SORT
A Self Organizing Trust model for peer-to-peer
systems
4.4 Modules Description:
1.SORT service creation
2.Peers establishment
3.Files uploading, downloading
4.Recommendation metric
5.Trust metric
4.4.Modules Description:
SORT service creation:
There is no central server in most P2P
systems, peers organize themselves to store
and manage trust information about each
other .Management of trust information is
dependent to the structure of P2P network.
distributed hash table (DHT)- based
approaches, each peer becomes a trust
holder by storing feedbacks about other
peers .
Peers establishment:
Self-ORganizing Trust model (SORT) that
aims to decrease malicious activity in a P2P
system by establishing trust relations among
peers in their proximity. Peers do not try to
collect trust information from all peers. Each
peer develops its own local view of trust
about the peers interacted in the past. In
this way, good peers form dynamic trust
groups in their proximity and can isolate
malicious peers.
Files uploading, downloading:
peers are assumed to be strangers to each
other at the beginning. A peer becomes an
acquaintance of another peer after providing
a service, e.g., uploading a file. If a peer has
no acquaintance, it chooses to trust
strangers. An acquaintance is always
preferred over a stranger if they are equally
trustworthy. Using a service of a peer is an
interaction, which is evaluated based on
weight (importance) and recentness of the
interaction, and satisfaction of the requester.
Recommendation metric:
Recommendation is evaluated based on
recommender’s trustworthiness. It contains
the recommender’s own experience about the
peer, information collected from the
recommender’s acquaintances, and the
recommender’s level of confidence in the
recommendation. If the level of confidence is
low, the recommendation has a low value in
evaluation and affects less the
trustworthiness of the recommender.
Trust metric:
SORT defines three trust metrics. Reputation
metric is calculated based on
recommendations. It is important when
deciding about strangers and new
acquaintances. Reputation loses its
importance as experience with an
acquaintance increases. Service trust and
recommendation trust are primary metrics to
measure trustworthiness in the service and
recommendation contexts, respectively. The
service trust metric is used when selecting
service providers. The recommendation trust
metric is important when requesting
Unified Modeling LanguageUnified Modeling Language
Use Case Diagram
Sequence Diagram
Collaboration Diagram
State Chat Diagram
Activity Diagram
Component Diagram
Deployment Diagram
Class Diagram
DFD
Use Case DiagramUse Case Diagram
Observe Graph for
Recommendation & Trustmetric
Strore Peers Info
Upload info
Download info
Trust Metric
SORT
Recommendation
Pass node id
neighbour count
nodes creation
Upload files
Download File
Observe Strangers & Acruitances
SORT-Peer
1. Whatever to create the use cases converts as a objects in
sequence diagram.
2. Exchanges the messages from one object to another object
representation process.
3. User it can perform the operations like create the UML diagram,
draw the with some number of events to match the results with
consistency rules.
4. We are going to providing as a final sequence diagram
specification.
Sequence DiagramSequence Diagram
SORTSORT SORT PeerSORT Peer
Store Peer Info
Pass node Id
Neighbour count
Upload Files
Download File
Check Matrics
Graph Generation
1. We are represented like sequence number of information.
2. It can executes from bottom to top.
Collaboration DiagramCollaboration Diagram
SORT SORT
Peer
1: Store Peer Info
2: Pass node Id
3: Neighbour count
4: Upload Files
5: Download File
6: Check Matrics
7: Graph Generation
1. Transfer the information from one state to another state with
the help of user activities specification.
2. All system oriented activities we are going to place inside the
state chart diagram in between of initial state to final state
specification process.
3. System it can takes decision making for performing the events
of information.
State Chat DiagramState Chat Diagram
Pass peerid
Node count
Create Neighbour
node as Strangers
Upload Info
Download Info
Observe
Acquitances
Check Graph Recommendation
and Trustmetric
1. All user oriented activities we are place inside the activity
diagram representation.
2. We are going to all kinds of activities from starting to ending
state specification process.
3. It can contains complete activities of application.
Activity DiagramActivity Diagram
Create
Peer
Upload
Files
Download
Files
Check Recommedation
Values
observe
Graph
Class DiagramClass Diagram
Main
int id
Strat()
Peer Reciver
int pid
int ppt
run()
Peer Fram
pid
dsiplay neighbours()
Peerdetails
uplist
filelist
Component DiagramComponent Diagram
SORT-Peer
FI le I nfo
Node
Observe St rangers & Acruit ances
Deployment DiagramDeployment Diagram
SORT
Observer Graph
Pass node id
Neighbour count
Check Mat rics
Graph Generat ion
Upload Peer I nfo
Upload FI le
Context Level DFDContext Level DFD
SORT DFDSORT DFD
Peer DFDPeer DFD
Second review

Second review

  • 1.
    SORT A Self OrganizingTrust model for peer-to-peer systems
  • 2.
    4.4 Modules Description: 1.SORTservice creation 2.Peers establishment 3.Files uploading, downloading 4.Recommendation metric 5.Trust metric
  • 3.
    4.4.Modules Description: SORT servicecreation: There is no central server in most P2P systems, peers organize themselves to store and manage trust information about each other .Management of trust information is dependent to the structure of P2P network. distributed hash table (DHT)- based approaches, each peer becomes a trust holder by storing feedbacks about other peers .
  • 4.
    Peers establishment: Self-ORganizing Trustmodel (SORT) that aims to decrease malicious activity in a P2P system by establishing trust relations among peers in their proximity. Peers do not try to collect trust information from all peers. Each peer develops its own local view of trust about the peers interacted in the past. In this way, good peers form dynamic trust groups in their proximity and can isolate malicious peers.
  • 5.
    Files uploading, downloading: peersare assumed to be strangers to each other at the beginning. A peer becomes an acquaintance of another peer after providing a service, e.g., uploading a file. If a peer has no acquaintance, it chooses to trust strangers. An acquaintance is always preferred over a stranger if they are equally trustworthy. Using a service of a peer is an interaction, which is evaluated based on weight (importance) and recentness of the interaction, and satisfaction of the requester.
  • 6.
    Recommendation metric: Recommendation isevaluated based on recommender’s trustworthiness. It contains the recommender’s own experience about the peer, information collected from the recommender’s acquaintances, and the recommender’s level of confidence in the recommendation. If the level of confidence is low, the recommendation has a low value in evaluation and affects less the trustworthiness of the recommender.
  • 7.
    Trust metric: SORT definesthree trust metrics. Reputation metric is calculated based on recommendations. It is important when deciding about strangers and new acquaintances. Reputation loses its importance as experience with an acquaintance increases. Service trust and recommendation trust are primary metrics to measure trustworthiness in the service and recommendation contexts, respectively. The service trust metric is used when selecting service providers. The recommendation trust metric is important when requesting
  • 8.
    Unified Modeling LanguageUnifiedModeling Language Use Case Diagram Sequence Diagram Collaboration Diagram State Chat Diagram Activity Diagram Component Diagram Deployment Diagram Class Diagram DFD
  • 10.
    Use Case DiagramUseCase Diagram Observe Graph for Recommendation & Trustmetric Strore Peers Info Upload info Download info Trust Metric SORT Recommendation Pass node id neighbour count nodes creation Upload files Download File Observe Strangers & Acruitances SORT-Peer
  • 11.
    1. Whatever tocreate the use cases converts as a objects in sequence diagram. 2. Exchanges the messages from one object to another object representation process. 3. User it can perform the operations like create the UML diagram, draw the with some number of events to match the results with consistency rules. 4. We are going to providing as a final sequence diagram specification.
  • 12.
    Sequence DiagramSequence Diagram SORTSORTSORT PeerSORT Peer Store Peer Info Pass node Id Neighbour count Upload Files Download File Check Matrics Graph Generation
  • 13.
    1. We arerepresented like sequence number of information. 2. It can executes from bottom to top.
  • 14.
    Collaboration DiagramCollaboration Diagram SORTSORT Peer 1: Store Peer Info 2: Pass node Id 3: Neighbour count 4: Upload Files 5: Download File 6: Check Matrics 7: Graph Generation
  • 15.
    1. Transfer theinformation from one state to another state with the help of user activities specification. 2. All system oriented activities we are going to place inside the state chart diagram in between of initial state to final state specification process. 3. System it can takes decision making for performing the events of information.
  • 16.
    State Chat DiagramStateChat Diagram Pass peerid Node count Create Neighbour node as Strangers Upload Info Download Info Observe Acquitances Check Graph Recommendation and Trustmetric
  • 17.
    1. All useroriented activities we are place inside the activity diagram representation. 2. We are going to all kinds of activities from starting to ending state specification process. 3. It can contains complete activities of application.
  • 18.
  • 19.
    Class DiagramClass Diagram Main intid Strat() Peer Reciver int pid int ppt run() Peer Fram pid dsiplay neighbours() Peerdetails uplist filelist
  • 20.
    Component DiagramComponent Diagram SORT-Peer FIle I nfo Node Observe St rangers & Acruit ances
  • 21.
    Deployment DiagramDeployment Diagram SORT ObserverGraph Pass node id Neighbour count Check Mat rics Graph Generat ion Upload Peer I nfo Upload FI le
  • 22.
  • 23.
  • 24.