Professional Documents
Culture Documents
Web Site: www.ijettcs.org Email: editor@ijettcs.org, editorijettcs@gmail.com Volume 2, Issue 6, November December 2013 ISSN 2278-6856
Discussion of Trust Model in Peer to Peer Systems (P2P): A Review of Security in P2P
Shraddha Shirke1 and Ravi Chaure2
1,2
Keywords: Peer to Peer System, Trust model, Distributed systems, centralized system, and networks overlay malicious attack, reputation based, trust based.
entity is entitled to access and is based on techniques including encryption, data hiding, digital signatures, authentication protocols, & the access control methods, and (b) behavior trust [2] which deals with a wider notion of an entitys trustworthiness. A malicious web server could accept to host Web document replicas but deliver modified versions to the user or refuse requests directed to these replicas. A digitally signed certificate does not convey if the issuer is an industrial spy and a digitally signed code does not convey if the code is written by competent programmers [1]. In this review paper we are discussing the survey of Peer to Peer systems, their trust management taxonomy. In section two we are discussing the different categories of trust management P2P. In section three we are discussing the relationships based reputation and trust. Finally in section four we are presenting review of reputation-based trust management for P2P [3].
2. LITERATURE REVIEW
Credential and policy based on trust management, trust management based on reputation, and social networkbased trust management: establishing trust relationships between peers, and to evaluate the approach adopted is based on trust management in P2P system 3 Categories can be classified as shown in Figure 1 [4].
1. INTRODUCTION
The concept of network computing (NC) is nothing but set of interconnected domains interacting in a peer-to peer fashion. One goal of such systems is to encourage domain-to-domain interactions and increase the confidence of the domains to share their resources (a) without losing control over their own resources, and (b) ensure confidentiality for other domains. Sharing resources across institutional boundaries creates several issues related to quality of service (QoS) and trust. Handling these issues is complicated in NC systems due to distributed ownership, site autonomy, resource provider heterogeneity, and diverse resource clients. An entity that is part of a large scale NC system will have the privilege of using pools of resources that would not be available to it otherwise [1]. Unfortunately, the idea of having a virtual network structure because the "sharing" of resources, or services associated with the perception of risk does not appeal to some institutions [15]. Because of the sensitivity and vitality of data or information, such institutions in its "closed box" prefer to use the resources. The individual institutions but also an inefficient way to use resources is not just expensive [1]. Organizations are primarily concerned with trust related to NC environment. There are different types of trust an organization might be concerned about: (a) identity trust which focuses on verifying the authenticity of an entity and determining the authorizations that the Volume 2, Issue 6 November December 2013
Fig.1 Trust management taxonomy 2.1 Policy-based Trust Management Systems: In credential and policy-based trust management systems, peers use credential verification to establish a trust relationship with other peers [5], [6. Since the primary goal of such systems is to enable access control, their concept of trust management is limited to verifying credentials and restricting access to resource according to application-defined policies [7]. A policy maker network application is including privacy and authenticity to a variety of safety features to facilitate developing a trust management system. To specify your policies with local control provides each peer: peer to peer request providing the credibility of policies [5]. The policy-based access control mechanisms do not involve trust is satisfied that can determine if policymaker using a peer-to-peer for his service can provide access to another because they own all Page 184
OF
COMPUTATIONAL
During the section we will discuss the relationships based reputation and trust, as well as introduce a computational model based on sociological and biological understanding of trust management. 3.1 Understanding Trust & Reputation: After reviewing several important studies on trust management, reputation and trust have been found to provide useful intuition or services for many systems [12]. It is also proved that reputation-based system (e.g. the feedback rating system used in eBay) does encourage transactions [13]. However, all of these studies model neither how reputation is built nor how trust is derived from reputation. When facing social dilemmas, trustworthy individuals tend to trust others with a reputation for being trustworthy and shun those deemed less so. It is always the case in real world where everyone in a society might not learn the same norms in all situations. Model introduced in this section are expected to norms of reciprocity, which is built on an environment. The intuition behind this model is a qualitative behavioral model of collective action is proposed, the American political society, the president's speech Ostroms 1998 [14] is motivated. Air India's reputation for being cooperative agents AJ evaluating Consider the following scenario. AJ defined as the set of all agents embedded social network asks for this evaluation. In this way, an agent Ais reputation is being evaluated relative to a particular embedded social network. In addition to simplicity, we embedded social networks such is taken to be constant (i.e., no new agents are expected to join or leave) and the action to be restricted to the space {cooperate, deafest} defect Cooperation values. Figure 2 shows the reinforcing relationships among the three highly related concepts: reciprocity, trust & reputation. The direction of arrow indicates the direction of influence among the variables.
Fig.2 Simple relationship model An embedded social network together to increase agent AJ increase AJ prestige should increase the confidence of other agents, and increase the confidence of the AI AJ also AJ to take action to increase the likelihood that ai will reciprocate positively, because of an increase in Its reputation for others AJ should be extended also to exchange operations. Page 185
Dab: History. The set of n previous encounters between a and b Dab = {Xab (1), Xab (2), Xab (n)} Let p be the cooperative actions by agent b towards a in the n previous encounters, bs reputation ab could be modeled by a simple proportion function of p cooperative actions over n encounters. A proportion random variable can be modeled as a Beta distribution: P () = Beta (c1, c2) where represents an estimator for . If agents a and b is complete strangers, when they meet, their estimate for each others reputation is assumed to be uniformly distributed across the reputations domain: 1, 0 < < 1 p( ) = { 0 otherwise In this section, the beta deviation will be uniform when c1=c2=1. Now we have a simple estimator for ab which is the proportion of cooperation in n finite encounters: (ab) =p/ Volume 2, Issue 6 November December 2013
Page 186
5. CONCLUSION
During this paper we have focused on discussion and review of trust management models in P2P systems. We have discussed the two mechanisms such as DMRep and EigenRep with their basic functionalities. For the P2P systems, it is always necessary to detect the attacks like malicious users as well as insecure resources prior to start download in P2P. In the survey we have discussed the different types of trust management models such as reputation based, policy based and social network based trust management models. This is the review study of our research in future we are presenting the improved mechanism of securing the P2P system.
References
[1] A. Abdul-Rahman and S. Hailes, Supporting trust in virtual communities, Hawaii Intl Conference on System Sciences, Jan. 2000. [2] F. Azzedin and M. Maheswaran, Integrating trust into Grid resource management systems, 2002 International Conference on Parallel Processing (ICPP 02), Aug. 2002, pp. 4754. [3] R. Chen and W. Yeager, Poblano: A distributed trust model for peer-to-peer networks. htpp:security.jxta.org, 2001. [4] G. Suryanarayana, R. N. Taylor (2004) A Survey of Trust Management and Resource Discovery Technologies in Peer-to-Peer Applications, ISR Technical Report # UCI-ISR-04-6. [5] M. Blaze, J.Feigenbaum (1996). Decentralized Trust Management, IEEE Symposium on Security and Privacy. [6] L. Kagal, S. Cost (2001). A framework for distributed trust Management, Second Workshop on Norms and Institutions in MAS, Autonomous Agents. Volume 2, Issue 6 November December 2013
Page 187