You are on page 1of 2

iii

ACKNOWLEDGEMENT
We owe a debt of gratitude to Mrs. K.L.Haritha , Asst. Professor, CSE, for her admirable guidance and inspiration both theoretically and practically and most importantly for the drive to complete seminar successfully. Working under such an eminent guide was our privilege. We would like to express our gratefulness to the Principal, Dr. Subhash Kulkarni, Ph. D for his cooperation and encouragement We express our sincere thanks to Mrs. D. Jamuna Professor & Head of the Department of Computer Science and Engineering, for her kind consideration Successfully. We are grateful to the Department of Computer Science and Engineering for providing us with the excellent lab and library facilities. We take immense pleasure in expressing our gratitude to UNISOFT TECHNOLOGIES , Hyd. who gave us the encouragement, enthusiasm and keen interest shown by them in our endeavor provided to be a morale booster for us. We thank our parents for their love, care and moral support without which we would have not been able to complete this project. It has been a constant source of inspiration for all our academic endeavours. PROJECT ASSOCIATES and encouragement in carrying out this seminar

iv

ABSTRACT
In P2P systems groups are typically formed to share resources and/or to carry on joint tasks. In distributed environments formed by a large number of peers conventional authentication techniques are inadequate for the group joining process, and more advanced ones are needed. In this work we propose a novel peer group joining protocol. We introduce a highly expressive resource negotiation language, able to support the specification of a large variety of conditions applying to single peers or groups of peers. Moreover, we define protocols to test such resource availability customized to the level of assurance required by the peers. Our results show the robustness of our approach in detecting malicious peers, detected both during the negotiation and during the peer group lifetime. Current P2P systems adopt peer authentication techniques based on namely login-password and PKI certificates. Groups are formed by state the conditions under which a new peer can join the group and the conditions that a joining peer wants to be satisfied to join the group. Trust negotiations allow two stranger parties wishing to exchange online resources to establish a mutual trust relationship. . Proposed system is established through an exchange of digital credentials. Our negotiation-based join protocols include algorithms for policies exchange and resource verification. peer has joined a group must be satisfied not only when the membership has been granted to such peer but for all the duration of the membership

You might also like