EigenTrust Algorithm for Reputation Management in P2P Networks full report
Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
seminar topics
Active In SP
**

Posts: 559
Joined: Mar 2010
#1
24-03-2010, 04:51 PM


The EigenTrust Algorithm for Reputation Management in P2P Networks

Presented By:
Sepandar D. Kamvar
Mario T. Schlosser
Hector Garcia-Molina


ABSTRACT
Peer-to-peer le-sharing networks are currently receiving much at- tention as a means of sharing and distributing information. How- ever, as recent experience shows, the anonymous, open nature of these networks offers an almost ideal environment for the spread of self-replicating inauthentic les. We describe an algorithm to decrease the number of downloads of inauthentic les in a peer-to-peer le-sharing network that as- signs each peer a unique global trust value, based on the peerâ„¢s history of uploads. We present a distributed and secure method to compute global trust values, based on Power iteration. By having peers use these global trust values to choose the peers from whom they download, the network effectively identies malicious peers and isolates them from the network. In simulations, this reputation system, called EigenTrust, has been shown to signicantly decrease the number of inauthentic les on the network, even under a variety of conditions where malicious peers cooperate in an attempt to deliberately subvert the system.


read report and presentation
kamvarassets/papers/eigentrust.pdf
cs.ucsb.edu/~gayatri/Presentations/EIGENTRUST.ppt
stanford.edu/~sdkamvar/talks/EigenTrust.ppt
Use Search at http://topicideas.net/search.php wisely To Get Information About Project Topic and Seminar ideas with report/source code along pdf and ppt presenaion
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page

Quick Reply
Message
Type your reply to this message here.


Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  Database management concepts seminar tips 9 3,780 23-07-2016, 02:17 PM
Last Post: Dhanabhagya
  web spoofing full report computer science technology 13 8,923 20-05-2016, 11:59 AM
Last Post: Dhanabhagya
  Cut Detection in Wireless Sensor Networks pdf project girl 2 1,237 16-07-2015, 09:21 PM
Last Post: Guest
  crime file management system er diagram jaseelati 0 424 17-01-2015, 04:35 PM
Last Post: jaseelati
  computational intelligence in wireless sensor networks ppt jaseelati 0 355 10-01-2015, 03:10 PM
Last Post: jaseelati
  A Character Segmentation Algorithm for Printed Kannada Text Document uploader 1 1,494 10-01-2015, 12:52 PM
Last Post: zcfqmbrtb
  cyber cafe management system ppt jaseelati 0 284 07-01-2015, 01:31 PM
Last Post: jaseelati
  online crime management system jaseelati 0 245 30-12-2014, 01:46 PM
Last Post: jaseelati
  crime file management system ppt jaseelati 0 213 27-12-2014, 01:17 PM
Last Post: jaseelati
  android full report computer science technology 57 73,127 24-09-2014, 05:05 PM
Last Post: Michaelnof