Repository landing page

We are not able to resolve this OAI Identifier to the repository landing page. If you are the repository manager for this record, please head to the Dashboard and adjust the settings.

Implementation of Volatile Secure Model in P2P System: A Detailed Analysis

Abstract

In network domain system, the peer to peer systems shows an open access rather than other systems.P2P system defines each peer is able to share the information to other peer without the help of any centralized system. So there are more chances of malicious activities .for better security one peer must send some trust parameters along with the recommendations from other peer. This system is fully based on priority, trust worthiness history and peer satisfaction, recommendation. Those peers who is having more recommendations and trustworthiness value, that peer will connect with other peers only. A trust model is derived by integrating the risk management and security, by applying this new method; it provides the utility maximization of peer to peer system. The main objective of the system is to make sure that the peer to peer communication is reliable and secure by the use of the trust model surrounded each and every peer in the system. DOI: 10.17762/ijritcc2321-8169.15068

Similar works

Full text

thumbnail-image

International Journal on Recent and Innovation Trends in Computing and Communication

redirect
Last time updated on 20/10/2022

Having an issue?

Is data on this page outdated, violates copyrights or anything else? Report the problem now and we will take corresponding actions after reviewing your request.