期刊名称:International Journal of Innovative Research in Science, Engineering and Technology
印刷版ISSN:2347-6710
电子版ISSN:2319-8753
出版年度:2014
期号:ICETS
页码:190
出版社:S&S Publications
摘要:Peer to peer network is decentralized and distributed network, which is useful for file sharing via internet . Due to malicious activity, still it is insecure during file sharing. Depending on the past interaction and their recommendation, trustworthiness of a peer can be build. In order to measure the trustworthiness, two constraints are considered namely, service s and recommendations. According to the recentness and peer satisfaction, both service and recommendations can be evaluated. While calculating these recommendations, we consider the trustworthiness of the recommender and confidence about a recommendation. Good peers can form the trust rel ationship by isolating the malicious peers. In this proposed model we provide cryptography provenance verification method for secure transmission of data and data auditing is performed for eliminate the malicious packets.
关键词:Peer to Peer; Reputati ; on; Trust management; ; security