SlideShare a Scribd company logo
1 of 12
Bhuvaneswari.P.B
Kavi Priya.P
Padmavathi.M
Pavithra.P
 Anonymous nature of peer-to-peer (P2P) systems exposes
them to malicious activity.
 Building trust relationships among peers can mitigate
attacks of malicious peers.
 This project enable a peer to reason about trustworthiness
of other peers based on their past interactions.
 Peers create their own trust network in their proximity by
using local information available and do not try to learn
global trust information.
• Two contexts of trust, service, and recommendation
context, are defined to measure trustworthiness in
providing services and giving recommendations.
• Interactions and recommendations are evaluated
based on importance, recentness, and peer satisfaction
parameters.
 Calculated trust information is not global and does not
reflect opinions of all peers.
 Classifying peers as either trustworthy or
untrustworthy is not sufficient in most cases. Metrics
should have precision so peers can be ranked
according to trustworthiness.
 Trust models on P2P systems have extra challenges
comparing to e-commerce platforms. Malicious peers
have more attack opportunities in P2P trust models
due to lack of a central authority
 Recommendation-based attacks were contained except
when malicious peers are in large numbers, e.g., 50
percent of all peers.
 Experiments on SORT show that good peers can
defend themselves against malicious peers metrics let
a peer assess trustworthiness of other peers based on
local information.
 Service and recommendation contexts enable better
measurement of trustworthiness in providing services
and giving recommendations.
 Service Trust Metric
 Reputation Metric
 Recommendation Trust Metric
 Selecting Service Providers
 When evaluating an acquaintance’s trustworthiness in the
service context, a peer first calculates competence and
integrity belief values using the information in its service
history.
 Competence belief represents how well an acquaintance
satisfied the needs of past interactions .Let friend request
denote the competence belief of pi about pj in the service
context. Average behavior in the past interactions is a
measure of the competence belief. Consistency is as
important as competence.
 Level of confidence in predictability of future interactions
is called integrity belief. Let I bij denote the integrity
belief of pi about pj in the service context. Deviation from
average behavior (cbij) is a measure of the integrity belief.
 The reputation metric measures a stranger’s trust worthiness
based on recommendations. In the following two sections, we
assume that pj is a stranger to pi and pk is an acquaintance of pi.
 If pi wants to calculate rij value, it starts a reputation query to
collect recommendations from its acquaintances. Trustworthy
acquaintances and requests their recommendations.
 Let max denote the maximum number of recommendations that
can be collected in a reputation query and jSj denote the size of a
set S.
 In the getting recommendation algorithm, pi sets a high
threshold for recommendation trust values and requests
recommendations from highly trusted acquaintances first.
Then, it decreases the threshold and repeats the same
operations.
 Eg: Facebook.
 Assume that pi wants to get a particular service. pj is a
stranger to pi and a probable service provider. To learn pj’s
reputation, pi requests recommendations from its
acquaintances.
 Assume that pk sends back a recommendation to pi. After
collecting all recommendations, pi calculates rij. Then, pi
evaluates pk’s recommendation, stores results in RH ik,
and updates rtik. Assuming pj is trustworthy enough, pi
gets the service from pj.
 Then, pi evaluates this interaction and stores the results in
SH ij, and updates stij.
 When pi searches for a particular service, it gets a list
of service providers.
 Considering a facebook application, either post share
the links to other peer. Connecting the all people with
recommendation multiple peers, checking integrity is
a problem since any file part downloaded from an
uploader might be inauthentic.
 Service provider selection is done based on service
trust metric, service history size, competence belief,
and integrity belief values. When pi wants to
download a file, it selects an uploader with the highest
service trust value
SORT Self Organizing trust model for peer to peer system

More Related Content

Similar to SORT Self Organizing trust model for peer to peer system

Iaetsd organizing the trust model in peer-to-peer system using
Iaetsd organizing the trust model in peer-to-peer system usingIaetsd organizing the trust model in peer-to-peer system using
Iaetsd organizing the trust model in peer-to-peer system usingIaetsd Iaetsd
 
Trust and reputation models among agents
Trust and reputation models among agentsTrust and reputation models among agents
Trust and reputation models among agentsNick Bassiliades
 
Research on e-loyalty
Research on  e-loyaltyResearch on  e-loyalty
Research on e-loyaltySaurabh Meena
 
A computational dynamic trust model
A computational dynamic trust modelA computational dynamic trust model
A computational dynamic trust modelNexgen Technology
 
A COMPUTATIONAL DYNAMIC TRUST MODEL FOR USER AUTHORIZATION
A COMPUTATIONAL DYNAMIC TRUST MODEL FOR USER AUTHORIZATIONA COMPUTATIONAL DYNAMIC TRUST MODEL FOR USER AUTHORIZATION
A COMPUTATIONAL DYNAMIC TRUST MODEL FOR USER AUTHORIZATIONnexgentechnology
 
A computational dynamic trust model
A computational dynamic trust modelA computational dynamic trust model
A computational dynamic trust modelnexgentech15
 
A COMPUTATIONAL DYNAMIC TRUST MODEL FOR USER AUTHORIZATION - IEEE PROJECTS I...
A COMPUTATIONAL DYNAMIC TRUST MODEL FOR USER AUTHORIZATION  - IEEE PROJECTS I...A COMPUTATIONAL DYNAMIC TRUST MODEL FOR USER AUTHORIZATION  - IEEE PROJECTS I...
A COMPUTATIONAL DYNAMIC TRUST MODEL FOR USER AUTHORIZATION - IEEE PROJECTS I...Nexgen Technology
 
IRJET - Sentiment Similarity Analysis and Building Users Trust from E-Commerc...
IRJET - Sentiment Similarity Analysis and Building Users Trust from E-Commerc...IRJET - Sentiment Similarity Analysis and Building Users Trust from E-Commerc...
IRJET - Sentiment Similarity Analysis and Building Users Trust from E-Commerc...IRJET Journal
 
JAVA 2013 IEEE NETWORKSECURITY PROJECT SORT: A Self-ORganizing Trust Model fo...
JAVA 2013 IEEE NETWORKSECURITY PROJECT SORT: A Self-ORganizing Trust Model fo...JAVA 2013 IEEE NETWORKSECURITY PROJECT SORT: A Self-ORganizing Trust Model fo...
JAVA 2013 IEEE NETWORKSECURITY PROJECT SORT: A Self-ORganizing Trust Model fo...IEEEGLOBALSOFTTECHNOLOGIES
 
Impact of Customer Value, Public Relations Perception and Brand Image on Cust...
Impact of Customer Value, Public Relations Perception and Brand Image on Cust...Impact of Customer Value, Public Relations Perception and Brand Image on Cust...
Impact of Customer Value, Public Relations Perception and Brand Image on Cust...Samar Rahi
 
Implicit vs. Explicit Trust in Social Matrix Factorization
Implicit vs. Explicit Trust in Social Matrix Factorization Implicit vs. Explicit Trust in Social Matrix Factorization
Implicit vs. Explicit Trust in Social Matrix Factorization Soudé Fazeli
 
Implicit vs Explicit trust in Social Matrix Factorization
Implicit vs Explicit trust in Social Matrix FactorizationImplicit vs Explicit trust in Social Matrix Factorization
Implicit vs Explicit trust in Social Matrix FactorizationAlejandro Bellogin
 
Automatic Recommendation of Trustworthy Users in Online Product Rating Sites
Automatic Recommendation of Trustworthy Users in Online Product Rating SitesAutomatic Recommendation of Trustworthy Users in Online Product Rating Sites
Automatic Recommendation of Trustworthy Users in Online Product Rating SitesIRJET Journal
 
Referral_Engine_OC03
Referral_Engine_OC03Referral_Engine_OC03
Referral_Engine_OC03Walt Lubinec
 
A novel approach for trust management for peer peer
A novel approach for trust management for peer peerA novel approach for trust management for peer peer
A novel approach for trust management for peer peerSnehith
 
A Computational Dynamic Trust Model for User Authorization
A Computational Dynamic Trust Model for User AuthorizationA Computational Dynamic Trust Model for User Authorization
A Computational Dynamic Trust Model for User Authorization1crore projects
 
consumer satisfaction
consumer satisfaction consumer satisfaction
consumer satisfaction Tim Cheng
 
Sort a self o rganizing trust model for peer-to-peer systems
Sort a self o rganizing trust model for peer-to-peer systemsSort a self o rganizing trust model for peer-to-peer systems
Sort a self o rganizing trust model for peer-to-peer systemsJPINFOTECH JAYAPRAKASH
 
Online Service Rating Prediction by Removing Paid Users and Jaccard Coefficient
Online Service Rating Prediction by Removing Paid Users and Jaccard CoefficientOnline Service Rating Prediction by Removing Paid Users and Jaccard Coefficient
Online Service Rating Prediction by Removing Paid Users and Jaccard CoefficientIRJET Journal
 
AIST 2015 Conference Paper Presentation
AIST 2015 Conference Paper PresentationAIST 2015 Conference Paper Presentation
AIST 2015 Conference Paper PresentationFalguni Roy
 

Similar to SORT Self Organizing trust model for peer to peer system (20)

Iaetsd organizing the trust model in peer-to-peer system using
Iaetsd organizing the trust model in peer-to-peer system usingIaetsd organizing the trust model in peer-to-peer system using
Iaetsd organizing the trust model in peer-to-peer system using
 
Trust and reputation models among agents
Trust and reputation models among agentsTrust and reputation models among agents
Trust and reputation models among agents
 
Research on e-loyalty
Research on  e-loyaltyResearch on  e-loyalty
Research on e-loyalty
 
A computational dynamic trust model
A computational dynamic trust modelA computational dynamic trust model
A computational dynamic trust model
 
A COMPUTATIONAL DYNAMIC TRUST MODEL FOR USER AUTHORIZATION
A COMPUTATIONAL DYNAMIC TRUST MODEL FOR USER AUTHORIZATIONA COMPUTATIONAL DYNAMIC TRUST MODEL FOR USER AUTHORIZATION
A COMPUTATIONAL DYNAMIC TRUST MODEL FOR USER AUTHORIZATION
 
A computational dynamic trust model
A computational dynamic trust modelA computational dynamic trust model
A computational dynamic trust model
 
A COMPUTATIONAL DYNAMIC TRUST MODEL FOR USER AUTHORIZATION - IEEE PROJECTS I...
A COMPUTATIONAL DYNAMIC TRUST MODEL FOR USER AUTHORIZATION  - IEEE PROJECTS I...A COMPUTATIONAL DYNAMIC TRUST MODEL FOR USER AUTHORIZATION  - IEEE PROJECTS I...
A COMPUTATIONAL DYNAMIC TRUST MODEL FOR USER AUTHORIZATION - IEEE PROJECTS I...
 
IRJET - Sentiment Similarity Analysis and Building Users Trust from E-Commerc...
IRJET - Sentiment Similarity Analysis and Building Users Trust from E-Commerc...IRJET - Sentiment Similarity Analysis and Building Users Trust from E-Commerc...
IRJET - Sentiment Similarity Analysis and Building Users Trust from E-Commerc...
 
JAVA 2013 IEEE NETWORKSECURITY PROJECT SORT: A Self-ORganizing Trust Model fo...
JAVA 2013 IEEE NETWORKSECURITY PROJECT SORT: A Self-ORganizing Trust Model fo...JAVA 2013 IEEE NETWORKSECURITY PROJECT SORT: A Self-ORganizing Trust Model fo...
JAVA 2013 IEEE NETWORKSECURITY PROJECT SORT: A Self-ORganizing Trust Model fo...
 
Impact of Customer Value, Public Relations Perception and Brand Image on Cust...
Impact of Customer Value, Public Relations Perception and Brand Image on Cust...Impact of Customer Value, Public Relations Perception and Brand Image on Cust...
Impact of Customer Value, Public Relations Perception and Brand Image on Cust...
 
Implicit vs. Explicit Trust in Social Matrix Factorization
Implicit vs. Explicit Trust in Social Matrix Factorization Implicit vs. Explicit Trust in Social Matrix Factorization
Implicit vs. Explicit Trust in Social Matrix Factorization
 
Implicit vs Explicit trust in Social Matrix Factorization
Implicit vs Explicit trust in Social Matrix FactorizationImplicit vs Explicit trust in Social Matrix Factorization
Implicit vs Explicit trust in Social Matrix Factorization
 
Automatic Recommendation of Trustworthy Users in Online Product Rating Sites
Automatic Recommendation of Trustworthy Users in Online Product Rating SitesAutomatic Recommendation of Trustworthy Users in Online Product Rating Sites
Automatic Recommendation of Trustworthy Users in Online Product Rating Sites
 
Referral_Engine_OC03
Referral_Engine_OC03Referral_Engine_OC03
Referral_Engine_OC03
 
A novel approach for trust management for peer peer
A novel approach for trust management for peer peerA novel approach for trust management for peer peer
A novel approach for trust management for peer peer
 
A Computational Dynamic Trust Model for User Authorization
A Computational Dynamic Trust Model for User AuthorizationA Computational Dynamic Trust Model for User Authorization
A Computational Dynamic Trust Model for User Authorization
 
consumer satisfaction
consumer satisfaction consumer satisfaction
consumer satisfaction
 
Sort a self o rganizing trust model for peer-to-peer systems
Sort a self o rganizing trust model for peer-to-peer systemsSort a self o rganizing trust model for peer-to-peer systems
Sort a self o rganizing trust model for peer-to-peer systems
 
Online Service Rating Prediction by Removing Paid Users and Jaccard Coefficient
Online Service Rating Prediction by Removing Paid Users and Jaccard CoefficientOnline Service Rating Prediction by Removing Paid Users and Jaccard Coefficient
Online Service Rating Prediction by Removing Paid Users and Jaccard Coefficient
 
AIST 2015 Conference Paper Presentation
AIST 2015 Conference Paper PresentationAIST 2015 Conference Paper Presentation
AIST 2015 Conference Paper Presentation
 

Recently uploaded

SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxAreebaZafar22
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxnegromaestrong
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docxPoojaSen20
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxVishalSingh1417
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.MateoGardella
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfAyushMahapatra5
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...KokoStevan
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Gardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch LetterGardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch LetterMateoGardella
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhikauryashika82
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDThiyagu K
 

Recently uploaded (20)

SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docx
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Gardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch LetterGardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch Letter
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 

SORT Self Organizing trust model for peer to peer system

  • 2.  Anonymous nature of peer-to-peer (P2P) systems exposes them to malicious activity.  Building trust relationships among peers can mitigate attacks of malicious peers.  This project enable a peer to reason about trustworthiness of other peers based on their past interactions.  Peers create their own trust network in their proximity by using local information available and do not try to learn global trust information.
  • 3. • Two contexts of trust, service, and recommendation context, are defined to measure trustworthiness in providing services and giving recommendations. • Interactions and recommendations are evaluated based on importance, recentness, and peer satisfaction parameters.
  • 4.  Calculated trust information is not global and does not reflect opinions of all peers.  Classifying peers as either trustworthy or untrustworthy is not sufficient in most cases. Metrics should have precision so peers can be ranked according to trustworthiness.  Trust models on P2P systems have extra challenges comparing to e-commerce platforms. Malicious peers have more attack opportunities in P2P trust models due to lack of a central authority
  • 5.  Recommendation-based attacks were contained except when malicious peers are in large numbers, e.g., 50 percent of all peers.  Experiments on SORT show that good peers can defend themselves against malicious peers metrics let a peer assess trustworthiness of other peers based on local information.  Service and recommendation contexts enable better measurement of trustworthiness in providing services and giving recommendations.
  • 6.
  • 7.  Service Trust Metric  Reputation Metric  Recommendation Trust Metric  Selecting Service Providers
  • 8.  When evaluating an acquaintance’s trustworthiness in the service context, a peer first calculates competence and integrity belief values using the information in its service history.  Competence belief represents how well an acquaintance satisfied the needs of past interactions .Let friend request denote the competence belief of pi about pj in the service context. Average behavior in the past interactions is a measure of the competence belief. Consistency is as important as competence.  Level of confidence in predictability of future interactions is called integrity belief. Let I bij denote the integrity belief of pi about pj in the service context. Deviation from average behavior (cbij) is a measure of the integrity belief.
  • 9.  The reputation metric measures a stranger’s trust worthiness based on recommendations. In the following two sections, we assume that pj is a stranger to pi and pk is an acquaintance of pi.  If pi wants to calculate rij value, it starts a reputation query to collect recommendations from its acquaintances. Trustworthy acquaintances and requests their recommendations.  Let max denote the maximum number of recommendations that can be collected in a reputation query and jSj denote the size of a set S.  In the getting recommendation algorithm, pi sets a high threshold for recommendation trust values and requests recommendations from highly trusted acquaintances first. Then, it decreases the threshold and repeats the same operations.
  • 10.  Eg: Facebook.  Assume that pi wants to get a particular service. pj is a stranger to pi and a probable service provider. To learn pj’s reputation, pi requests recommendations from its acquaintances.  Assume that pk sends back a recommendation to pi. After collecting all recommendations, pi calculates rij. Then, pi evaluates pk’s recommendation, stores results in RH ik, and updates rtik. Assuming pj is trustworthy enough, pi gets the service from pj.  Then, pi evaluates this interaction and stores the results in SH ij, and updates stij.
  • 11.  When pi searches for a particular service, it gets a list of service providers.  Considering a facebook application, either post share the links to other peer. Connecting the all people with recommendation multiple peers, checking integrity is a problem since any file part downloaded from an uploader might be inauthentic.  Service provider selection is done based on service trust metric, service history size, competence belief, and integrity belief values. When pi wants to download a file, it selects an uploader with the highest service trust value