期刊名称:International Journal of Computer Science and Information Technologies
电子版ISSN:0975-9646
出版年度:2012
卷号:3
期号:2
页码:3341-3347
出版社:TechScience Publications
摘要:peer-to-peer architectures derives to a large extent from their ability to function, scale and selforganize in the presence of a highly transient population of nodes, network and computer failures, without the need of a central server, Peer-to-peer networks are capable of being wounded to peers who cheat, propagate malicious code, leech on the network, or simply do not cooperate. The traditional security techniques developed for the centralized distributed systems like client-server networks are insufficient for P2P networks by the virtue of their centralized nature. The absence of a central authority in a P2P network poses unique challenges for identity management in the network. These challenges include Reputation of the peers, secure directory data management, Sybil attacks, and above all, availability of Reputation data. In this paper, we present a cryptology conventions for ensuring secure and timely availability of the Reputation data of a peer to other peers at extremely low costs. The past behavior of the peer is encapsulated in its digital Reputation, and is subsequently used to predict its future actions. As a result, a peer’s Reputation motivates it to cooperate and desist from malicious activities.