期刊名称:International Journal of Computer Science & Technology
印刷版ISSN:2229-4333
电子版ISSN:0976-8491
出版年度:2012
卷号:3
期号:3
页码:783-786
语种:English
出版社:Ayushmaan Technologies
摘要:Peer-to-peer (P2P) computing or networking is a distributed application architecture that partitions tasks or workloads among peers which causes vulnerable to peers who cheat, propagate malicious code, leech on the network. This paper presents a security protocol, an ambitious approach to protect the P2P network without using any central component. The absence of a central component in a P2P network poses unique challenges. To meet these challenges we use peer secure reputations to determine whether a peer is a malicious peer or a good peer. Once detected, the malicious peers are ostracized from the network as the good peers do not perform any transactions with the malicious peers. The peers are identified by identity certificates in the P2P network to which its reputations are attached. The identity certificates are generated with certificate authority maintained by all peers on their own. So the peer reputation information pertaining to all its past transactions with other peers in the network, which is stored locally. As a result, the security protocol coupled with certification authority not only protects the reputation information from its owner, but also facilitates secure exchange of reputation information between the two peers participating in a transaction.
关键词:Peer-to-Peer Networks;Security Protocols;Reputations; Decentralized Systems