Group Formation with Neighbour Similarity Trust in P2P E-Commerce
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064



Downloads: 117 | Monthly Hits: ⮙8

Review Papers | Computer Science & Engineering | India | Volume 4 Issue 3, March 2015

Group Formation with Neighbour Similarity Trust in P2P E-Commerce

M. Robin Rutherford, V. Dheepa

This paper is based on networking in predicting the trust between Peer to peer (P2P) e-commerce applications with liabilities to passive and active attacks. These attacks have turned out the potential business firms and individuals whose aim is to get the best benefit in e-commerce with minimal losses. The attacks occur when contacts between the swapping peers as an execution occurs In this paper, Sybil attack is proposed as an active attack, in which peers can have asserts, and can be considered as numerous identities to fake their owns. In our approach, traced Sybil attack peers can be recognized as the adjacent peers and became more trusted to each other. Security and performance analysis shows that Sybil attack can be reduced by our proposed neighbour similarity trust. The peer identities are then occupied to drag the behaviour of the system. However, if a single flawed entity can present multiple identities, it can control a massive proportion. All the resources utilized in the P2P infrastructure are contributed by the peers itself unless a traditional approaches where a central authority control is used. A peer gives illegal tributes will have its trust level minimised. In case it reaches a certain threshold level, the peer can be expelled from the group. Each peer has an identity, which is either honest or Sybil.

Keywords: P2P, trust, Sybil attack, collusion attack, neighbor similarity

Edition: Volume 4 Issue 3, March 2015

Pages: 1374 - 1377

Share this Article

How to Cite this Article?

M. Robin Rutherford, V. Dheepa, "Group Formation with Neighbour Similarity Trust in P2P E-Commerce", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=SUB152251, Volume 4 Issue 3, March 2015, 1374 - 1377

Enter Your Registered Email Address





Similar Articles with Keyword 'P2P'

Downloads: 98 | Weekly Hits: ⮙2 | Monthly Hits: ⮙9

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014

Pages: 1380 - 1385

Selecting Effectual Peers in P2P Webs for Task Calculating

Rajalakshmi.V, Gayathri, Swathi Durga, M. Narayanan

Share this Article

Downloads: 105 | Weekly Hits: ⮙1 | Monthly Hits: ⮙8

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014

Pages: 1006 - 1010

Description of Communities Based on Peer to Peer Systems and Suggestion for Traffic Localization with ISP

K. Hemapriya, M. Narayanan

Share this Article

Downloads: 105 | Weekly Hits: ⮙7

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 10, October 2015

Pages: 1977 - 1984

Chord4TSD: A Decentralized Trust Based Service Discovery Approach on Peer-to-Peer Networks

Yogini Bhamare

Share this Article

Downloads: 108 | Weekly Hits: ⮙1 | Monthly Hits: ⮙7

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 239 - 244

The Survey Paper on ASP2P: An Advanced Botnet Based on Social Networks over Hybrid P2P

Saloni Shah, Vina M. Lomte

Share this Article

Downloads: 108 | Monthly Hits: ⮙6

Review Papers, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 2062 - 2066

Load Balancing in P2P Networks using Random Walk Algorithm

A. S. Syed Navaz, A. S. Syed Fiaz

Share this Article

Similar Articles with Keyword 'trust'

Downloads: 40 | Weekly Hits: ⮙1

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1380 - 1382

A Literature Review of Enhancing Security in Mobile Ad-Hoc Networks Using Trust Management Security Scheme

Rajshree Ambatkar, Purnima Selokar

Share this Article

Downloads: 68

Research Paper, Computer Science & Engineering, India, Volume 7 Issue 4, April 2018

Pages: 137 - 140

Intelligent Health and Education Trust Recommendation System

Bhavin Rathod; Deepraj Sawant; Tejas Shetye; Silviya D'Monte

Share this Article

Downloads: 82 | Weekly Hits: ⮙1 | Monthly Hits: ⮙13

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 1384 - 1390

Sherpa - Experts Social Network

Sangramsingh M Ghatage, Siddharth K Gaikwad

Share this Article

Downloads: 89 | Weekly Hits: ⮙1 | Monthly Hits: ⮙8

Masters Thesis, Computer Science & Engineering, India, Volume 9 Issue 10, October 2020

Pages: 431 - 433

Real Time Signal Quality ECG Telemetry System for IoT - Based Health Care Monitoring

Arjumand Arshi, Dr. Sameena Banu

Share this Article

Downloads: 93 | Weekly Hits: ⮙3

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 1069 - 1073

Energy Efficient and Trust Based Node Disjoint Multipath Routing Protocol for WSN

Rucha Agrawal, Simran Khiani

Share this Article

Similar Articles with Keyword 'Sybil attack'

Downloads: 109 | Monthly Hits: ⮙3

Survey Paper, Computer Science & Engineering, India, Volume 2 Issue 3, March 2013

Pages: 354 - 356

Secure Routing to Prevent Sybil Attack in Sensor Networks

Mohammed Abrar, P. Subhadra

Share this Article

Downloads: 109 | Monthly Hits: ⮙7

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 2625 - 2629

Energy Efficient Data Aggregation of Wireless Sensor Network and Attacks using Error Bound

Yogita Hukre, S. S. Dongre

Share this Article

Downloads: 114 | Weekly Hits: ⮙4 | Monthly Hits: ⮙12

Review Papers, Computer Science & Engineering, India, Volume 7 Issue 7, July 2018

Pages: 1297 - 1298

Hybrid Approach of KNN and Euclidean Distance to Tackle Sybil Attack in the Network

Yasmeen, Parminder Kaur

Share this Article

Downloads: 117 | Monthly Hits: ⮙8

Review Papers, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 1374 - 1377

Group Formation with Neighbour Similarity Trust in P2P E-Commerce

M. Robin Rutherford, V. Dheepa

Share this Article

Downloads: 119 | Weekly Hits: ⮙2 | Monthly Hits: ⮙15

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 1, January 2015

Pages: 123 - 126

VANET: A Survey on Secure Routing

Omkar Shete, Sachin Godse

Share this Article

Similar Articles with Keyword 'collusion attack'

Downloads: 101 | Weekly Hits: ⮙2

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 2371 - 2374

Survey on Data Aggregation Technique for Wireless Sensor Networks based on IF algorithm

Anagha Jagtap, M. D. Ingle

Share this Article

Downloads: 117 | Monthly Hits: ⮙8

Review Papers, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 1374 - 1377

Group Formation with Neighbour Similarity Trust in P2P E-Commerce

M. Robin Rutherford, V. Dheepa

Share this Article

Downloads: 131 | Weekly Hits: ⮙4 | Monthly Hits: ⮙13

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 456 - 459

Improved Performance Approach for P2P Networks with Network Coding

Aparna Jumde, Shyamsundar Gupta

Share this Article

Downloads: 133 | Weekly Hits: ⮙3 | Monthly Hits: ⮙17

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 388 - 398

Dynamically Adaptive Recommender Filtering Scheme to Defend against Dishonest Recommenders in a MANET

Shirina Samreen, Dr. G. Narsimha

Share this Article



Top