首页    期刊浏览 2024年07月24日 星期三
登录注册

文章基本信息

  • 标题:Exchange of Peer To Peer Identity Reputation Using Cryptology conventions
  • 本地全文:下载
  • 作者:S.Venkateswarlu ; Md khaja zikriya
  • 期刊名称:International Journal of Computer Science and Information Technologies
  • 电子版ISSN:0975-9646
  • 出版年度:2012
  • 卷号:3
  • 期号:2
  • 页码:3341-3347
  • 出版社:TechScience Publications
  • 摘要:peer-to-peer architectures derives to a large extent from their ability to function, scale and selforganize in the presence of a highly transient population of nodes, network and computer failures, without the need of a central server, Peer-to-peer networks are capable of being wounded to peers who cheat, propagate malicious code, leech on the network, or simply do not cooperate. The traditional security techniques developed for the centralized distributed systems like client-server networks are insufficient for P2P networks by the virtue of their centralized nature. The absence of a central authority in a P2P network poses unique challenges for identity management in the network. These challenges include Reputation of the peers, secure directory data management, Sybil attacks, and above all, availability of Reputation data. In this paper, we present a cryptology conventions for ensuring secure and timely availability of the Reputation data of a peer to other peers at extremely low costs. The past behavior of the peer is encapsulated in its digital Reputation, and is subsequently used to predict its future actions. As a result, a peer’s Reputation motivates it to cooperate and desist from malicious activities.
  • 关键词:Peer-to-peer networks; distributed systems;security; identiy management; Reputations.
国家哲学社会科学文献中心版权所有