263,524 research outputs found

    Implementation of Volatile Secure Model in P2P System: A Detailed Analysis

    Get PDF
    In network domain system, the peer to peer systems shows an open access rather than other systems.P2P system defines each peer is able to share the information to other peer without the help of any centralized system. So there are more chances of malicious activities .for better security one peer must send some trust parameters along with the recommendations from other peer. This system is fully based on priority, trust worthiness history and peer satisfaction, recommendation. Those peers who is having more recommendations and trustworthiness value, that peer will connect with other peers only. A trust model is derived by integrating the risk management and security, by applying this new method; it provides the utility maximization of peer to peer system. The main objective of the system is to make sure that the peer to peer communication is reliable and secure by the use of the trust model surrounded each and every peer in the system. DOI: 10.17762/ijritcc2321-8169.15068

    Fuzzy Based Trust Model for Peer to Peer Systems

    Get PDF
    Unknown nature of peer to peer system opens them to malicious actions. A fuzzy based trust model can create trust relationships among peers. Trust decisions are adaptive to modifications in trust between peers. A peer’s trustworthiness in giving services and recommendations are assessed in service and recommendation context. The model utilizes fuzzy logic to integrate eight trust evaluation factors into the reputation evaluation process for improving the efficiency and security of peer to peer system. The reputation and recommendation trust metric is combined for computing a global trust metric which helps in selecting the best service provider. In this manner peers develop a trust network in their vicinity without utilizing earlier information and can tone down attack of malicious peers

    A Hierarchical Trusted Third-Party System for Secure Peer-to-Peer Transactions

    Get PDF
    A peer-to-peer (P2P) network is a distributed network of peer computers loosely connected through the Internet. Transactions in a P2P network are often conducted on a no-security basis. Moreover, peer anonymity is often highly desirable, which makes security even more difficult to achieve. In most cases, a peer executes a transaction solely based on the faith that the other peer plays by the rules. Here we propose a hierarchical Trusted Third-Party (TTP) system that facilitates secure transactions between peers in an existing P2P network. This system is designed to provide mutual authentication by using public key cryptography for peers to authenticate the TTP system and by using symmetric key cryptography for the TTP system to authenticate peers. After logging into the system, two peers can obtain a shared secret key from the TTP system to form a secure channel over which all transactions are encrypted using the secret key. The TTP system is designed to operate as an independent entity that peers can choose to join independently of their P2P network and can remain anonymous among each other. In addition, a reputation scheme, in which peers rate each other, is employed in the TTP system. This self-policing system provides a relative measure of trust among peers so that a peer can decide whether to allow a transaction based on another peer’s rating. The anonymity of peers in P2P systems creates many difficulties for establishing an accurate rating system. However, we believe this is still achievable to a degree

    Open peer-to-peer systems over blockchain and ipfs: An agent oriented framework

    Get PDF
    In recent years, the increasing concerns around the centralized cloud web services (e.g. privacy, governance, surveillance, security) have triggered the emergence of new distributed technologies, such as IPFS or the Blockchain. These innovations have tackled technical challenges that were unresolved until their appearance. Existing models of peer-to-peer systems need a revision to cover the spectrum of potential systems that can be now implemented as peer-to-peer systems. This work presents a framework to build these systems. It uses an agent-oriented approach in an open environment where agents have only partial information of the system data. The proposal covers data access, data discovery and data trust in peer-to-peer systems where different actors may interact. Moreover, the framework proposes a distributed architecture for these open systems, and provides guidelines to decide in which cases Blockchain technology may be required, or when other technologies may be sufficient
    • …
    corecore