Open Access Open Access  Restricted Access Subscription Access
Open Access Open Access Open Access  Restricted Access Restricted Access Subscription Access

Managing Trust and Detecting the Guilty Party in P2P Networks


Affiliations
1 P.S.R. Rengasamy College of Engineering for Women, Sivakasi, India
     

   Subscribe/Renew Journal


Our Enhanced system increases the security in data transfer and identifying the intruder in that communication. Due to the lack of secure routing protocols for unstructured overlays we have started to investigate a possible solution for these systems. Through analytical study and experimental results we demonstrate the secure routing protocols potential in providing a secure topology management service for a broad range of node classes and communication capabilities. We show that it is possible to combine security, scalability and adaptability in one mechanism allowing each node to achieve an adequate level of security to meet the overall system requirements. A data distributor has given sensitive data to a set of supposedly trusted agents (third parties). Some of the data are leaked and found in an unauthorized place. We propose data allocation strategies (across the agents) that improve the probability of identifying leakages. In some cases, we can also inject “realistic but fake” data records to further improve our chances of detecting leakage and identifying the guilty party.

Keywords

Distributed Hash Table, Routing Protocols, Secure Routing, Unstructured P2P.
User
Subscription Login to verify subscription
Notifications
Font Size

Abstract Views: 250

PDF Views: 3




  • Managing Trust and Detecting the Guilty Party in P2P Networks

Abstract Views: 250  |  PDF Views: 3

Authors

G. Nandhini
P.S.R. Rengasamy College of Engineering for Women, Sivakasi, India
T. Kaleeswari
P.S.R. Rengasamy College of Engineering for Women, Sivakasi, India
J. Brundha
P.S.R. Rengasamy College of Engineering for Women, Sivakasi, India
G. MuthuKumar
P.S.R. Rengasamy College of Engineering for Women, Sivakasi, India

Abstract


Our Enhanced system increases the security in data transfer and identifying the intruder in that communication. Due to the lack of secure routing protocols for unstructured overlays we have started to investigate a possible solution for these systems. Through analytical study and experimental results we demonstrate the secure routing protocols potential in providing a secure topology management service for a broad range of node classes and communication capabilities. We show that it is possible to combine security, scalability and adaptability in one mechanism allowing each node to achieve an adequate level of security to meet the overall system requirements. A data distributor has given sensitive data to a set of supposedly trusted agents (third parties). Some of the data are leaked and found in an unauthorized place. We propose data allocation strategies (across the agents) that improve the probability of identifying leakages. In some cases, we can also inject “realistic but fake” data records to further improve our chances of detecting leakage and identifying the guilty party.

Keywords


Distributed Hash Table, Routing Protocols, Secure Routing, Unstructured P2P.