Open Access Open Access  Restricted Access Subscription Access

Securing Information In P2P Reputation Management Using Distributed Identities And Decentralized Recommendation Chains


 

The motivation behind this paper is to protect the P2P network without using any central component. In this paper we present a cryptographic protocol for ensuring secure and timely availability of the reputation data of a peer extremely at low cost and develop a queuing model to evaluate the time required at each peer to serve its replication requests. The open, sharing and anonymous nature of peer to peer (p2p) network has offered opportunities and threats for the development of distributed computing technology. One way to minimize the threats is to establish the reputation based global trust model. Reputation based p2p systems have the property to detect malicious peers using the reputation of the peers providing the resources. A two-party cryptographic protocol not only protects the reputation information from its owner, but also provides secure exchange of reputation information between the two peers participating in a transaction.


Keywords

Peer to Peer, Cryptography, Distributed, Reputation
User
Notifications
Font Size

Abstract Views: 132

PDF Views: 1




  • Securing Information In P2P Reputation Management Using Distributed Identities And Decentralized Recommendation Chains

Abstract Views: 132  |  PDF Views: 1

Authors

Abstract


The motivation behind this paper is to protect the P2P network without using any central component. In this paper we present a cryptographic protocol for ensuring secure and timely availability of the reputation data of a peer extremely at low cost and develop a queuing model to evaluate the time required at each peer to serve its replication requests. The open, sharing and anonymous nature of peer to peer (p2p) network has offered opportunities and threats for the development of distributed computing technology. One way to minimize the threats is to establish the reputation based global trust model. Reputation based p2p systems have the property to detect malicious peers using the reputation of the peers providing the resources. A two-party cryptographic protocol not only protects the reputation information from its owner, but also provides secure exchange of reputation information between the two peers participating in a transaction.


Keywords


Peer to Peer, Cryptography, Distributed, Reputation