46551260-p2p

Embed Size (px)

Citation preview

  • 7/29/2019 46551260-p2p

    1/5

    P2P Reputation Management

    Introduction:

    Many P2P networks with varying degree of success. Reputation

    based methods have proven to be the most effective in this task.

    Nevertheless, there are number of different approaches which adapt

    reputation management to different P2P environment.

    In this paper, we investigate the methods which have been develop

    ed to cope with undesirable peer behavior. Our goal is to survey the

    present reputation management methods and propose a

    classification which facilitates a system analysis. We identify all

    published methods and outline the possible solutions.

    First, we investigate what secure P2P network. We sharing areas

    are resource availability, resource quality, anonymity, and access control.

    We added an area referred P2P system. Peers which adhere to the first

    four criteria are called faithful. Reputation management techniques

    peers chance to detect the low trustworthiness or faithfulness of their

    partners. Similar to a human community, individual peers make decisions

    about the trustworthiness of other peers on the basis of recommendations

    basis of their own past experience.

    Abstract:

    A requester requests the service from the provider and optionally

    evaluates the attributes of the provider besides giving recommendation(s)

    to the provider. The method used by the requester to ascertain the value

    of the recommendation it provides, can be common across peers if they

    are able to download a file irrespective of the content file ) or specific to

    a peer . In a completely decentralized network, the method used to

  • 7/29/2019 46551260-p2p

    2/5

    ascertain the recommendation is unlikely to be Global, because unrelated

    peers are likely to value the different aspects of a service differently. We

    must overcome this problem using certification.

    Scope of the project:

    In all this principle a peer can refuse a request when it believes that

    the remote peer has a low trustworthiness broken. Reputation

    management is a methods dealing with how to distribute reputation

    among peers transaction.

    When the peer gets a reputation value, it must decide whether to

    perform the given transaction or not. Because the reputation value

    represents the probability of expected behavior, the peer always runs,

    accept to get a certain resource is expressed as the risk value. The risk

    value can reflect possible benefits one fails, and can be determined with

    human assistance. The risk value can be the radio of all bad service over

    the worst effect when all services received in this time interval were bad.

    This methods takes there are two basic scenarios which can occur

    in a remote resource and has to choose among several possible sources.

    The aim is to weed out untrustworthy is contacted by another peer and is

    asked for a resource. Targets mainly have fairness in mind in this

    scenario. Therefore, the reputation criterion which relies is important for

    us. Not all information is available to with trusted peers. So, the

    trustworthiness of the target.

    While P2P networks are useful and provide a beneficial service,

    they also provide an opportunity for abuse and computer virus

    transmission.

    Project Juxtapose is building core network computing technology

    to provide a set of simple, small, and flexible mechanisms that cansupport P2P computing on any platform, anywhere, and at any time. The

  • 7/29/2019 46551260-p2p

    3/5

    project is first generalizing P2P functionality and then building core

    technology that addresses today's limitations on P2P computing. The

    focus is on creating basic mechanisms and leaving policy choices to

    application developers.

    Juxtapose strives to provide a base P2P infrastructure over which

    other P2P applications can be built. This base consists of a set of

    protocols that are language independent, platform independent, and

    network agnostic (that is, they do not assume anything about the

    underlying network). These protocols address the bare necessities for

    building generic P2P applications. Designed to be simple with low

    overhead, the protocols target, to quote the Juxtapose vision statement,

    "every device with a digital heartbeat."

    Juxtapose currently defines six protocols, but not all Juxtapose

    peers are required to implement all six of them. The number of protocols

    that a peer implements depends on that peer's capabilities, conceivably, a

    peer could use just one protocol. Peers can also extend or replace any

    protocol, depending on its particular requirements.

    Existing system:

    In distributed environments formed by a large number of

    peers conventional authentication techniques are inadequate for the

    group joining process, and more advanced ones are needed.

    Complex transactions among peers may require more

    elaborate interactions based on what peers can do or possess instead of

    peers identity.

    Not easy to access the group.

    Not using certification validation.

  • 7/29/2019 46551260-p2p

    4/5

    Proposed System:

    We propose a novel peer group joining protocol. We introduce a

    highly expressive.

    User friendly for the users.

    Certification will validate the user.

    Resource negotiation language, able to support the specification

    of a large variety of conditions applying to single peers or groups of

    peers. Moreover, we define protocols to test such resource availability

    customized to the level of assurance required by the peers.

    Our approach has been tested and evaluated on an extension of

    the JUXTAPOSE P2P platform.

    Data Flow Diagram:

    User Login Enter your Group

    View Peer group

    Users

    View files shared

    By group users

    Download

    required files

    Logout

    JXTA protocol

    Check sum

    Check

    certification

    Choose file to

    Certification

    not exist

  • 7/29/2019 46551260-p2p

    5/5

    Modules:

    Juxtapose Certificate verification

    Validation

    Assort file

    Acquire Group

    Algorithm Used:

    Checksum

    Certificate

    Secure

    serverClient

    Server

    certificate

    Client

    certificat

    e