The proposed peer-to-peer communication system has advantages over conventional client server model in terms of time consumption to accomplish the task, and security in distributing the data between the two entities. Although the peer-to-peer communication model is more advanced than the conventional computer network approaches, the open nature of peer-to-peer communication model makes the system more prone to the malicious activity. An approach for trust building among the peers in a network is presented in the paper, which helps to create the scenario where the system can mitigate the malicious peers from the communication successfully. Based on the past interactions and simultaneously past recommendations, trustworthiness is created to enable the peers to further interactions in the network. The peers in the system create their own network based on the local information available in the proximity. The peers in the created network do not try to use the global information as they mostly rely only on local information. To provide reliable services and recommendations, the trustworthiness is measured using the two contexts of trust, namely service and recommendation context. Finally, the communication is evaluated based on the peer satisfaction and the evaluation of the recommendations is the main concern. In order to evaluate proper recommendations, the respective recommender’s confidence and trustworthiness is taken into consideration.
|Commitee:||Aghnatios, Wajdi, Ary, James, Chassiakos, Anastasios|
|School:||California State University, Long Beach|
|School Location:||United States -- California|
|Source:||MAI 55/04M(E), Masters Abstracts International|
|Keywords:||Malicious activity, Peer to peer communication, Trustworthiness|
Copyright in each Dissertation and Thesis is retained by the author. All Rights Reserved
The supplemental file or files you are about to download were provided to ProQuest by the author as part of a
dissertation or thesis. The supplemental files are provided "AS IS" without warranty. ProQuest is not responsible for the
content, format or impact on the supplemental file(s) on our system. in some cases, the file type may be unknown or
may be a .exe file. We recommend caution as you open such files.
Copyright of the original materials contained in the supplemental file is retained by the author and your access to the
supplemental files is subject to the ProQuest Terms and Conditions of use.
Depending on the size of the file(s) you are downloading, the system may take some time to download them. Please be