Loading

Managing P2P Reputation System Using Decentralized Approach
B. V. S. N. Lakshmi1, C. Prakasa Rao2

1B.V.S.N.Lakshmi, Department of CSE, Prakasam Engineering College, Kandukur (A.P), India.
2C. Prakasa R, Associate Professor, Department of CSE, Prakasam Engineering College, Kandukur (A.P), India.

Manuscript received on 18 October 2012 | Revised Manuscript received on 25 October 2012 | Manuscript published on 30 October 2012 | PP: 46-52 | Volume-1 Issue-4, October 2012 | Retrieval Number: D0330091412/2012©BEIESP
Open Access | Ethics and Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: In Peer-to-Peer networks, many security mechanisms are based on specific assumptions of identity and are vulnerable to attacks when these assumptions are violated. The traditional security techniques developed for the centralized distributed systems like client-server networks are insufficient for P2P networks by the virtue of their centralized nature. The absence of a central authority in a P2P network poses unique challenges for reputation management in the network. These challenges include identity management of the peers, secure reputation data management, Sybil attacks, and above all, availability of reputation data. In this paper, we present a cryptographic protocol for ensuring secure and timely availability of the reputation data of a peer to other peers. The past behavior of the peer is encapsulated in its digital reputation, and is subsequently used to predict its future actions. As a result, a peer’s reputation motivates it to cooperate and desist from malicious activities. The cryptographic protocol is coupled with self-certification and cryptographic mechanisms for identity management and countering Sybil attack. We illustrate the security and the efficiency of the system analytically and by means of simulations in a completely decentralized P2P network.
Keywords: Peer-to-Peer Networks, Security, Identity Management, Reputation System.

Scope of the Article: Storage-Area Networks