263,524 research outputs found
Implementation of Volatile Secure Model in P2P System: A Detailed Analysis
In network domain system, the peer to peer systems shows an open access rather than other systems.P2P system defines each peer is able to share the information to other peer without the help of any centralized system. So there are more chances of malicious activities .for better security one peer must send some trust parameters along with the recommendations from other peer. This system is fully based on priority, trust worthiness history and peer satisfaction, recommendation. Those peers who is having more recommendations and trustworthiness value, that peer will connect with other peers only. A trust model is derived by integrating the risk management and security, by applying this new method; it provides the utility maximization of peer to peer system. The main objective of the system is to make sure that the peer to peer communication is reliable and secure by the use of the trust model surrounded each and every peer in the system.
DOI: 10.17762/ijritcc2321-8169.15068
Fuzzy Based Trust Model for Peer to Peer Systems
Unknown nature of peer to peer system opens them to malicious actions. A fuzzy based trust model can create trust relationships among peers. Trust decisions are adaptive to modifications in trust between peers. A peer’s trustworthiness in giving services and recommendations are assessed in service and recommendation context. The model utilizes fuzzy logic to integrate eight trust evaluation factors into the reputation evaluation process for improving the efficiency and security of peer to peer system. The reputation and recommendation trust metric is combined for computing a global trust metric which helps in selecting the best service provider. In this manner peers develop a trust network in their vicinity without utilizing earlier information and can tone down attack of malicious peers
Recommended from our members
MobileTrust: Secure Knowledge Integration in VANETs
Vehicular Ad hoc NETworks (VANET) are becoming popular due to the emergence of the Internet of Things and ambient intelligence applications. In such networks, secure resource sharing functionality is accomplished by incorporating trust schemes. Current solutions adopt peer-to-peer technologies that can cover the large operational area. However, these systems fail to capture some inherent properties of VANETs, such as fast and ephemeral interaction, making robust trust evaluation of crowdsourcing challenging. In this article, we propose MobileTrust—a hybrid trust-based system for secure resource sharing in VANETs. The proposal is a breakthrough in centralized trust computing that utilizes cloud and upcoming 5G technologies to provide robust trust establishment with global scalability. The ad hoc communication is energy-efficient and protects the system against threats that are not countered by the current settings. To evaluate its performance and effectiveness, MobileTrust is modelled in the SUMO simulator and tested on the traffic features of the small-size German city of Eichstatt. Similar schemes are implemented in the same platform to provide a fair comparison. Moreover, MobileTrust is deployed on a typical embedded system platform and applied on a real smart car installation for monitoring traffic and road-state parameters of an urban application. The proposed system is developed under the EU-founded THREAT-ARREST project, to provide security, privacy, and trust in an intelligent and energy-aware transportation scenario, bringing closer the vision of sustainable circular economy
A Hierarchical Trusted Third-Party System for Secure Peer-to-Peer Transactions
A peer-to-peer (P2P) network is a distributed network of peer computers loosely connected through the Internet. Transactions in a P2P network are often conducted on a no-security basis. Moreover, peer anonymity is often highly desirable, which makes security even more difficult to achieve. In most cases, a peer executes a transaction solely based on the faith that the other peer plays by the rules. Here we propose a hierarchical Trusted Third-Party (TTP) system that facilitates secure transactions between peers in an existing P2P network. This system is designed to provide mutual authentication by using public key cryptography for peers to authenticate the TTP system and by using symmetric key cryptography for the TTP system to authenticate peers. After logging into the system, two peers can obtain a shared secret key from the TTP system to form a secure channel over which all transactions are encrypted using the secret key. The TTP system is designed to operate as an independent entity that peers can choose to join independently of their P2P network and can remain anonymous among each other. In addition, a reputation scheme, in which peers rate each other, is employed in the TTP system. This self-policing system provides a relative measure of trust among peers so that a peer can decide whether to allow a transaction based on another peer’s rating. The anonymity of peers in P2P systems creates many difficulties for establishing an accurate rating system. However, we believe this is still achievable to a degree
Open peer-to-peer systems over blockchain and ipfs: An agent oriented framework
In recent years, the increasing concerns around the centralized cloud web services (e.g. privacy, governance, surveillance, security) have triggered the emergence of new distributed technologies, such as IPFS or the Blockchain. These innovations have tackled technical challenges that were unresolved until their appearance. Existing models of peer-to-peer systems need a revision to cover the spectrum of potential systems that can be now implemented as peer-to-peer systems. This work presents a framework to build these systems. It uses an agent-oriented approach in an open environment where agents have only partial information of the system data. The proposal covers data access, data discovery and data trust in peer-to-peer systems where different actors may interact. Moreover, the framework proposes a distributed architecture for these open systems, and provides guidelines to decide in which cases Blockchain technology may be required, or when other technologies may be sufficient
- …