International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064

Downloads: 118 | Views: 148

Review Papers | Computer Science & Engineering | India | Volume 4 Issue 3, March 2015

Group Formation with Neighbour Similarity Trust in P2P E-Commerce

M. Robin Rutherford | V. Dheepa [2]

Abstract: This paper is based on networking in predicting the trust between Peer to peer (P2P) e-commerce applications with liabilities to passive and active attacks. These attacks have turned out the potential business firms and individuals whose aim is to get the best benefit in e-commerce with minimal losses. The attacks occur when contacts between the swapping peers as an execution occurs In this paper, Sybil attack is proposed as an active attack, in which peers can have asserts, and can be considered as numerous identities to fake their owns. In our approach, traced Sybil attack peers can be recognized as the adjacent peers and became more trusted to each other. Security and performance analysis shows that Sybil attack can be reduced by our proposed neighbour similarity trust. The peer identities are then occupied to drag the behaviour of the system. However, if a single flawed entity can present multiple identities, it can control a massive proportion. All the resources utilized in the P2P infrastructure are contributed by the peers itself unless a traditional approaches where a central authority control is used. A peer gives illegal tributes will have its trust level minimised. In case it reaches a certain threshold level, the peer can be expelled from the group. Each peer has an identity, which is either honest or Sybil.

Keywords: P2P, trust, Sybil attack, collusion attack, neighbor similarity

Edition: Volume 4 Issue 3, March 2015,

Pages: 1374 - 1377

How to Download this Article?

Type Your Email Address below to Receive the Article PDF Link

Verification Code will appear in 2 Seconds ... Wait