SlideShare a Scribd company logo
SORT: A Self-Organizing Trust Model for Peer-to-Peer
Systems
ABSTRACT:
Open nature of peer-to-peer systems exposes them to malicious activity. Building
trust relationships among peers can mitigate attacks of malicious peers. This paper
presents distributed algorithms that enable a peer to reason about trustworthiness of
other peers based on past interactions and recommendations. Peers create their own
trust network in their proximity by using local information available and do not try
to learn global trust information. Two contexts of trust, service, and
recommendation contexts are defined to measure trustworthiness in providing
services and giving recommendations. Interactions and recommendations are
evaluated based on importance, recentness, and peer satisfaction parameters.
Additionally, recommender’s trustworthiness and confidence about a
recommendation are considered while evaluating recommendations. Simulation
experiments on a file sharing application show that the proposed model can
mitigate attacks on 16 different malicious behavior models. In the experiments,
good peers were able to form trust relationships in their proximity and isolate
malicious peers.
EXISTING SYSTEM:
In the existing system of an authority, a central server is a preferred way to store
and manage trust information, e.g., eBay. The central server securely stores trust
information and defines trust metrics. Since there is no central server in most P2P
systems, peers organize themselves to store and manage trust information about
each other. Management of trust information is dependent to the structure of P2P
network. In distributed hash table (DHT) - based approaches, each peer becomes a
trust holder by storing feedbacks about other peers. Global trust information stored
by trust holders can be accessed through DHT efficiently. In unstructured
networks, each peer stores trust information about peers in its neighborhood or
peers interacted in the past. A peer sends trust queries to learn trust information of
other peers. A trust query is either flooded to the network or sent to neighborhood
of the query initiator.
DISADVANTAGES OF EXISTING SYSTEM:
 Calculated trust information is not global and does not reflect opinions of all
peers.
 Classifying peers as either trustworthy or untrustworthy is not sufficient in
most cases. Metrics should have precision so peers can be ranked according
to trustworthiness.
 Trust models on P2P systems have extra challenges comparing to e-
commerce platforms. Malicious peers have more attack opportunities in P2P
trust models due to lack of a central authority
 Five common attacks in P2P trust models: self-promoting, white-washing,
slandering, orchestrated, and denial of service attacks.
PROPOSED SYSTEM:
In the proposed system, we introduce a Self-Organizing Trust model (SORT) that
aims to decrease malicious activity in a P2P system by establishing trust relations
among peers in their proximity. No a priori information or a trusted peer is used to
leverage trust establishment. Peers do not try to collect trust information from all
peers. Each peer develops its own local view of trust about the peers interacted in
the past. In this way, good peers form dynamic trust groups in their proximity and
can isolate malicious peers. Since peers generally tend to interact with a small set
of peers forming trust relations in proximity of peers helps to mitigate attacks in a
P2P system.
ADVANTAGES OF PROPOSED SYSTEM:
Recommendation-based attacks were contained except when malicious peers are in
large numbers, e.g., 50 percent of all peers. Experiments on SORT show that good
peers can defend themselves against malicious peers metrics let a peer assess
trustworthiness of other peers based on local information. Service and
recommendation contexts enable better measurement of trustworthiness in
providing services and giving recommendations.
SYSTEM ARCHITECTURE:
ALGORITHMS USED:
SYSTEM CONFIGURATION:-
HARDWARE CONFIGURATION:-
 Processor - Pentium –IV
 Speed - 1.1 Ghz
 RAM - 256 MB(min)
 Hard Disk - 20 GB
 Key Board - Standard Windows Keyboard
 Mouse - Two or Three Button Mouse
 Monitor - SVGA
SOFTWARE CONFIGURATION:-
 Operating System : Windows XP
 Programming Language : JAVA
 Java Version : JDK 1.6 & above.
REFERENCE:
Ahmet Burak Can, Member, IEEE, and Bharat Bhargava, Fellow, IEEE-“SORT: A
Self-ORganizing Trust Model for Peer-to-Peer Systems”- IEEE
TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, VOL.
10, NO. 1, JANUARY/FEBRUARY 2013.

More Related Content

DOCX
Sort a self o rganizing trust model for peer-to-peer systems
JPINFOTECH JAYAPRAKASH
 
DOCX
Sort a self organizing trust model for peer-to-peer systems
IEEEFINALYEARPROJECTS
 
DOCX
Protecting user data in profile matching social networks
Venkat Projects
 
PDF
Three strategies for organizations to follow to disrupt cybercriminals sellin...
Anushree
 
PPTX
Re entry cpmf613`13 potter
UCFCJ
 
DOCX
Dynamic audit services for outsourced storages in clouds
JPINFOTECH JAYAPRAKASH
 
DOCX
Cooperative packet delivery in hybrid wireless mobile networks a coalitional ...
JPINFOTECH JAYAPRAKASH
 
DOCX
Pmse a personalized mobile search engine
JPINFOTECH JAYAPRAKASH
 
Sort a self o rganizing trust model for peer-to-peer systems
JPINFOTECH JAYAPRAKASH
 
Sort a self organizing trust model for peer-to-peer systems
IEEEFINALYEARPROJECTS
 
Protecting user data in profile matching social networks
Venkat Projects
 
Three strategies for organizations to follow to disrupt cybercriminals sellin...
Anushree
 
Re entry cpmf613`13 potter
UCFCJ
 
Dynamic audit services for outsourced storages in clouds
JPINFOTECH JAYAPRAKASH
 
Cooperative packet delivery in hybrid wireless mobile networks a coalitional ...
JPINFOTECH JAYAPRAKASH
 
Pmse a personalized mobile search engine
JPINFOTECH JAYAPRAKASH
 

Viewers also liked (15)

DOCX
Privacy preserving data sharing with anonymous id assignment
JPINFOTECH JAYAPRAKASH
 
DOC
Scalable and secure sharing of personal health records in cloud computing usi...
JPINFOTECH JAYAPRAKASH
 
DOCX
Efficient rekeying framework for secure multicast with diverse subscription-p...
JPINFOTECH JAYAPRAKASH
 
DOCX
A highly scalable key pre distribution scheme for wireless sensor networks
JPINFOTECH JAYAPRAKASH
 
DOCX
Distributed processing of probabilistic top k queries in wireless sensor netw...
JPINFOTECH JAYAPRAKASH
 
DOCX
Beyond text qa multimedia answer generation by harvesting web information
JPINFOTECH JAYAPRAKASH
 
DOCX
Cross domain privacy-preserving cooperative firewall optimization
JPINFOTECH JAYAPRAKASH
 
DOCX
Scalable and secure sharing of personal health records in cloud computing usi...
JPINFOTECH JAYAPRAKASH
 
DOCX
Secure encounter based mobile social networks requirements, designs, and trad...
JPINFOTECH JAYAPRAKASH
 
DOCX
Attribute based encryption with verifiable outsourced decryption
JPINFOTECH JAYAPRAKASH
 
DOCX
Cost based optimization of service compositions
JPINFOTECH JAYAPRAKASH
 
DOCX
Attribute aware data aggregation using potential-based dynamic routing n wire...
JPINFOTECH JAYAPRAKASH
 
DOCX
Anonymization of centralized and distributed social networks by sequential cl...
JPINFOTECH JAYAPRAKASH
 
DOCX
Two tales of privacy in online social networks
JPINFOTECH JAYAPRAKASH
 
DOC
Adaptive position update for geographic routing in mobile ad hoc networks
JPINFOTECH JAYAPRAKASH
 
Privacy preserving data sharing with anonymous id assignment
JPINFOTECH JAYAPRAKASH
 
Scalable and secure sharing of personal health records in cloud computing usi...
JPINFOTECH JAYAPRAKASH
 
Efficient rekeying framework for secure multicast with diverse subscription-p...
JPINFOTECH JAYAPRAKASH
 
A highly scalable key pre distribution scheme for wireless sensor networks
JPINFOTECH JAYAPRAKASH
 
Distributed processing of probabilistic top k queries in wireless sensor netw...
JPINFOTECH JAYAPRAKASH
 
Beyond text qa multimedia answer generation by harvesting web information
JPINFOTECH JAYAPRAKASH
 
Cross domain privacy-preserving cooperative firewall optimization
JPINFOTECH JAYAPRAKASH
 
Scalable and secure sharing of personal health records in cloud computing usi...
JPINFOTECH JAYAPRAKASH
 
Secure encounter based mobile social networks requirements, designs, and trad...
JPINFOTECH JAYAPRAKASH
 
Attribute based encryption with verifiable outsourced decryption
JPINFOTECH JAYAPRAKASH
 
Cost based optimization of service compositions
JPINFOTECH JAYAPRAKASH
 
Attribute aware data aggregation using potential-based dynamic routing n wire...
JPINFOTECH JAYAPRAKASH
 
Anonymization of centralized and distributed social networks by sequential cl...
JPINFOTECH JAYAPRAKASH
 
Two tales of privacy in online social networks
JPINFOTECH JAYAPRAKASH
 
Adaptive position update for geographic routing in mobile ad hoc networks
JPINFOTECH JAYAPRAKASH
 
Ad

Similar to Sort a self o rganizing trust model for peer-to-peer systems (20)

DOCX
JAVA 2013 IEEE NETWORKSECURITY PROJECT SORT: A Self-ORganizing Trust Model fo...
IEEEGLOBALSOFTTECHNOLOGIES
 
PDF
Iaetsd organizing the trust model in peer-to-peer system using
Iaetsd Iaetsd
 
PPTX
A novel approach for trust management for peer peer
Snehith
 
PDF
Trust management in p2 p systems
eSAT Journals
 
PDF
Making Trust Relationship For Peer To Peer System With Secure Protocol
IJMER
 
PDF
Trust Based Content Distribution for Peer-ToPeer Overlay Networks
IJNSA Journal
 
PDF
IMPROVING HYBRID REPUTATION MODEL THROUGH DYNAMIC REGROUPING
ijp2p
 
PDF
A Reliable Peer-to-Peer Platform for Adding New Node Using Trust Based Model
IJECEIAES
 
PPT
Second review
Sruthi Kamal
 
PDF
SECURITY CONSIDERATION IN PEER-TO-PEER NETWORKS WITH A CASE STUDY APPLICATION
IJNSA Journal
 
PDF
Analysis of threats and security issues evaluation in mobile P2P networks
IJECEIAES
 
PDF
International Journal of Engineering Research and Development (IJERD)
IJERD Editor
 
PDF
AN EXAUSTIVE SURVEY OF TRUST MODELS IN P2P NETWORK
ijwscjournal
 
PDF
AN EXAUSTIVE SURVEY OF TRUST MODELS IN P2P NETWORK
ijwscjournal
 
PDF
AN EXAUSTIVE SURVEY OF TRUST MODELS IN P2P NETWORK
ijwscjournal
 
DOCX
Rep on the Roll A peer to peer reputation system based on a rolling blockchain
Richard Dennis
 
PDF
PURGING OF UNTRUSTWORTHY RECOMMENDATIONS FROM A GRID
ijngnjournal
 
PPTX
SORT Self Organizing trust model for peer to peer system
Bhuvaneswari Baskaran
 
PDF
A MALICIOUS USERS DETECTING MODEL BASED ON FEEDBACK CORRELATIONS
IJCNC
 
PDF
Global Computing: an Analysis of Trust and Wireless Communications
Nicola Mezzetti
 
JAVA 2013 IEEE NETWORKSECURITY PROJECT SORT: A Self-ORganizing Trust Model fo...
IEEEGLOBALSOFTTECHNOLOGIES
 
Iaetsd organizing the trust model in peer-to-peer system using
Iaetsd Iaetsd
 
A novel approach for trust management for peer peer
Snehith
 
Trust management in p2 p systems
eSAT Journals
 
Making Trust Relationship For Peer To Peer System With Secure Protocol
IJMER
 
Trust Based Content Distribution for Peer-ToPeer Overlay Networks
IJNSA Journal
 
IMPROVING HYBRID REPUTATION MODEL THROUGH DYNAMIC REGROUPING
ijp2p
 
A Reliable Peer-to-Peer Platform for Adding New Node Using Trust Based Model
IJECEIAES
 
Second review
Sruthi Kamal
 
SECURITY CONSIDERATION IN PEER-TO-PEER NETWORKS WITH A CASE STUDY APPLICATION
IJNSA Journal
 
Analysis of threats and security issues evaluation in mobile P2P networks
IJECEIAES
 
International Journal of Engineering Research and Development (IJERD)
IJERD Editor
 
AN EXAUSTIVE SURVEY OF TRUST MODELS IN P2P NETWORK
ijwscjournal
 
AN EXAUSTIVE SURVEY OF TRUST MODELS IN P2P NETWORK
ijwscjournal
 
AN EXAUSTIVE SURVEY OF TRUST MODELS IN P2P NETWORK
ijwscjournal
 
Rep on the Roll A peer to peer reputation system based on a rolling blockchain
Richard Dennis
 
PURGING OF UNTRUSTWORTHY RECOMMENDATIONS FROM A GRID
ijngnjournal
 
SORT Self Organizing trust model for peer to peer system
Bhuvaneswari Baskaran
 
A MALICIOUS USERS DETECTING MODEL BASED ON FEEDBACK CORRELATIONS
IJCNC
 
Global Computing: an Analysis of Trust and Wireless Communications
Nicola Mezzetti
 
Ad

Recently uploaded (20)

PPTX
BASICS IN COMPUTER APPLICATIONS - UNIT I
suganthim28
 
DOCX
Unit 5: Speech-language and swallowing disorders
JELLA VISHNU DURGA PRASAD
 
PPTX
Artificial Intelligence in Gastroentrology: Advancements and Future Presprec...
AyanHossain
 
PPTX
Tips Management in Odoo 18 POS - Odoo Slides
Celine George
 
PPTX
Software Engineering BSC DS UNIT 1 .pptx
Dr. Pallawi Bulakh
 
PDF
The-Invisible-Living-World-Beyond-Our-Naked-Eye chapter 2.pdf/8th science cur...
Sandeep Swamy
 
PDF
Antianginal agents, Definition, Classification, MOA.pdf
Prerana Jadhav
 
PPTX
Five Point Someone – Chetan Bhagat | Book Summary & Analysis by Bhupesh Kushwaha
Bhupesh Kushwaha
 
PDF
RA 12028_ARAL_Orientation_Day-2-Sessions_v2.pdf
Seven De Los Reyes
 
PPTX
Artificial-Intelligence-in-Drug-Discovery by R D Jawarkar.pptx
Rahul Jawarkar
 
PPTX
Dakar Framework Education For All- 2000(Act)
santoshmohalik1
 
PPTX
How to Close Subscription in Odoo 18 - Odoo Slides
Celine George
 
PPTX
How to Apply for a Job From Odoo 18 Website
Celine George
 
PPTX
Basics and rules of probability with real-life uses
ravatkaran694
 
PPTX
TEF & EA Bsc Nursing 5th sem.....BBBpptx
AneetaSharma15
 
DOCX
Action Plan_ARAL PROGRAM_ STAND ALONE SHS.docx
Levenmartlacuna1
 
PPTX
Python-Application-in-Drug-Design by R D Jawarkar.pptx
Rahul Jawarkar
 
PPTX
CONCEPT OF CHILD CARE. pptx
AneetaSharma15
 
DOCX
pgdei-UNIT -V Neurological Disorders & developmental disabilities
JELLA VISHNU DURGA PRASAD
 
PPTX
Care of patients with elImination deviation.pptx
AneetaSharma15
 
BASICS IN COMPUTER APPLICATIONS - UNIT I
suganthim28
 
Unit 5: Speech-language and swallowing disorders
JELLA VISHNU DURGA PRASAD
 
Artificial Intelligence in Gastroentrology: Advancements and Future Presprec...
AyanHossain
 
Tips Management in Odoo 18 POS - Odoo Slides
Celine George
 
Software Engineering BSC DS UNIT 1 .pptx
Dr. Pallawi Bulakh
 
The-Invisible-Living-World-Beyond-Our-Naked-Eye chapter 2.pdf/8th science cur...
Sandeep Swamy
 
Antianginal agents, Definition, Classification, MOA.pdf
Prerana Jadhav
 
Five Point Someone – Chetan Bhagat | Book Summary & Analysis by Bhupesh Kushwaha
Bhupesh Kushwaha
 
RA 12028_ARAL_Orientation_Day-2-Sessions_v2.pdf
Seven De Los Reyes
 
Artificial-Intelligence-in-Drug-Discovery by R D Jawarkar.pptx
Rahul Jawarkar
 
Dakar Framework Education For All- 2000(Act)
santoshmohalik1
 
How to Close Subscription in Odoo 18 - Odoo Slides
Celine George
 
How to Apply for a Job From Odoo 18 Website
Celine George
 
Basics and rules of probability with real-life uses
ravatkaran694
 
TEF & EA Bsc Nursing 5th sem.....BBBpptx
AneetaSharma15
 
Action Plan_ARAL PROGRAM_ STAND ALONE SHS.docx
Levenmartlacuna1
 
Python-Application-in-Drug-Design by R D Jawarkar.pptx
Rahul Jawarkar
 
CONCEPT OF CHILD CARE. pptx
AneetaSharma15
 
pgdei-UNIT -V Neurological Disorders & developmental disabilities
JELLA VISHNU DURGA PRASAD
 
Care of patients with elImination deviation.pptx
AneetaSharma15
 

Sort a self o rganizing trust model for peer-to-peer systems

  • 1. SORT: A Self-Organizing Trust Model for Peer-to-Peer Systems ABSTRACT: Open nature of peer-to-peer systems exposes them to malicious activity. Building trust relationships among peers can mitigate attacks of malicious peers. This paper presents distributed algorithms that enable a peer to reason about trustworthiness of other peers based on past interactions and recommendations. Peers create their own trust network in their proximity by using local information available and do not try to learn global trust information. Two contexts of trust, service, and recommendation contexts are defined to measure trustworthiness in providing services and giving recommendations. Interactions and recommendations are evaluated based on importance, recentness, and peer satisfaction parameters. Additionally, recommender’s trustworthiness and confidence about a recommendation are considered while evaluating recommendations. Simulation experiments on a file sharing application show that the proposed model can mitigate attacks on 16 different malicious behavior models. In the experiments, good peers were able to form trust relationships in their proximity and isolate malicious peers. EXISTING SYSTEM:
  • 2. In the existing system of an authority, a central server is a preferred way to store and manage trust information, e.g., eBay. The central server securely stores trust information and defines trust metrics. Since there is no central server in most P2P systems, peers organize themselves to store and manage trust information about each other. Management of trust information is dependent to the structure of P2P network. In distributed hash table (DHT) - based approaches, each peer becomes a trust holder by storing feedbacks about other peers. Global trust information stored by trust holders can be accessed through DHT efficiently. In unstructured networks, each peer stores trust information about peers in its neighborhood or peers interacted in the past. A peer sends trust queries to learn trust information of other peers. A trust query is either flooded to the network or sent to neighborhood of the query initiator. DISADVANTAGES OF EXISTING SYSTEM:  Calculated trust information is not global and does not reflect opinions of all peers.  Classifying peers as either trustworthy or untrustworthy is not sufficient in most cases. Metrics should have precision so peers can be ranked according to trustworthiness.
  • 3.  Trust models on P2P systems have extra challenges comparing to e- commerce platforms. Malicious peers have more attack opportunities in P2P trust models due to lack of a central authority  Five common attacks in P2P trust models: self-promoting, white-washing, slandering, orchestrated, and denial of service attacks. PROPOSED SYSTEM: In the proposed system, we introduce a Self-Organizing Trust model (SORT) that aims to decrease malicious activity in a P2P system by establishing trust relations among peers in their proximity. No a priori information or a trusted peer is used to leverage trust establishment. Peers do not try to collect trust information from all peers. Each peer develops its own local view of trust about the peers interacted in the past. In this way, good peers form dynamic trust groups in their proximity and can isolate malicious peers. Since peers generally tend to interact with a small set of peers forming trust relations in proximity of peers helps to mitigate attacks in a P2P system. ADVANTAGES OF PROPOSED SYSTEM: Recommendation-based attacks were contained except when malicious peers are in large numbers, e.g., 50 percent of all peers. Experiments on SORT show that good
  • 4. peers can defend themselves against malicious peers metrics let a peer assess trustworthiness of other peers based on local information. Service and recommendation contexts enable better measurement of trustworthiness in providing services and giving recommendations. SYSTEM ARCHITECTURE:
  • 6. SYSTEM CONFIGURATION:- HARDWARE CONFIGURATION:-  Processor - Pentium –IV  Speed - 1.1 Ghz  RAM - 256 MB(min)  Hard Disk - 20 GB  Key Board - Standard Windows Keyboard  Mouse - Two or Three Button Mouse  Monitor - SVGA SOFTWARE CONFIGURATION:-  Operating System : Windows XP  Programming Language : JAVA  Java Version : JDK 1.6 & above.
  • 7. REFERENCE: Ahmet Burak Can, Member, IEEE, and Bharat Bhargava, Fellow, IEEE-“SORT: A Self-ORganizing Trust Model for Peer-to-Peer Systems”- IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, VOL. 10, NO. 1, JANUARY/FEBRUARY 2013.