Furnishing of Ethical Associations in Related Structures

Authors

  • M. Saidireddy Dept. of CSE, KG Reddy College of Engineering and Technology, Hyderabad, India

Keywords:

Peer-To-Peer systems, Trustworthiness, Reputation, Trust, Self-organizing trust model

Abstract

The systems of Peer-To-Peer are motivating towards a foremost paradigm move in the direction of genuinely distributed computing. Classification of peers as moreover trustworthy or untrustworthy is not enough in most of the cases. Metrics should include accuracy hence peers can be ranked consistent with trustworthiness. Metric of reputation is considered on basis of recommendations and it is considered as important when deciding in relation to strangers as well as new acquaintances. When scheming of reputation metric, recommendations are assessed on basis of trust metric of recommendation. In this work we aim at introducing an architecture known as SORT which is a representation of self-organizing Trust intends to reduce malevolent activity in P2P structure by setting up trust associations between peers in their proximity.

 

References

S. Staab, B. Bhargava, L. Lilien, A. Rosenthal, M. Winslett, M. Sloman, T. Dillon, E. Chang, F.K. Hussain, W. Nejdl, D. Olmedilla, and V. Kashyap, “The Pudding of Trust,” IEEE Intelligent Systems,vol. 19, no. 5, pp. 74-88, 2004.

E. Terzi, Y. Zhong, B. Bhargava, Pankaj, and S. Madria, “An Algorithm for Building User-Role Profiles in a Trust Environment,” Proc. Fourth Int’l Conf. Data Warehousing and Knowledge Discovery (DaWaK), vol. 2454, 2002.

S. Saroiu, K. Gummadi, R. Dunn, S.D. Gribble, and H.M. Levy, “An Analysis of Internet Content Delivery Systems,” Proc. Fifth USENIX Symp. Operating Systems Design and Implementation (OSDI), 2002.

Ahmet Burak Can, and Bharat Bhargava “SORT: A Self-ORganizing Trust Model for Peer-to-Peer Systems”, 2013

F. Cornelli, E. Damiani, S.D.C. di Vimercati, S. Paraboschi, and P. Samarati, “Implementing a Reputation-Aware Gnutella Servant,” Proc. Networking 2002 Workshops Web Eng. and Peer-to-Peer Computing, 2002.

H. Yu, M. Kaminsky, P.B. Gibbons, and A. Flaxman, “Sybilguard: Defending against Sybil Attacks via Social Networks,” ACM SIGCOMM Computer Comm. Rev., vol. 36, no. 4, pp. 267-278, 2006.

M. Ripeanu, I. Foster, and A. Iamnitchi, “Mapping the Gnutella Network: Properties of Large-Scale Peer-to-Peer Systems and Implications for System Design,” IEEE Internet Computing, vol. 6, no. 1, pp. 50-57, Jan. 2002.

M. Virendra, M. Jadliwala, M. Chandrasekaran, and S. Upadhyaya, “Quantifying Trust in Mobile Ad-Hoc Networks,” Proc. IEEE Int’l Conf. Integration of Knowledge Intensive Multi-AgentSystems (KIMAS), 2005.

Y. Wang and J. Vassileva, “Bayesian Network Trust Model in Peer-to-Peer Networks,” Proc. Second Workshop Agents and Peer-to-Peer Computing at the Autonomous Agents and Multi Agent Systems Conf. (AAMAS), 2003.

A. Habib, D. Xu, M. Atallah, B. Bhargava, and J. Chuang, “A Tree- Based Forward Digest Protocol to Verify Data Integrity in Distributed Media Streaming,” IEEE Trans. Knowledge and Data Eng., vol. 17, no. 7, pp. 1010-1014, July 2005.

I. Stoica, R. Morris, D. Karger, M.F. Kaashoek, and H. Balakrishnan, “Chord: A Scalable Peer-to-Peer Lookup Service for InternetApplications,” ACM SIGCOMM Computer Comm. Rev., vol. 31, no. 4, pp. 149-160, 2001.

R. Zhou and K. Hwang, “Powertrust: A Robust and Scalable Reputation System for Trusted Peer-to-Peer Computing,” IEEE rans. Parallel and Distributed Systems, vol. 18, no. 4, pp. 460-473, Apr. 2007.

K. Aberer and Z. Despotovic, “Managing Trust in a Peer-2-Peer Information System,” Proc. 10th Int’l Conf. Information and KnowledgeManagement (CIKM), 2001.

S. Xiao and I. Benbasat, “The Formation of Trust and Distrust in Recommendation Agents in Repeated Interactions: A Process- Tracing Analysis,” Proc. Fifth ACM Conf. Electronic Commerce (EC), 2003.

G. Swamynathan, B.Y. Zhao, and K.C. Almeroth, “Decoupling Service and Feedback Trust in a Peer-to-Peer Reputation System,” Proc. Int’l Conf. Parallel and Distributed Processing and Applications (ISPA), 2005.

Z. Despotovic and K. Aberer, “Trust-Aware Delivery of Composite Goods,” Proc. First Int’l Conf. Agents and Peer-to-Peer Computing, 2002.

Downloads

Published

2018-06-30

How to Cite

[1]
M. Saidireddy, “Furnishing of Ethical Associations in Related Structures”, Int. J. Sci. Res. Net. Sec. Comm., vol. 6, no. 3, pp. 69–71, Jun. 2018.

Issue

Section

Research Article

Similar Articles

<< < 3 4 5 6 7 8 9 > >> 

You may also start an advanced similarity search for this article.