S.Saranya, K.Kiruthika Devi
Peer to peer network is decentralized and distributed network, which is useful for file sharing via internet. Due to malicious activity, still it is insecure during file sharing. Depending on the past interaction and their recommendation, trustworthiness of a peer can be build. In order to measure the trustworthiness, two constraints are considered namely, services and recommendations. According to the recentness and peer satisfaction, both service and recommendations can be evaluated. While calculating these recommendations, we consider the trustworthiness of the recommender and confidence about a recommendation. Good peers can form the trust relationship by isolating the malicious peers. In this proposed model we provide cryptography provenance verification method for secure transmission of data and data auditing is performed for eliminate the malicious packets