Open Access Open Access  Restricted Access Subscription or Fee Access

Security and Trust Based Model for Peer To Peer System

S. Saranya

Abstract


Peer to peer is an advanced computer networking where all computers contribute to equivalent task for processing data. A Peer to peer network can be an ad hoc connection in which a pair of computers attached by means of a universal serial bus to transmit files. Security is not much effective in this type of systems it is because if the connections are not fixed to the computers appropriately then there will be difficulty in accessing certain files and the relationship is untrusted. Hence security in peer to peer systems is complex since disputes are created by lack of integrated authority. A new hybrid trust algorithm is used in this paper to facilitate a peer to reason about reliability of other peers based on earlier period interactions and recommendations. Both local trust value and global trust value is calculated while downloading from peer to peer system. Interactions and recommendations are assessed based on recentness, importance and peer satisfaction factors. Diffie–Hellman key exchange establishes a shared secret that can be used for secret communications while exchanging data over a public network. RSA algorithm (Rivest, Shamir, Adleman) based on Asymmetric key cryptography which ensures timely accessibility of reputation information to other peers along with security. The approach is to summarize the earlier period performance of the peer in its digital reputation and then predicting its deeds pertaining to future. The information shared among the peers is encrypted and decrypted using RSA Signatures. Thus malicious activities are prevented in peer’s reputation. The experiment is carried out using Java programming and the simulation results revealed that the RSA algorithm implemented using public key cryptography is protected and well-organized in a decentralized peer to peer network. Better peers were capable to figure confidence connections in their immediacy and detach malicious peers.


Keywords


Asymmetric Key Cryptography, Diffie–Hellman Key Exchange, Peer to Peer Systems, RSA Algorithm, RSA Signatures.

Full Text:

PDF

References


R. Khare, “Web Security-A Matter of Trust”, The World Wide Web ed., Vol. 2, 1997.

C. Duma, N. Shahmehri, and G. Caronni, “Dynamic trust metrics for peer-to-peer systems,” Proceedings of 2nd IEEE Workshop on P2P Data Management, Security and Trust, Pp.776–781, 2005.

L.C. Freeman, “Centrality on Social Networks”, Social Networks, Vol. 1, Pp. 215–239, 1979.

A. Josang and S. Pope, “Semantic Constraints for Trust Transitivity”, Proceedings of the Asia-Pacific Conference of Conceptual Modeling (APCCM), Vol. 43, February 2005.

C.K. Sivananda and K. Kalpana, “P2P Reputation Management Scheme Using a Cryptographic Protocol”, IOSR Journal of Engineering, Vol. 2, Issue 10, Pp. 01-08, October 2012.

Stefano Paraboschi and Pierangela Samarati, “Managing and Sharing Servents Reputations in P2P Systems”, IEEE Transactions on Knowledge and Data Engineering, Vol. 15, No. 4, July 2003.

Uma S. Kanniah and Azman Samsudin, “New Diffie Hellman Key Exchange Primitive Based Upon Binary Field”, World Applied Sciences Journal, Vol. 21, Pp. 106-111, 2013

Nele Verbiest, Chris Cornelisa, Patricia Victor, Enrique Herrera-Viedma, “Trust and distrust aggregation enhanced with path length incorporation”, Fuzzy Sets and Systems, Vol. 202, Pp. 61–74, 2012.

Y. Desmedt and Y. Frankel, “Threshold cryptosystems”, Advances in Cryptology - Crypto '89, Proceedings, Lecture Notes in Computer Science, Vol. 435, Pp. 307-315, 1990.

Ahmet and Bharat Bhargava, “SORT: A Self-ORganizing Trust Model for Peer-to-Peer Systems”, IEEE transactions on dependable and secure computing, Vol. 10, No. 1, January 2013.

K. Aberer and Z. Despotovic, “Managing Trust in a Peer to Peer Information System”, In Proceedings of the 10th International Conference on Information and Knowledge Management, New York, USA, 2001.

L. Xiong and L. Liu, “Peer trust: Supporting Reputation-Based Trust for Peer-to-Peer Ecommerce Communities”, IEEE Transaction on Knowledge and Data Engineering, Vol. 16, No. 7, Pp. 843-857, July 2004.

R. Zhou and K. Hwang, “Power trust: A Robust and Scalable Reputation System for Trusted Peer-to-Peer Computing”, IEEE Transaction on Parallel and Distributed Systems, Vol. 18, No. 4, Pp. 460-473, April 2007

B. Ooi, C. Liau, and K. Tan, “Managing Trust in Peer-to-Peer Systems Using Reputation-Based Techniques”, Proceedings of Fourth International Conference, Web Age Information Management, 2003

S. Kamvar, M. Schlosser, and H. Garcia-Molina, “The Eigen trust Algorithm for Reputation Management in P2P Networks”, Proceedings of 12th World Wide Web Conference (WWW), 2003.

Zhiyuan Su, Ling Liu, Mingchu Li, Xinxin Fan,Yang Zhou, “ServiceTrust: Trust Management in Service Provision Networks”, IEEE International Conference on Services Computing”, Pp. 272 – 279, July 2013.


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.