SlideShare a Scribd company logo
Bhuvaneswari.P.B
Kavi Priya.P
Padmavathi.M
Pavithra.P
 Anonymous nature of peer-to-peer (P2P) systems exposes
them to malicious activity.
 Building trust relationships among peers can mitigate
attacks of malicious peers.
 This project enable a peer to reason about trustworthiness
of other peers based on their past interactions.
 Peers create their own trust network in their proximity by
using local information available and do not try to learn
global trust information.
• Two contexts of trust, service, and recommendation
context, are defined to measure trustworthiness in
providing services and giving recommendations.
• Interactions and recommendations are evaluated
based on importance, recentness, and peer satisfaction
parameters.
 Calculated trust information is not global and does not
reflect opinions of all peers.
 Classifying peers as either trustworthy or
untrustworthy is not sufficient in most cases. Metrics
should have precision so peers can be ranked
according to trustworthiness.
 Trust models on P2P systems have extra challenges
comparing to e-commerce platforms. Malicious peers
have more attack opportunities in P2P trust models
due to lack of a central authority
 Recommendation-based attacks were contained except
when malicious peers are in large numbers, e.g., 50
percent of all peers.
 Experiments on SORT show that good peers can
defend themselves against malicious peers metrics let
a peer assess trustworthiness of other peers based on
local information.
 Service and recommendation contexts enable better
measurement of trustworthiness in providing services
and giving recommendations.
SORT Self Organizing trust model for peer to peer system
 Service Trust Metric
 Reputation Metric
 Recommendation Trust Metric
 Selecting Service Providers
 When evaluating an acquaintance’s trustworthiness in the
service context, a peer first calculates competence and
integrity belief values using the information in its service
history.
 Competence belief represents how well an acquaintance
satisfied the needs of past interactions .Let friend request
denote the competence belief of pi about pj in the service
context. Average behavior in the past interactions is a
measure of the competence belief. Consistency is as
important as competence.
 Level of confidence in predictability of future interactions
is called integrity belief. Let I bij denote the integrity
belief of pi about pj in the service context. Deviation from
average behavior (cbij) is a measure of the integrity belief.
 The reputation metric measures a stranger’s trust worthiness
based on recommendations. In the following two sections, we
assume that pj is a stranger to pi and pk is an acquaintance of pi.
 If pi wants to calculate rij value, it starts a reputation query to
collect recommendations from its acquaintances. Trustworthy
acquaintances and requests their recommendations.
 Let max denote the maximum number of recommendations that
can be collected in a reputation query and jSj denote the size of a
set S.
 In the getting recommendation algorithm, pi sets a high
threshold for recommendation trust values and requests
recommendations from highly trusted acquaintances first.
Then, it decreases the threshold and repeats the same
operations.
 Eg: Facebook.
 Assume that pi wants to get a particular service. pj is a
stranger to pi and a probable service provider. To learn pj’s
reputation, pi requests recommendations from its
acquaintances.
 Assume that pk sends back a recommendation to pi. After
collecting all recommendations, pi calculates rij. Then, pi
evaluates pk’s recommendation, stores results in RH ik,
and updates rtik. Assuming pj is trustworthy enough, pi
gets the service from pj.
 Then, pi evaluates this interaction and stores the results in
SH ij, and updates stij.
 When pi searches for a particular service, it gets a list
of service providers.
 Considering a facebook application, either post share
the links to other peer. Connecting the all people with
recommendation multiple peers, checking integrity is
a problem since any file part downloaded from an
uploader might be inauthentic.
 Service provider selection is done based on service
trust metric, service history size, competence belief,
and integrity belief values. When pi wants to
download a file, it selects an uploader with the highest
service trust value
SORT Self Organizing trust model for peer to peer system

More Related Content

PPT
Second review
DOCX
Sort a self organizing trust model for peer-to-peer systems
PPTX
Background check misconceptions 5 12 15
PPT
presentation29
PPT
Recsys Presentation
PPT
Gam Documentation
PPT
INFO4990_Hossain
PPT
MS Research Progress Presentation
Second review
Sort a self organizing trust model for peer-to-peer systems
Background check misconceptions 5 12 15
presentation29
Recsys Presentation
Gam Documentation
INFO4990_Hossain
MS Research Progress Presentation

Similar to SORT Self Organizing trust model for peer to peer system (20)

PDF
A survey on various reputation assessment techniques
PPTX
Trust-aware Recommender Systems
PDF
An Efficient Trust Evaluation using Fact-Finder Technique
PDF
Automatic Recommendation of Trustworthy Users in Online Product Rating Sites
PPTX
A novel approach for trust management for peer peer
PDF
Iaetsd organizing the trust model in peer-to-peer system using
PDF
Making Trust Relationship For Peer To Peer System With Secure Protocol
PPT
Telefonica Lunch Seminar
PDF
IRJET - Sentiment Similarity Analysis and Building Users Trust from E-Commerc...
PDF
AN EXAUSTIVE SURVEY OF TRUST MODELS IN P2P NETWORK
PDF
AN EXAUSTIVE SURVEY OF TRUST MODELS IN P2P NETWORK
PDF
AN EXAUSTIVE SURVEY OF TRUST MODELS IN P2P NETWORK
PDF
PRODUCT REPUTATION AND GLOBAL RATING IN E-COMMERCE
PDF
Using Trust in Recommender Systems: an experimental analysis
PDF
Sas web 2010 lora-aroyo
PPTX
Achieving Optimal Privacy in Trust-Aware Collaborative Filtering Recommender ...
PPT
Next generation web
PDF
Can you trust online ratings a mutual
PDF
A Survey on Trust Inference Network for Personalized Use from Online Data Rating
PPTX
CrowdsouRS: A Crowdsourced Reputation System for Identifying Deceptive Web-co...
A survey on various reputation assessment techniques
Trust-aware Recommender Systems
An Efficient Trust Evaluation using Fact-Finder Technique
Automatic Recommendation of Trustworthy Users in Online Product Rating Sites
A novel approach for trust management for peer peer
Iaetsd organizing the trust model in peer-to-peer system using
Making Trust Relationship For Peer To Peer System With Secure Protocol
Telefonica Lunch Seminar
IRJET - Sentiment Similarity Analysis and Building Users Trust from E-Commerc...
AN EXAUSTIVE SURVEY OF TRUST MODELS IN P2P NETWORK
AN EXAUSTIVE SURVEY OF TRUST MODELS IN P2P NETWORK
AN EXAUSTIVE SURVEY OF TRUST MODELS IN P2P NETWORK
PRODUCT REPUTATION AND GLOBAL RATING IN E-COMMERCE
Using Trust in Recommender Systems: an experimental analysis
Sas web 2010 lora-aroyo
Achieving Optimal Privacy in Trust-Aware Collaborative Filtering Recommender ...
Next generation web
Can you trust online ratings a mutual
A Survey on Trust Inference Network for Personalized Use from Online Data Rating
CrowdsouRS: A Crowdsourced Reputation System for Identifying Deceptive Web-co...
Ad

Recently uploaded (20)

PDF
Chinmaya Tiranga quiz Grand Finale.pdf
PDF
Module 4: Burden of Disease Tutorial Slides S2 2025
PDF
Trump Administration's workforce development strategy
PDF
OBE - B.A.(HON'S) IN INTERIOR ARCHITECTURE -Ar.MOHIUDDIN.pdf
PDF
Supply Chain Operations Speaking Notes -ICLT Program
PPTX
Microbial diseases, their pathogenesis and prophylaxis
PPTX
Lesson notes of climatology university.
PDF
Complications of Minimal Access Surgery at WLH
PPTX
master seminar digital applications in india
PPTX
Final Presentation General Medicine 03-08-2024.pptx
PDF
What if we spent less time fighting change, and more time building what’s rig...
PDF
A GUIDE TO GENETICS FOR UNDERGRADUATE MEDICAL STUDENTS
PDF
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
PDF
Updated Idioms and Phrasal Verbs in English subject
PPTX
History, Philosophy and sociology of education (1).pptx
PDF
LDMMIA Reiki Yoga Finals Review Spring Summer
PDF
STATICS OF THE RIGID BODIES Hibbelers.pdf
PPTX
UV-Visible spectroscopy..pptx UV-Visible Spectroscopy – Electronic Transition...
PDF
A systematic review of self-coping strategies used by university students to ...
PPTX
202450812 BayCHI UCSC-SV 20250812 v17.pptx
Chinmaya Tiranga quiz Grand Finale.pdf
Module 4: Burden of Disease Tutorial Slides S2 2025
Trump Administration's workforce development strategy
OBE - B.A.(HON'S) IN INTERIOR ARCHITECTURE -Ar.MOHIUDDIN.pdf
Supply Chain Operations Speaking Notes -ICLT Program
Microbial diseases, their pathogenesis and prophylaxis
Lesson notes of climatology university.
Complications of Minimal Access Surgery at WLH
master seminar digital applications in india
Final Presentation General Medicine 03-08-2024.pptx
What if we spent less time fighting change, and more time building what’s rig...
A GUIDE TO GENETICS FOR UNDERGRADUATE MEDICAL STUDENTS
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
Updated Idioms and Phrasal Verbs in English subject
History, Philosophy and sociology of education (1).pptx
LDMMIA Reiki Yoga Finals Review Spring Summer
STATICS OF THE RIGID BODIES Hibbelers.pdf
UV-Visible spectroscopy..pptx UV-Visible Spectroscopy – Electronic Transition...
A systematic review of self-coping strategies used by university students to ...
202450812 BayCHI UCSC-SV 20250812 v17.pptx
Ad

SORT Self Organizing trust model for peer to peer system

  • 2.  Anonymous nature of peer-to-peer (P2P) systems exposes them to malicious activity.  Building trust relationships among peers can mitigate attacks of malicious peers.  This project enable a peer to reason about trustworthiness of other peers based on their past interactions.  Peers create their own trust network in their proximity by using local information available and do not try to learn global trust information.
  • 3. • Two contexts of trust, service, and recommendation context, are defined to measure trustworthiness in providing services and giving recommendations. • Interactions and recommendations are evaluated based on importance, recentness, and peer satisfaction parameters.
  • 4.  Calculated trust information is not global and does not reflect opinions of all peers.  Classifying peers as either trustworthy or untrustworthy is not sufficient in most cases. Metrics should have precision so peers can be ranked according to trustworthiness.  Trust models on P2P systems have extra challenges comparing to e-commerce platforms. Malicious peers have more attack opportunities in P2P trust models due to lack of a central authority
  • 5.  Recommendation-based attacks were contained except when malicious peers are in large numbers, e.g., 50 percent of all peers.  Experiments on SORT show that good peers can defend themselves against malicious peers metrics let a peer assess trustworthiness of other peers based on local information.  Service and recommendation contexts enable better measurement of trustworthiness in providing services and giving recommendations.
  • 7.  Service Trust Metric  Reputation Metric  Recommendation Trust Metric  Selecting Service Providers
  • 8.  When evaluating an acquaintance’s trustworthiness in the service context, a peer first calculates competence and integrity belief values using the information in its service history.  Competence belief represents how well an acquaintance satisfied the needs of past interactions .Let friend request denote the competence belief of pi about pj in the service context. Average behavior in the past interactions is a measure of the competence belief. Consistency is as important as competence.  Level of confidence in predictability of future interactions is called integrity belief. Let I bij denote the integrity belief of pi about pj in the service context. Deviation from average behavior (cbij) is a measure of the integrity belief.
  • 9.  The reputation metric measures a stranger’s trust worthiness based on recommendations. In the following two sections, we assume that pj is a stranger to pi and pk is an acquaintance of pi.  If pi wants to calculate rij value, it starts a reputation query to collect recommendations from its acquaintances. Trustworthy acquaintances and requests their recommendations.  Let max denote the maximum number of recommendations that can be collected in a reputation query and jSj denote the size of a set S.  In the getting recommendation algorithm, pi sets a high threshold for recommendation trust values and requests recommendations from highly trusted acquaintances first. Then, it decreases the threshold and repeats the same operations.
  • 10.  Eg: Facebook.  Assume that pi wants to get a particular service. pj is a stranger to pi and a probable service provider. To learn pj’s reputation, pi requests recommendations from its acquaintances.  Assume that pk sends back a recommendation to pi. After collecting all recommendations, pi calculates rij. Then, pi evaluates pk’s recommendation, stores results in RH ik, and updates rtik. Assuming pj is trustworthy enough, pi gets the service from pj.  Then, pi evaluates this interaction and stores the results in SH ij, and updates stij.
  • 11.  When pi searches for a particular service, it gets a list of service providers.  Considering a facebook application, either post share the links to other peer. Connecting the all people with recommendation multiple peers, checking integrity is a problem since any file part downloaded from an uploader might be inauthentic.  Service provider selection is done based on service trust metric, service history size, competence belief, and integrity belief values. When pi wants to download a file, it selects an uploader with the highest service trust value