIVE MECHANISMS USED IN PEER-TO-PEER SYSTEM
cscpconf
 
A STUDY ON PEER TO PEER NETWORK IN CURRENT NETWORKING
A STUDY ON PEER TO PEER NETWORK IN CURRENT NETWORKING A STUDY ON PEER TO PEER NETWORK IN CURRENT NETWORKING
A STUDY ON PEER TO PEER NETWORK IN CURRENT NETWORKING
IAEME Publication
 
Ijciet 08 02_003
Ijciet 08 02_003Ijciet 08 02_003
Ijciet 08 02_003
IAEME Publication
 
JAVA 2013 IEEE NETWORKSECURITY PROJECT SORT: A Self-ORganizing Trust Model fo...
JAVA 2013 IEEE NETWORKSECURITY PROJECT SORT: A Self-ORganizing Trust Model fo...JAVA 2013 IEEE NETWORKSECURITY PROJECT SORT: A Self-ORganizing Trust Model fo...
JAVA 2013 IEEE NETWORKSECURITY PROJECT SORT: A Self-ORganizing Trust Model fo...
IEEEGLOBALSOFTTECHNOLOGIES
 
Sort a self organizing trust model for peer-to-peer systems
Sort a self organizing trust model for peer-to-peer systemsSort a self organizing trust model for peer-to-peer systems
Sort a self organizing trust model for peer-to-peer systems
IEEEFINALYEARPROJECTS
 
Developing a trust model using graph and ranking trust of social messaging s...
Developing a trust model using graph and ranking trust of  social messaging s...Developing a trust model using graph and ranking trust of  social messaging s...
Developing a trust model using graph and ranking trust of social messaging s...
IJECEIAES
 
IRJET- Web User Trust Relationship Prediction based on Evidence Theory
IRJET- Web User Trust Relationship Prediction based on Evidence TheoryIRJET- Web User Trust Relationship Prediction based on Evidence Theory
IRJET- Web User Trust Relationship Prediction based on Evidence Theory
IRJET Journal
 
Making Trust Relationship For Peer To Peer System With Secure Protocol
Making Trust Relationship For Peer To Peer System With Secure  ProtocolMaking Trust Relationship For Peer To Peer System With Secure  Protocol
Making Trust Relationship For Peer To Peer System With Secure Protocol
IJMER
 
Trust Metrics In Recommender System : A Survey
Trust Metrics In Recommender System : A SurveyTrust Metrics In Recommender System : A Survey
Trust Metrics In Recommender System : A Survey
aciijournal
 
Trust based security in manet
Trust based security in manetTrust based security in manet
Trust based security in manet
eSAT Journals
 
TRUST METRICS IN RECOMMENDER SYSTEMS: A SURVEY
TRUST METRICS IN RECOMMENDER SYSTEMS: A SURVEYTRUST METRICS IN RECOMMENDER SYSTEMS: A SURVEY
TRUST METRICS IN RECOMMENDER SYSTEMS: A SURVEY
aciijournal
 
A Cooperative Peer Clustering Scheme for Unstructured Peer-to-Peer Systems
A Cooperative Peer Clustering Scheme for Unstructured Peer-to-Peer SystemsA Cooperative Peer Clustering Scheme for Unstructured Peer-to-Peer Systems
A Cooperative Peer Clustering Scheme for Unstructured Peer-to-Peer Systems
ijp2p
 

Similar to IMPROVING HYBRID REPUTATION MODEL THROUGH DYNAMIC REGROUPING (20)

International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
AN EXAUSTIVE SURVEY OF TRUST MODELS IN P2P NETWORK
AN EXAUSTIVE SURVEY OF TRUST MODELS IN P2P NETWORKAN EXAUSTIVE SURVEY OF TRUST MODELS IN P2P NETWORK
AN EXAUSTIVE SURVEY OF TRUST MODELS IN P2P NETWORK
 
AN EXAUSTIVE SURVEY OF TRUST MODELS IN P2P NETWORK
AN EXAUSTIVE SURVEY OF TRUST MODELS IN P2P NETWORKAN EXAUSTIVE SURVEY OF TRUST MODELS IN P2P NETWORK
AN EXAUSTIVE SURVEY OF TRUST MODELS IN P2P NETWORK
 
In this paper we present a necessary and sufficient condition for Hamiltonian...
In this paper we present a necessary and sufficient condition for Hamiltonian...In this paper we present a necessary and sufficient condition for Hamiltonian...
In this paper we present a necessary and sufficient condition for Hamiltonian...
 
Trust Based Content Distribution for Peer-ToPeer Overlay Networks
Trust Based Content Distribution for Peer-ToPeer Overlay NetworksTrust Based Content Distribution for Peer-ToPeer Overlay Networks
Trust Based Content Distribution for Peer-ToPeer Overlay Networks
 
Rep on the Roll A peer to peer reputation system based on a rolling blockchain
Rep on the Roll A peer to peer reputation system based on a rolling blockchainRep on the Roll A peer to peer reputation system based on a rolling blockchain
Rep on the Roll A peer to peer reputation system based on a rolling blockchain
 
Privacy Preserving Reputation Calculation in P2P Systems with Homomorphic Enc...
Privacy Preserving Reputation Calculation in P2P Systems with Homomorphic Enc...Privacy Preserving Reputation Calculation in P2P Systems with Homomorphic Enc...
Privacy Preserving Reputation Calculation in P2P Systems with Homomorphic Enc...
 
Unification Algorithm in Hefty Iterative Multi-tier Classifiers for Gigantic ...
Unification Algorithm in Hefty Iterative Multi-tier Classifiers for Gigantic ...Unification Algorithm in Hefty Iterative Multi-tier Classifiers for Gigantic ...
Unification Algorithm in Hefty Iterative Multi-tier Classifiers for Gigantic ...
 
A COMPARATIVE STUDY OF INCENTIVE MECHANISMS USED IN PEER-TO-PEER SYSTEM
A COMPARATIVE STUDY OF INCENTIVE MECHANISMS USED IN PEER-TO-PEER SYSTEMA COMPARATIVE STUDY OF INCENTIVE MECHANISMS USED IN PEER-TO-PEER SYSTEM
A COMPARATIVE STUDY OF INCENTIVE MECHANISMS USED IN PEER-TO-PEER SYSTEM
 
A STUDY ON PEER TO PEER NETWORK IN CURRENT NETWORKING
A STUDY ON PEER TO PEER NETWORK IN CURRENT NETWORKING A STUDY ON PEER TO PEER NETWORK IN CURRENT NETWORKING
A STUDY ON PEER TO PEER NETWORK IN CURRENT NETWORKING
 
Ijciet 08 02_003
Ijciet 08 02_003Ijciet 08 02_003
Ijciet 08 02_003
 
JAVA 2013 IEEE NETWORKSECURITY PROJECT SORT: A Self-ORganizing Trust Model fo...
JAVA 2013 IEEE NETWORKSECURITY PROJECT SORT: A Self-ORganizing Trust Model fo...JAVA 2013 IEEE NETWORKSECURITY PROJECT SORT: A Self-ORganizing Trust Model fo...
JAVA 2013 IEEE NETWORKSECURITY PROJECT SORT: A Self-ORganizing Trust Model fo...
 
Sort a self organizing trust model for peer-to-peer systems
Sort a self organizing trust model for peer-to-peer systemsSort a self organizing trust model for peer-to-peer systems
Sort a self organizing trust model for peer-to-peer systems
 
Developing a trust model using graph and ranking trust of social messaging s...
Developing a trust model using graph and ranking trust of  social messaging s...Developing a trust model using graph and ranking trust of  social messaging s...
Developing a trust model using graph and ranking trust of social messaging s...
 
IRJET- Web User Trust Relationship Prediction based on Evidence Theory
IRJET- Web User Trust Relationship Prediction based on Evidence TheoryIRJET- Web User Trust Relationship Prediction based on Evidence Theory
IRJET- Web User Trust Relationship Prediction based on Evidence Theory
 
Making Trust Relationship For Peer To Peer System With Secure Protocol
Making Trust Relationship For Peer To Peer System With Secure  ProtocolMaking Trust Relationship For Peer To Peer System With Secure  Protocol
Making Trust Relationship For Peer To Peer System With Secure Protocol
 
Trust Metrics In Recommender System : A Survey
Trust Metrics In Recommender System : A SurveyTrust Metrics In Recommender System : A Survey
Trust Metrics In Recommender System : A Survey
 
Trust based security in manet
Trust based security in manetTrust based security in manet
Trust based security in manet
 
TRUST METRICS IN RECOMMENDER SYSTEMS: A SURVEY
TRUST METRICS IN RECOMMENDER SYSTEMS: A SURVEYTRUST METRICS IN RECOMMENDER SYSTEMS: A SURVEY
TRUST METRICS IN RECOMMENDER SYSTEMS: A SURVEY
 
A Cooperative Peer Clustering Scheme for Unstructured Peer-to-Peer Systems
A Cooperative Peer Clustering Scheme for Unstructured Peer-to-Peer SystemsA Cooperative Peer Clustering Scheme for Unstructured Peer-to-Peer Systems
A Cooperative Peer Clustering Scheme for Unstructured Peer-to-Peer Systems
 

More from ijp2p

COMPARATIVE STUDY OF CAN, PASTRY, KADEMLIA AND CHORD DHTS
COMPARATIVE STUDY OF CAN, PASTRY, KADEMLIA AND CHORD DHTSCOMPARATIVE STUDY OF CAN, PASTRY, KADEMLIA AND CHORD DHTS
COMPARATIVE STUDY OF CAN, PASTRY, KADEMLIA AND CHORD DHTS
ijp2p
 
International Journal of Peer to Peer Networks .docx
International Journal of Peer to  Peer Networks .docxInternational Journal of Peer to  Peer Networks .docx
International Journal of Peer to Peer Networks .docx
ijp2p
 
International Journal of peer-to-peer networks (IJP2P)
International Journal of peer-to-peer networks (IJP2P)International Journal of peer-to-peer networks (IJP2P)
International Journal of peer-to-peer networks (IJP2P)
ijp2p
 
International Journal of peer-to-peer networks (IJP2P)
International Journal of peer-to-peer networks (IJP2P)International Journal of peer-to-peer networks (IJP2P)
International Journal of peer-to-peer networks (IJP2P)
ijp2p
 
2nd International Conference on Big Data, IoT and Machine Learning (BIOM 2022)
2nd International Conference on Big Data, IoT and Machine Learning (BIOM 2022)2nd International Conference on Big Data, IoT and Machine Learning (BIOM 2022)
2nd International Conference on Big Data, IoT and Machine Learning (BIOM 2022)
ijp2p
 
7th International Conference on Networks, Communications, Wireless and Mobile...
7th International Conference on Networks, Communications, Wireless and Mobile...7th International Conference on Networks, Communications, Wireless and Mobile...
7th International Conference on Networks, Communications, Wireless and Mobile...
ijp2p
 
4th International Conference on Internet of Things (CIoT 2022)
4th International Conference on Internet of Things (CIoT 2022)4th International Conference on Internet of Things (CIoT 2022)
4th International Conference on Internet of Things (CIoT 2022)
ijp2p
 
11th International conference on Parallel, Distributed Computing and Applicat...
11th International conference on Parallel, Distributed Computing and Applicat...11th International conference on Parallel, Distributed Computing and Applicat...
11th International conference on Parallel, Distributed Computing and Applicat...
ijp2p
 
3rd International Conference on Machine learning and Cloud Computing (MLCL 2022)
3rd International Conference on Machine learning and Cloud Computing (MLCL 2022)3rd International Conference on Machine learning and Cloud Computing (MLCL 2022)
3rd International Conference on Machine learning and Cloud Computing (MLCL 2022)
ijp2p
 
4th International Conference on Internet of Things (CIoT 2022)
4th International Conference on Internet of Things (CIoT 2022) 4th International Conference on Internet of Things (CIoT 2022)
4th International Conference on Internet of Things (CIoT 2022)
ijp2p
 
CIoT 2022 CFP (1).pdf
CIoT 2022 CFP (1).pdfCIoT 2022 CFP (1).pdf
CIoT 2022 CFP (1).pdf
ijp2p
 
International Journal of peer-to-peer networks (IJP2P)
International Journal of peer-to-peer networks (IJP2P)International Journal of peer-to-peer networks (IJP2P)
International Journal of peer-to-peer networks (IJP2P)
ijp2p
 
3rd International Conference on Networks, Blockchain and Internet of Things (...
3rd International Conference on Networks, Blockchain and Internet of Things (...3rd International Conference on Networks, Blockchain and Internet of Things (...
3rd International Conference on Networks, Blockchain and Internet of Things (...
ijp2p
 
3rd International Conference on NLP & Information Retrieval (NLPI 2022)
3rd International Conference on NLP & Information Retrieval (NLPI 2022)3rd International Conference on NLP & Information Retrieval (NLPI 2022)
3rd International Conference on NLP & Information Retrieval (NLPI 2022)
ijp2p
 
CALL FOR PAPERS - 14th International Conference on Wireless & Mobile Networks...
CALL FOR PAPERS - 14th International Conference on Wireless & Mobile Networks...CALL FOR PAPERS - 14th International Conference on Wireless & Mobile Networks...
CALL FOR PAPERS - 14th International Conference on Wireless & Mobile Networks...
ijp2p
 
PUBLISH YOUR PAPER - INTERNATIONAL JOURNAL OF PEER-TO-PEER NETWORKS (IJP2P)
PUBLISH YOUR PAPER - INTERNATIONAL JOURNAL OF PEER-TO-PEER NETWORKS (IJP2P)PUBLISH YOUR PAPER - INTERNATIONAL JOURNAL OF PEER-TO-PEER NETWORKS (IJP2P)
PUBLISH YOUR PAPER - INTERNATIONAL JOURNAL OF PEER-TO-PEER NETWORKS (IJP2P)
ijp2p
 
International Journal of peer-to-peer networks (IJP2P)
International Journal of peer-to-peer networks (IJP2P)International Journal of peer-to-peer networks (IJP2P)
International Journal of peer-to-peer networks (IJP2P)
ijp2p
 
3rd International Conference on Blockchain and Internet of Things (BIoT 2022)
3rd International Conference on Blockchain and Internet of Things (BIoT 2022)3rd International Conference on Blockchain and Internet of Things (BIoT 2022)
3rd International Conference on Blockchain and Internet of Things (BIoT 2022)
ijp2p
 
International Journal of peer-to-peer networks (IJP2P)
International Journal of peer-to-peer networks (IJP2P)International Journal of peer-to-peer networks (IJP2P)
International Journal of peer-to-peer networks (IJP2P)
ijp2p
 
CALL FOR PAPERS - 4th International Conference on Internet of Things (CIoT 2022)
CALL FOR PAPERS - 4th International Conference on Internet of Things (CIoT 2022)CALL FOR PAPERS - 4th International Conference on Internet of Things (CIoT 2022)
CALL FOR PAPERS - 4th International Conference on Internet of Things (CIoT 2022)
ijp2p
 

More from ijp2p (20)

COMPARATIVE STUDY OF CAN, PASTRY, KADEMLIA AND CHORD DHTS
COMPARATIVE STUDY OF CAN, PASTRY, KADEMLIA AND CHORD DHTSCOMPARATIVE STUDY OF CAN, PASTRY, KADEMLIA AND CHORD DHTS
COMPARATIVE STUDY OF CAN, PASTRY, KADEMLIA AND CHORD DHTS
 
International Journal of Peer to Peer Networks .docx
International Journal of Peer to  Peer Networks .docxInternational Journal of Peer to  Peer Networks .docx
International Journal of Peer to Peer Networks .docx
 
International Journal of peer-to-peer networks (IJP2P)
International Journal of peer-to-peer networks (IJP2P)International Journal of peer-to-peer networks (IJP2P)
International Journal of peer-to-peer networks (IJP2P)
 
International Journal of peer-to-peer networks (IJP2P)
International Journal of peer-to-peer networks (IJP2P)International Journal of peer-to-peer networks (IJP2P)
International Journal of peer-to-peer networks (IJP2P)
 
2nd International Conference on Big Data, IoT and Machine Learning (BIOM 2022)
2nd International Conference on Big Data, IoT and Machine Learning (BIOM 2022)2nd International Conference on Big Data, IoT and Machine Learning (BIOM 2022)
2nd International Conference on Big Data, IoT and Machine Learning (BIOM 2022)
 
7th International Conference on Networks, Communications, Wireless and Mobile...
7th International Conference on Networks, Communications, Wireless and Mobile...7th International Conference on Networks, Communications, Wireless and Mobile...
7th International Conference on Networks, Communications, Wireless and Mobile...
 
4th International Conference on Internet of Things (CIoT 2022)
4th International Conference on Internet of Things (CIoT 2022)4th International Conference on Internet of Things (CIoT 2022)
4th International Conference on Internet of Things (CIoT 2022)
 
11th International conference on Parallel, Distributed Computing and Applicat...
11th International conference on Parallel, Distributed Computing and Applicat...11th International conference on Parallel, Distributed Computing and Applicat...
11th International conference on Parallel, Distributed Computing and Applicat...
 
3rd International Conference on Machine learning and Cloud Computing (MLCL 2022)
3rd International Conference on Machine learning and Cloud Computing (MLCL 2022)3rd International Conference on Machine learning and Cloud Computing (MLCL 2022)
3rd International Conference on Machine learning and Cloud Computing (MLCL 2022)
 
4th International Conference on Internet of Things (CIoT 2022)
4th International Conference on Internet of Things (CIoT 2022) 4th International Conference on Internet of Things (CIoT 2022)
4th International Conference on Internet of Things (CIoT 2022)
 
CIoT 2022 CFP (1).pdf
CIoT 2022 CFP (1).pdfCIoT 2022 CFP (1).pdf
CIoT 2022 CFP (1).pdf
 
International Journal of peer-to-peer networks (IJP2P)
International Journal of peer-to-peer networks (IJP2P)International Journal of peer-to-peer networks (IJP2P)
International Journal of peer-to-peer networks (IJP2P)
 
3rd International Conference on Networks, Blockchain and Internet of Things (...
3rd International Conference on Networks, Blockchain and Internet of Things (...3rd International Conference on Networks, Blockchain and Internet of Things (...
3rd International Conference on Networks, Blockchain and Internet of Things (...
 
3rd International Conference on NLP & Information Retrieval (NLPI 2022)
3rd International Conference on NLP & Information Retrieval (NLPI 2022)3rd International Conference on NLP & Information Retrieval (NLPI 2022)
3rd International Conference on NLP & Information Retrieval (NLPI 2022)
 
CALL FOR PAPERS - 14th International Conference on Wireless & Mobile Networks...
CALL FOR PAPERS - 14th International Conference on Wireless & Mobile Networks...CALL FOR PAPERS - 14th International Conference on Wireless & Mobile Networks...
CALL FOR PAPERS - 14th International Conference on Wireless & Mobile Networks...
 
PUBLISH YOUR PAPER - INTERNATIONAL JOURNAL OF PEER-TO-PEER NETWORKS (IJP2P)
PUBLISH YOUR PAPER - INTERNATIONAL JOURNAL OF PEER-TO-PEER NETWORKS (IJP2P)PUBLISH YOUR PAPER - INTERNATIONAL JOURNAL OF PEER-TO-PEER NETWORKS (IJP2P)
PUBLISH YOUR PAPER - INTERNATIONAL JOURNAL OF PEER-TO-PEER NETWORKS (IJP2P)
 
International Journal of peer-to-peer networks (IJP2P)
International Journal of peer-to-peer networks (IJP2P)International Journal of peer-to-peer networks (IJP2P)
International Journal of peer-to-peer networks (IJP2P)
 
3rd International Conference on Blockchain and Internet of Things (BIoT 2022)
3rd International Conference on Blockchain and Internet of Things (BIoT 2022)3rd International Conference on Blockchain and Internet of Things (BIoT 2022)
3rd International Conference on Blockchain and Internet of Things (BIoT 2022)
 
International Journal of peer-to-peer networks (IJP2P)
International Journal of peer-to-peer networks (IJP2P)International Journal of peer-to-peer networks (IJP2P)
International Journal of peer-to-peer networks (IJP2P)
 
CALL FOR PAPERS - 4th International Conference on Internet of Things (CIoT 2022)
CALL FOR PAPERS - 4th International Conference on Internet of Things (CIoT 2022)CALL FOR PAPERS - 4th International Conference on Internet of Things (CIoT 2022)
CALL FOR PAPERS - 4th International Conference on Internet of Things (CIoT 2022)
 

Recently uploaded

Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptxBridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Brad Spiegel Macon GA
 
Comptia N+ Standard Networking lesson guide
Comptia N+ Standard Networking lesson guideComptia N+ Standard Networking lesson guide
Comptia N+ Standard Networking lesson guide
GTProductions1
 
Latest trends in computer networking.pptx
Latest trends in computer networking.pptxLatest trends in computer networking.pptx
Latest trends in computer networking.pptx
JungkooksNonexistent
 
How to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptxHow to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptx
Gal Baras
 
1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...
JeyaPerumal1
 
guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...
Rogerio Filho
 
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdfJAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
Javier Lasa
 
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shopHistory+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
laozhuseo02
 
test test test test testtest test testtest test testtest test testtest test ...
test test  test test testtest test testtest test testtest test testtest test ...test test  test test testtest test testtest test testtest test testtest test ...
test test test test testtest test testtest test testtest test testtest test ...
Arif0071
 
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
eutxy
 
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
3ipehhoa
 
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
3ipehhoa
 
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC
 
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
ufdana
 
The+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptxThe+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptx
laozhuseo02
 
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
keoku
 
Internet-Security-Safeguarding-Your-Digital-World (1).pptx
Internet-Security-Safeguarding-Your-Digital-World (1).pptxInternet-Security-Safeguarding-Your-Digital-World (1).pptx
Internet-Security-Safeguarding-Your-Digital-World (1).pptx
VivekSinghShekhawat2
 
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
3ipehhoa
 
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and GuidelinesMulti-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Sanjeev Rampal
 
BASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptxBASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptx
natyesu
 

Recently uploaded (20)

Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptxBridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
 
Comptia N+ Standard Networking lesson guide
Comptia N+ Standard Networking lesson guideComptia N+ Standard Networking lesson guide
Comptia N+ Standard Networking lesson guide
 
Latest trends in computer networking.pptx
Latest trends in computer networking.pptxLatest trends in computer networking.pptx
Latest trends in computer networking.pptx
 
How to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptxHow to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptx
 
1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...
 
guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...
 
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdfJAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
 
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shopHistory+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
 
test test test test testtest test testtest test testtest test testtest test ...
test test  test test testtest test testtest test testtest test testtest test ...test test  test test testtest test testtest test testtest test testtest test ...
test test test test testtest test testtest test testtest test testtest test ...
 
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
 
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
 
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
 
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
 
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
 
The+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptxThe+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptx
 
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
 
Internet-Security-Safeguarding-Your-Digital-World (1).pptx
Internet-Security-Safeguarding-Your-Digital-World (1).pptxInternet-Security-Safeguarding-Your-Digital-World (1).pptx
Internet-Security-Safeguarding-Your-Digital-World (1).pptx
 
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
 
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and GuidelinesMulti-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
 
BASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptxBASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptx
 

IMPROVING HYBRID REPUTATION MODEL THROUGH DYNAMIC REGROUPING

  • 1. International Journal of Peer to Peer Networks (IJP2P) Vol.3, No.3/4, July 2012 DOI : 10.5121/ijp2p.2012.3301 1 IMPROVING HYBRID REPUTATION MODEL THROUGH DYNAMIC REGROUPING Sreenu G 1 and Dhanya P M 2 1 Department of Computer Science, RSET, Rajagiri valley, Cochin, India gsreenug@gmail.com 2 Department of Computer Science, RSET, Rajagiri valley, Cochin, India dhanya.rajeshks@gmail.com ABSTRACT Peer-to-Peer (P2P) systems have the ability to bond with millions of clients in business and knowledge scenario. The mechanism that leads users to distribute files without the need of centralized servers has achieved wide recognition among internet users. This also permits for a range of applications further than simple file sharing. he main problem lies in the fact that peers have to customarily intermingle with mysterious peers in the absence of trusted third parties. Usually the lack of incentives often makes these strange peers to act as freeriders and thus reduce the system performance. The trustworthiness among peers is portrayed by applying the knowledge obtained as a result of reputation mechanisms. This paper endows with a new reputation model in association with a detailed survey of diverse reputation models. The proposed model suggests a hybrid reputation model through dynamic regrouping.. KEYWORDS Hybrid Reputation, Compatibility Coefficient, Group splitting 1. INTRODUCTION Presently the thought of P2P system has been fascinated plenty of curiosity in the network field. The sophisticated features like decentralized processing, independent nature of nodes and scalability makes the system more advantageous. One of the prevailing features that differentiate P2P system is the overlay network. Overlay network allows the P2P systems to connect diverse systems on top of existing network configurations. Overlay network supports an open environment which in turn supports participation of all types of nodes. The presence of malicious nodes cannot be easily detected in the case of an open network and it raises a severe problem to the security of the network. On the better side the open nature of P2P network can be used to share the computing resources but the open nature itself creates a hazardous state through the inclusion of malicious peers. These malicious peers can diminish the system popularity by degrading the performance through malicious behavior like altering the message when it is passing through the transmission medium and denial of services of other peers. To increase the number of participants the system must be competitive to provide good quality of service. As the number of participants increases the performance of the system will increase. On hand techniques to address these security issues include reputation mechanism, cryptographic techniques, and access control and data integrity mechanisms.
  • 2. International Journal of Peer to Peer Networks (IJP2P) Vol.3, No.3/4, July 2012 2 This paper summarizes features of different reputation models along with proposed hybrid reputation model. Hybrid reputation model suggests a new reputation model for finding the reputation score of each peer through group formation. It demonstrates the different procedures involved in the formation of groups, trust calculation and behavior judgment. Furthermore, the paper discusses the main advantages and issues identified in the model. Finally the projected result analyses the possible outcome of the project. 2. EXISTING SOLUTIONS The P2P systems are facing the main problem of communication with strangers. So the whole thing is based on mutual trust among communicating peers. Trust value calculation can take input from reputation systems in the form of predictions on peer behavior in future founded on past behavior. Reputation value can also be extracted in the form of recommendations from other participating peers. A detailed survey of various reputation mechanisms includes the following methods. 1. eBAY [1]: This is a centralized reputation system as a solution to identify reputed peers involved in the transaction. The participating peers uses an online feedback system to rate other peers after each transaction and overall reputation of a participating peer is calculated as the sum of ratings over previous six months. 2. Xrep [2]: The main procedures involved in resource searching are vote polling and vote clustering. The peer will post the required service and collect the responses from all participating peers. In vote polling phase the participating peers will record their opinion about the peer. In vote clustering phase the recorded opinions will be aggregated. The peer behaviour is predicted based on the total votes collected. 3. TrustMe [3] : A bootstrap server will assign the trust value of participating peers to certain trust holding peers. These THA peers will give the trust values in response to the broadcasted queries from requesting peers. Security, anonymity and use of cryptographic keys are the main feature identified in the method. 4. NICE [4] : Cooperative distributed applications can be effectively implemented in a NICE platform. The service provider can check the reputation of the peer by considering the signed set of certificates. Moreover the service provider also conducts a search about the reputation of the peer. So finally the reputation value will be a considered as a combination of the certificates and referenced search. 5. EigenTrust [5]: EigenTrust uses concept of global trust value .Each peer is having a trust value about the peer that is globally accepted inside the network. By considering the global reputation the peer behavior can be determined as malicious or normal peer. 6. PeerTrust [6]:System architecture of PeerTrust has no central database. The trust data is distributes across the network. The trust manager associated with each peer will perform the functions of feedback submission and trust computation. 7. PowerTrust [7] : Trust overlay network is built on top of all peers in the network. Highly reputed power nodes will be selected using a distributed ranking mechanism. The PowerTrust system will take its input in the form of local trust scores send by peers after each transaction. The global reputation value of each peer will be calculated by the PowerTrust system by aggregating all the local trust scores. 8. FuzzyTrust [8]: Approximated reasoning is highly supported by FuzzyTrust. Uncertainty, fuzziness and incomplete information is better handled by FuzzyTrust. FuzzyTrust applies fuzzy inference on local trust value calculation and uses fuzzy inference to obtain global reputation aggregation weights. 9. GossipTrust [9]: Suggests a reputation aggregation scheme for unstructured networks.The process itself includes different steps and cycles. The peers are exchanging local scores
  • 3. International Journal of Peer to Peer Networks (IJP2P) Vol.3, No.3/4, July 2012 3 with randomly chosen neighbours and update the peers trust value. This repeats and finally the trust value congregates in one cycle. The next cycle will use the previous cycle congregated value and again find the new congregated value.The main feature is the method aggregate the reputation values in a completely distributed and scalable way. 10. Dual-EigenRep [10]: The method considers the recommended and recommending roles of each peer. The unified association between these two behaviors finally forms different trust communities which categorize different types of peers. 11. Three-Dimensional Based Trust Management Scheme for Virus Control in P2P Networks [11]: The method reflects on the trust values of peers and infection values of both the peers and content. A three dimensional normalization is used in ratio based normalization models to enhance the efficiency on the trust value computation. 2.1. Assessment of assorted active Methods The above methods can be analysed in different ways. The main advantages and disadvantages analysed in different methods can be illustrated in the following way. 1. eBAY: A central server is present to manage the reputation values. The advantage is that users can put their feedback in an online feedback form. It is an actually used reputation system. The feedback can be recorded using numeric values. The main disadvantage is the lack of security. 2. Xrep: The main advantage is that the method combines the peer based reputation and resource based reputation. The disadvantage is that increase in the number of resources compared to number of peers will create astorage overhead problems. 3. TrustMe: The anonymous nature of storage of reputation values will create a secure environment. The performance will be affected if the network size is very large. As result of this method lots of messages will be generated. Furthermore the large network size will result a delay in time taken to transfer the global reputation value among peers. 4. NICE: The search and inference performance of the system will be enhanced if the users store added information. One drawback is the method not describing about the speed of transactions. 5. EigenTrust: Use of power iteration provides a distributed and secure method to compute global trust value. The inference that the peers which exchange trusted files will report sincere trust values is one disadvantage. 6. PeerTrust: The method will deal with the deceitful feedbacks and also handle the lack of incentives problem. The problem identified in this method is that it is not easy to implement in large scale P2P networks. 7. PowerTrust: The functioning competence can be achieved through the presence of power nodes. Since the power nodes can act as hotspots there is a chance congestion in the network. 8. FuzzyTrust: The malicious peers can be detected in a fast manner. The problem identified is that the method is not handling the collusion attack and freeriding . 9. GossipTrust: The application of bloom filters can be used for efficient reputation storage and identity based cryptography is used for secure communication. The drawback identified is that there is no method is defined to punish the malicious nodes. 10. Dual-EigenRep: The method is very efficient against different types of security issues like collusion,disguise and exaggeration.The method is not mentioning about the speed of transactions. 11. Three-Dimensional Based Trust Management Scheme for Virus Control in P2P Networks: The propagation of virus can be limited to a small number of peers. The main feature is that these activities will not affect the file downloading process. The method is not mentioning about the transaction speed.
  • 4. International Journal of Peer to Peer Networks (IJP2P) Vol.3, No.3/4, July 2012 4 An assessment of above listed methods shows that some of them are efficient in detecting malicious peers. Some methods are efficient in efficient storage of reputation scores, and others are useful in efficient computation of trust values. This paper suggests a hybrid reputation model which brings together all these factors to provide an efficient reputation model. 3. PROPOSED SOLUTION The proposed model focuses on the group formation based on the similarity of functions. All the participating peers will have a set of services and requirements. The requirements and services are needed to be shared among other participating peers. Functions are the combinations of services and requirements. Mutually complementing functions will share same group. The functional similarity is evaluated with the help of Compatibility Coefficient (CC). The CC computation is done through prefixed threshold values. Different peers can communicate within their group through intra group communication and different groups can communicate through inter group communication. In order to analyse the peer behaviour the trust value is evaluated. The peers with a trust value below the fixed threshold will consider as malicious and are prohibited from further communication. Furthermore based on the transmission rate the groups will be regrouped. The necessity of group splitting and precise behaviour forecasting will be explained in later sections. Figure 1 represents a model of the proposed hybrid reputation model. Figure 1. Model of the proposed system [12] The detailed procedure of Hybrid Reputation Model is explained in following divisions. 3.1. Node Registration at central coordinator The initial procedure of the system is node registration. This procedure is done at the entry point of the system that is the central coordinator. During registration the nodes will list their services and requirements.
  • 5. International Journal of Peer to Peer Networks (IJP2P) Vol.3, No.3/4, July 2012 5 3.2. Compatibility Coefficient (CC) The central coordinator will calculate the CC value. The function of central coordinator is the computation of CC value and group peers according to CC value. 3.3. Calculation of CC Based on the calculated CC value the participating peers are categorized into different groups. Each group should have a coordinator. The peer which led to the formation of a new group will act as the coordinator for that group. The CC value calculation is done by fixing two threshold values t1 and t2. Initially the opening node will act as the coordinator for the first group. All the arriving nodes will send their services and requirements with already existing group coordinators. The group coordinators will calculate the CC value between their group and arriving node. The central coordinator will compare the CC value calculated in all coordinators. The CC value will be incremented by 1 if there is a match in between the services of arriving node i and requirements of coordinator node j and vice versa. Finally the CC values will be aggregated and compared with threshold values. 3.4. Group Formation The central coordinator will compare the CC value of different group coordinators and initiate the group formation. 1. If the CC value between arriving node i and coordinator j is above threshold t1 then node i will join with coordinator j. 2. If the CC value is below threshold t2 the arriving node will form a new group. 3. If the CC value between arriving node and different coordinators is between t1 and t2 a regrouping will be performed. 4. If there is more than one group having threshold value greater than t1 then the group with highest CC value will be selected for group formation. Figure 2 shows the diagram of peers in a group. Each peer is associated with reputation table. Figure 2. Group of peers allocated with reputation table[12]
  • 6. International Journal of Peer to Peer Networks (IJP2P) Vol.3, No.3/4, July 2012 6 3.5. Intra group Communication Different peers in a group can communicate within their group. Each peer can satisfy other peers requirements. Since the group formation is based on similarity of functions the time taken to complete each request will be reduced. 3.6. Response Gathering After the completion of each transaction the service requesting peers have to record their feedback about service provider. All the peers will be associated with a reputation table. The feedback about service provider should be recorded in the corresponding column of reputation table of service requestor. The reputation table contains space for all participating nodes in their group. After each local update the feedback scores will be globally updated using GossipTrust algorithm. 3.7. Appraisal of aggregated response values The feedback recorded will represent the corresponding trust value. Each successful transaction will record a positive feedback. The positive feedback will be added by 1 and negative feedback will be decremented by 1. Before each transaction the peers will verify the reputation table. If the feedback (trust value) recorded for a node is below a fixed threshold the node will be consider as malicious and avoid from the remaining communication. 3.8. Intergroup Communication If the requests for a peer will not satisfied within their group the request will be forwarded to other group coordinators. The group coordinators will check within their group and send a reply to the requestor coordinator if the requested service is available with required trust value. 3.9. Dynamic Regrouping The size of each group is fixed based on the transmission rate within their group. After the joining of a new peer each group will be examined for its transmission criteria. The transmission criterion is evaluated using following parameters. 1. Number of packets per second 2. The available bandwidth If the number of packets per second exceeds the available bandwidth the group will be divided. 3.10. Group splitting At regular intervals of time the central coordinator will split the groups and reorder the groups. This reordering will help to avoid the malicious nodes from appearing to the next level. This will also reorder the nodes based on the changes in services and requests.
  • 7. International Journal of Peer to Peer Networks (IJP2P) Vol.3, No.3/4, July 2012 7 4. IDENTIFIED ISSUES AND RECOGNIZED SOLUTION IN PROPOSED MODEL The chance of failure of central coordinator and group coordinator should be handled effectively. The failure of central coordinator can be handled by applying election algorithm [13] among the existing group coordinators. The group coordinator failure can be handled by applying election algorithm within the group itself. 5. GUARANTEED QUALITIES OF THE SYSTEM 5.1. Less Flooding Since the peers are arranged in different groups most of the requests will be satisfied within the group. So unnecessary flooding can be avoided. 5.2. Small Sized Reputation Table Each peer has to store a reputation table which containe entries for the peers in the same group. So the size of reputation table can be reduced. 5.3. Fast access Less flooding will naturally reduce the access time. 5.4. Enhanced quality The grouping of peers will limit the number of peers in each groups and that in turn reduce the traffic in each group. Reduced traffic will avoid congestion and loss of packets. All the services will be provided with less delay and high quality. 6. RESULT ANALYSIS The proposed model suggests a less delayed high quality reputation model. The inclusion of regrouping will increase the transmission quality and the inclusion of group splitting will reduce the chance of malicious peers. The application of group splitting will not allow malicious peers from past transactions to enter into new transactions. So the reduction of malicious peers can be seen in each step after group splitting. The quality of a transmission consists of the reduction in transmission delay, fast detection of malicious peers and the large number of successful requests. The expected outcome of the project as plotted in Figure3, 4and 5 shown the above discussed three factors.
  • 8. International Journal of Peer to Peer Networks (IJP2P) Vol.3, No.3/4, July 2012 8 Figure 3. Transaction delay Figure 4. Number of Successful Requests Figure 5. Detection of Malicious peers 7. CONCLUSION A detailed study of existing reputation models is presented with a good analysis. The proposed model is a solution to the identified deficiencies in the existing methods. The entire working is illustrated in different steps including group formation, trust calculation and behavior determination. The paper also discusses the merits and demerits of the proposal. The identified solutions for these drawbacks are also presented. Finally the expected result is explained with the help of different pie charts.
  • 9. International Journal of Peer to Peer Networks (IJP2P) Vol.3, No.3/4, July 2012 9 REFERENCES [1] eBay. eBay home page, ( 2009) http://www.ebay.com.. [2] E. Damiani, S. Vimercati, S. Paraboschi, P. Samarati, and F. Violante, (2002) ”A Reputation-based Approach for Choosing Reliable Resources in Peer-to-Peer Networks”, ACM Symposium on Computer Communication Security, pp.207 -216. [3] A. Singh and L. Liu, (2003) “TrustMe: Anonymous Management of Trust Relationships in Decentralized P2P Systems”, IEEE IntI. Conf. on Peer-to-Peer Computing, pp.142-149. [4] S. Lee, R. Sherwood, and B. Bhattacharjee, (2003) Cooperative peer groups in NICE. [5] D. Kamvar, M. Schlosser, and H. Garcis-Molina, (2003) "The EigenTrust Algorithm for Reputation Management in P2P Networks," Proc.Word Wide Web Conf. (WWW2003), ACM Press, pp. 640- 651. [6] L. Xiong and L. Liu, (2004) “PeerTrust: Supporting Reputation-Based Trust for peer-to-peer Electronic Communities”, IEEE Transactions on Knowledge and Data Engineering,16(7):843– 857,Second International Conference on Availability, Reliability and Security (ARES'07) [7] R. Zhou and K. Hwang, (2006) "PowerTrust: A Robust and Scalable Reputation System for Trusted Peer-to-Peer Computing" IEEE Trans. Parallel and Distributed Systems., vol. 18, no4 , ppA60-473. [8] S. Song, K. Hwang, R. Zhou and YK. Kwok, (2005) ”Trusted P2P Transactions with Fuzzy Reputation Aggregation”, IEEE Internet Computing, Vol. 9, No. 6, pp.24-34. [9] R Zhou and K. Hwang, (2007) "Gossip-based reputation aggregation for unstructured peer-to-peer networks," in Proceedings of IEEE International Conference Parallel and Distributed Processing Symposium, pp. 1-10. V3-23. [10] Xinxin Fan, Mingchu Li, Yizhi Ren and Jianhua Ma, (2010) “Dual-EigenRep: A Reputation-based Trust Model for P2P File-Sharing Networks”uic-atc,pp.358-363, Symposia and Workshops on Ubiquitous, Autonomic and Trusted Computing. [11] Lin Cai and Roberto Rojas-Cessa, (2010) "Three-Dimensional Based Trust Management Scheme for Virus Control in P2P Networks," Proc. IEEE ICC 2010, 5 pp., Cape Town, South Africa, May 23-27. [12] Sreenu G, Dhanya P.M,(2012) “ A Hybrid Reputation Model through Federation of Peers Having Analogous Function “ , Advances in Computer Science , eng.& Appl., AISC 166,pp.837- 846.springerlink.com [13] Andrew S. Tanenbaum , (1994) Distributed Operating Systems, Prentice Hall; 1 edition Authors 1. Sreenu G is a post graduate student in M.Tech CSESIS, Department of Computer Science and Engineering, RSET, Kochi, INDIA. Her interested areas are reputation models in P2P security and Distributed computing. She has been working as a lecturer in the same department. 2. Dhanya P.M is working as Assistant professor in the Department of Computer Science and Engineering, RSET, Kochi, INDIA. Her areas of interest are P2P networking, Distributed Computing and natural language processing. She is now a research scholar in CUSAT, KOCHI.