IJRIT International Journal Of Research In Information Technology, Volume 2, Issue 5, May 2014, Pg: 664-668

International Journal of Research in Information Technology (IJRIT)

www.ijrit.com

ISSN 2001-5569

An Advance Reputation System (ARS) for Peer to Peer Network 1,2

Jagriti Midha1 , Amit Sehgal2 Department of CSE,Shree Sidhivinyak group of institutions,Shahpur,Yamunanagar 1 [email protected], 2 [email protected]

Abstract: After examined Peer-to-Peer network and problems in Peer-to-Peer network it is concluded that there must be a system that minimize these problems. A reputation system is a good choice for handling these types of problem. Because of the open nature of P2P models, the rational phenomenon is popular and degrades the system performance. Anonymity may exacerbate this problem since the Rational cannot be located, and since selfish behaviors might be prevalent without any punishment. So objective of this paper is to design a reputation system for Peer-to-Peer network that can handle rational problem in this network efficiently with minimum network load. Keywords: global and local Reputation, trust, rational. 1.

Introduction to Peer-to-Peer Networking

Peer-to-peer (P2P) systems and applications are used in the Internet to share resources between computers. Resources are therefore distributed all over the P2P network. Pure P2P networks do not have any centralized control or organization. Therefore, they differ fundamentally from the traditional client-server (CS) model. Resources are fully decentralized and the nodes have an equal role, no hierarchy or central servers are needed. Nodes in a P2P system are called peers and they function simultaneously as clients and servers. Between these models lay the hybrid model, where a server is used for lookups of resources, but the data is distributed and transferred in a P2P manner. Napster is an example of a hybrid model. Today many P2P systems are used for file sharing. P2P file sharing networks often involve illegal and copyright-violate sharing of movies, music etc. Some operators even obstruct P2P traffic in their network in order to prevent excessive network load that P2P file sharing networks often cause. Measurements show that as much as 60-80% of network traffic is caused by P2P traffic, while only 30-35% of all subscribers use P2P. Bit Torrent, one of the most popular P2P file sharing networks, alone accounted for 30% of all Internet traffic. Bit Torrent and other P2P file sharing networks are just one way to use P2P. P2P networking has also been widely exploited for making voice calls and for instant messaging (IM) over the Internet. Skype is a good example of a P2P system that is widely being used in the Internet. In addition to file sharing and media communication, P2P can also be used e.g. for emergency information flow, SPAM detection filtering as well as for sharing computing power like [email protected] nodes in a P2P network can be situated all over the world, as long as there are physical links that can be used to interconnect the nodes. In a pure CS model, a resource to be searched is always only one hop away. In a P2P model, a resource to be searched in a P2P overlay network may take one or more hops to be found. Also, as the resources are decentralized and the location information of the resources is distributed, every peer has to participate in other peer’s resource lookups. After a resource has been found, usually a direct connection between the two peers can be used. Thereby, peers are usually only helping in resource lookups, but the resource utilization like file download or a voice call is made directly between the corresponding peers. A fully decentralized P2P network is very difficult to shut down, as there are no central servers or other entities that the network is dependent of. In general, P2P networks potentially offer an efficient routing architecture that can be self-organizing, massively scalable and robust. They can also provide good fault-tolerance, load balancing and explicit notion of locality 2.

Previous Work

In a peer-to-peer (P2P) network, peers are expected to contribute to the system by sharing their resources in return for using the network and other peers’ resources. However, in many P2P networks, a considerable portion Amit Sehgal,IJRIT

664

IJRIT International Journal Of Research In Information Technology, Volume 2, Issue 5, May 2014, Pg: 664-668

of peers are reluctant to share resources. Thus, P2P networks primary expectation is peers implicit or explicit functional cooperation and resource contribution might fail, leading to a situation called free riding. In a P2P context, rationals a peer that uses P2P network services but doesn’t contribute to the network or other peer sat an acceptable level. Reputation-based approaches construct and maintain reputation information about peers, and peers with good reputations are offered better services. These approaches can construct reputation information about a peer on the basis of feedback from peers who have interacted with that peer. Such feedback can be positive, negative, or both. The system uses the feedback to build up a good reputation for contributing peers and a bad reputation for rational. A peer’s reputation information corresponds to its long-term behavior, so reputation-based approaches store and manage long-term peer histories. This implies that it isn’t easy to convert a bad reputation to a good one or vice versa. In the past, many reputation systems tried to distinguish malicious peers from other honest peers. This section, reviews the previously proposed reputation systems. P-Grid is reputation system based on a decentralized storage method. The reputation of a peer is calculated by summarizing complains of his neighbors who have interacted with him. In P2Rep every peer must keep transaction records. If a peer wants to download a file from providers, he cloud review the transaction record sand selects a best provider. If he never downloads files from the provider, he could apply polling protocols to query the reputations of the providers from other peers. XRep is also polling protocol but the difference between P2Rep and XRep is that P2Rep focuses on providers' reputations, while XRep concentrates on resource reputations. Since both systems use polling protocols to evaluate the reputations, they must produce a lot of polling messages and it will decrease the performance of network. 3.

Problem domain

The Peer-to-Peer (P2P) paradigm of file sharing has been growing dramatically in popularity over the last decade. Consequently, large amounts of data and resources are being shared co-operatively among P2P users on a global-scale, that is a good sign but also there are some problems related to such systems. Some basic problems in peer-to-peer network are  A number of Users do not want to share files, data, or resources rather desire to free ride on others.  Some malicious behavior can't be punished due to open nature of P2P networks.  A worst condition for open networks is when a group of malicious peers make collusive attempts to manipulate the ratings.  A malicious request responder, if selected as a service provider can attack on the system. 4.

Proposed work

In our system, it is assume semi-decentralized architecture for peer to peer network to decrease the transaction messages. It assume that there is a P2P network with m groups in which each group has at most n group managers. A group could consist of many peers according to their IP ranges, the types of shared files or other requirements. For example, a group with similar IP range has high transmission speed, or groups consisting of peers who share music files increases successful probability of searching music files. Group managers can be creators of groups or the oldest peers with high reputations. Peers can join into a group as their requirements. 4.1

Distributed Ranking Mechanism

A distinction of our Efficient Reputation system is to leverage mainly the best nodes to aggregate the global reputations. However, in a large P2P system with frequent peer joining and leaving, we could not assume that there always exist some static and predetermined good nodes. Instead, we propose a fully distributed ranking mechanism to select the m most reputable nodes, dynamically. Every node has a score manager that accumulates its global reputation. When a new node i joins the system, node j is assigned as the score manager of node i if node j is the successor node of ki, where ki is the hash value of the unique identifier of node i by a pre-defined hash function. All other nodes can access the global reputation of node i by issuing a lookup request with key equal to ki. Different hash functions can be used to have multiple score managers for each node in case the malicious score manager reports some wrong global reputation scores.To select the m most reputable nodes, our distributed sorting mechanism applies locality preserving hashing (LPH) to sort all nodes with respect to their global scores. Hash function H is a locality preserving hash function if it has the following two properties: (1) H(vi) < H(vj), iff vi
Amit Sehgal,IJRIT

665

IJRIT International Journal Of Research In Information Technology, Volume 2, Issue 5, May 2014, Pg: 664-668

5.

Working

Suppose node j is the score manager of node i, it stores a pair (vi, i) for node i, where vi is theglobal reputation of node i. Node j hashes the reputation value vi using a LPH function to a hash value H(vi) and inserts the triplet (vi, i, j) to the successor node of H(vi). The triplets are stored in the ascending order of their reputation values in the DHT hash space due to the property of LPH. Assume node x is the successor node of the maximum hash value and it stores k triplets with highest reputation values. If k is less than m, node x sends a message to its predecessor node y to find the next m-k highest reputation triplets. This process repeats recursively until the m highest reputation triplets are found. 6.

Simulation Environment

Network simulator version 2 is used, for the simulation purpose with ns2 version ns-2.29 was used with different network scenario. In the following section the details regarding to the NS2 simulator and their usage is given.For the implementation of proposed model I have selected ns-2 version 2.29 and RedHat version 5 operating system. Ns-2 is a good tool for the implementation of various wired and wireless scenario that can represent all kind of network performances. 7.

Behavior Analysis

As per figure 1 shows the simulation of our model consists of 25 nodes. The circles inside the simulation represent the groups in Peer-to-Peer network. There is more than one group manager in a group and services are delivered in terms of packet in the group and between the groups.

Figure1: simulation of AIS From the figure 2 it is analyzed that as soon as full network is established number of groups increases to balance load between the groups. In this way maximum services are provides to the network. Surely it will be a flexible and robust model for Peer-to-Peer network

Figure 2: example of delivery of Services behaviors of AIS Figure 3 shows that groups are communicated for the services. It is not always possible that services are available in to a peer node in the same group so group manager extends the search to another group. So groups need to be communicating other groups for better services. If any malicious node is detected then services are not proved to that node. In simulation packet drops represent that malicious node is eliminated from the network by note giving any service to that node based on their reputation in the network. Amit Sehgal,IJRIT

666

IJRIT International Journal Of Research In Information Technology, Volume 2, Issue 5, May 2014, Pg: 664-668

Figure 3 : Example of Packet drops Performance Analysis Following are the graphs for the peer to peer network with the AODV protocol which is having the functionality of detecting and preventing the network attack. Graph 4 represent packet lost and packet send ratio in the network.

Graph 4: packet received packet lost 8.

Conclusion

In this paper a rational detective and contribution-oriented reputation system including two transaction protocols presented which is aiming to degrade the willing of rationals and resist malicious file spreading. It uses a semi-decentralized P2P network to decrease network traffic for peer reputation computation. AIS stops figuring out all peers in unstructured P2P network by creating group, so each peer figures out all peers that are very difficult in unstructured P2P networks.AIS can control the number of exchanges reputation data. Our reputation management scheme is simple, proactive and has minimal overhead in terms of computation, infrastructure, storage and message complexity. Further more, it does not require any synchronization among peers. This system provides an easy way to find a good file and avoids malicious file spreading in the P2P file-sharing networks. References: Sergio Marti, Hector Garcia-Molina "Taxonomy of reputation: Categorizing P2P reputation systems" [1] Computer Networks 50 (2006) ScienceDirect, pp. 472–484 [2] George Danezis and Stefan Schiner “On Network formation,(Sybil attacks and Reputation systems)” 978-0-7695-3318-6/07, pp. 145 IEEE, 2007 [3] Xue Chen , Guisheng Chen , Jin Liu , XiangfengLuo , Xuhui Li , Bing Li “Reputation Factors in P2P Networks” 978-0-7695-3316-2/08, pp. 245 IEEE, 2008 [4] Xin-Xin Ma, Zhi-Guang Qin "Partition and multi-path transmission: An encryption-free reputation sharing protocol in Gnutella-like peer-to-peer network" Computer Communications 31 (2008) ScienceDirect , pp.3059–3063 [5] Thanasis G. Papaioannou , George D. Stamoulis "Reputation-based policies that provide the right reputations in peer-to-peer environments " Computer Networks 50 (2006) ScienceDirect, pp.563–578

Amit Sehgal,IJRIT

667

IJRIT International Journal Of Research In Information Technology, Volume 2, Issue 5, May 2014, Pg: 664-668

[6] [7]

[8]

[9]

[10] [11]

[12] [13]

[14] [15]

[16] [17]

Jianguo Chen, Xiang Xu Stefan D. Bruda “Combining Data Reputation in Reputation Systems to Boost P2P Security” 978-0-7795-3961-4/10, pp. 668 IEEE, 2010 Masanori Yasutomi, YoMashimo, Hiroshi Shigeno "GRAT:Group Reputation Aggregation Reputation for Unstructured Peer-to-Peer Networks" International Conference on Distributed Computing Systems Workshops, 978-0-7695-4079-5/10 IEEE 2010, pp.126-133 Marco Remondino , Guido Boella "How users’ participation affects reputation management systems: The case of P2P networks" Simulation Modelling Practice and Theory 18 , ScienceDirect 2010, pp 1493–1505 PrashantDewan and ParthaDasgupta "P2P Reputation Management Using Distributed Identities and Decentralized Recommendation Chains" TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, VOL. 22, NO. 7, IEEE JULY 2010, pp.1000-1014 Thanasis G. Papaioannou , George D. Stamoulis "Reputation-based policies that provide the right reputations in peer-to-peer environments " Computer Networks 50 (2006) ScienceDirect, pp.563–578 Jia Zhao1 and Jian-De Lu2 "Pyramid: Building Reputation Architecture for Unstructured Peer-to-Peer Network" Proceedings of the Advanced International Conference on Telecommunications and International Conference on Internet and Web Applications and Services (AICT/ICIW 2006) 0-76952522-9/06 IEEE 2006 Zhan Zhang Shigang Chen Myungkeun Yoon "MARCH: A Distributed Reputation Scheme for Peerto-Peer Networks" 0743-166X/07/ IEEE 2007, pp.1001-1009 S. Zhou, G. Rogers, M. Hogan "An Reputation Based Routing Algorithm for Improving Message Forwarding in Structured Peer-to-Peer Networks" The 2nd International Conference on Wireless Broadband and Ultra Wideband Communications (AusWireless 2007)0-7695-2842-2/07 IEEE 2007 Yu Zhang, Li Lin, and JinpengHuai "Balancing Reputation and Reputation in Peer-to-Peer Collaborative System" International Journal of Network Security, Vol.5, No.1, PP.73–81, July 2007 ShahidHussain "Reputation management and Reputation mechanism for P2P Networks: Survey to cope challenges" Proceedings of the 12th IEEE International Multitopic Conference, December 23-24, 2008, pp. 301-306 MuntasirRaihanRahman "A Survey of Reputation Mechanisms in Peer-to-Peer" Technical Report CS2009-22 Cuihong Li a, Bin Yu b, Katia Sycara "An reputation mechanism for message relaying in unstructured peer-to-peer systems" Electronic Commerce Research and Applications 8 (2009) ScienceDirect, pp.315–326

Amit Sehgal,IJRIT

668

An Advance Reputation System (ARS) for Peer to Peer Network - IJRIT

system for Peer-to-Peer network that can handle rational problem in this network efficiently with minimum .... Since both systems use polling protocols to evaluate the reputations, they must produce a lot of .... reputation management scheme is simple, proactive and has minimal overhead in terms of computation, infra-.

640KB Sizes 0 Downloads 225 Views

Recommend Documents

An Advance Reputation System (ARS) for Peer to Peer Network - IJRIT
Resources are therefore distributed all over the P2P network. .... In our system, it is assume semi-decentralized architecture for peer to peer network to decrease ...

A Blueprint Discovery of Hybrid Peer To Peer Systems - IJRIT
unstructured peer to peer system in which peers are connected by a illogical ... new hybrid peer to peer system for distributed data sharing which joins the benefits ..... [2] Haiying (Helen) Shen, “IRM: Integrated File Replication and Consistency 

A Blueprint Discovery of Hybrid Peer To Peer Systems - IJRIT
*Head of the Department, Department of Computer Science & Engineering, ... Home networks that utilize broadband routers are hybrid peer to peer and ... peers, and select a super peer in each cluster as a local server to manage the cluster.

Encrypted Peer to Peer File Sharing System using ...
1Student, Department of Computer Science, SSBT's COET, Bambhori, Jalgaon ... 1. Introduction. Over the past years, the immense popularity of the Internet has produced a significant stimulus .... file's replication degree based on its popularity.

Network Forensic on Encrypted Peer-to-Peer VoIP ...
(VoIP) application evolving quickly since its launch in 2003. However, the ability to traverse ..... Open source voip traffic monitoring. In SANE 2006,. May 2006.

Peer to Peer Network: A Review
peer can initiate requests to other peers, and at the same time respond to ... operators even obstruct P2P traffic in their network in order to prevent ... File Sharing: technologies for sharing data between equal peers in large .... an API. Thus, JX

DANTE: A Self-adapting Peer-to-Peer System
system in which the topology of the underlying overlay network can be dynamically ..... the same software running on similar hardware4. In each experiment .... overloading nodes by explicitly accounting for their capacity constraints. In Gia,.

Moore: An Extendable Peer-to-Peer Network Based on ...
Department of Computer Science and Engineering. Florida Atlantic University ... Keywords: Constant degree networks, Kautz digraphs, peer-to- peer networks.

Method and apparatus for facilitating peer-to-peer application ...
Dec 9, 2005 - microprocessor and memory for storing the code that deter mines what services and ..... identi?er such as an email address. The person making the ..... responsive to the service request from the ?rst application received by the ...

Viability of Microsoft Peer-to-Peer Framework for ...
One example of this is Windows Mobile Smartphone devices support an email channel to allow them to communicate using the simple data services provided ...

Simple Efficient Load Balancing Algorithms for Peer-to-Peer Systems
A core problem in peer to peer systems is the distribu- tion of items to be stored or computations to be car- ried out to the nodes that make up the system. A par-.

Method and apparatus for facilitating peer-to-peer application ...
Dec 9, 2005 - view.html on Nov. 23, 2005. ...... to add additional or more complex translation rules to those used in the ..... identi?er such as an email address.

Query Protocols for Highly Resilient Peer-to-Peer ... - Semantic Scholar
is closest in spirit to the virtual content addressable network described by Fiat .... measures the cost of resolving a query in terms of the number hops taken by a ...

Query Protocols for Highly Resilient Peer-to-Peer ... - Semantic Scholar
Internet itself, can be large, require distributed control and configuration, and ..... We call a vertex in h to be occupied if there is a peer or node in the network (i.e., ...

From Peer-to-Peer Networks to Cloud.pdf
Follow this and additional works at: http://digitalcommons.pace.edu/lawfaculty. Part of the Computer Law Commons, Criminal Law Commons, Internet Law ...

Peer to Peer Network: A Review - International Journal of Research in ...
Security: The system should be secure against attacks such as a denial-of-service attack, .... Factors that affect security in P2P networks ... experienced hacker.

Ant-inspired Query Routing Performance in Dynamic Peer-to-Peer ...
Faculty of Computer and Information Science,. Tržaška 25, Ljubljana 1000, ... metrics in Section 3. Further,. Section 4 presents the course of simulations in a range of .... more, the query is flooded and thus finds the new best path. 3.2. Metrics.

Towards Yet Another Peer-to-Peer Simulator
The cost of implementation is less than that of a large-scale ..... steep, rigid simulation architecture that made extension difficult and software or hardware system ... for the simulation life cycle, the underlying topology and the routing of ...

ID SERVER STREAMING USING PEER TO PEER ... - Semantic Scholar
Also, by caching the requests at the clients, better content distribution of data is possible. For example, let us ... a smooth delivery of data. Different .... server partition will not have strict real time requirements and can be updated depending

Building Low-Diameter Peer-to-Peer Networks
build P2P networks in a distributed fashion, and prove that it results in ...... A Measurement. Study of Peer-to-Peer File Sharing Systems, in Proceedings.

Leeching Bataille: peer-to-peer potlatch and the ...
with conceptualising the actual practice of gifting and how it can best be understood in relation to ... These effects can no longer be restricted to their online aspect. ..... This is a description of a noble and valuable social practice: “filesha

June 2014 Peer-to-Peer Webinars.pdf
... level emergency pre- paredness site reviewer, has co-authored a hospital evacuation course for the Federal Emergency Management Agency (FEMA), and is.