Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
E-Commerce
ABSTRACT
In this paper is based on networking to predict an trust to establish Peer to peer (P2P)
e-commerce Electronic commerce or ecommerce is a term for any type of business, or
commercial transaction, that involves the transfer of information across the Internet
applications exist at the edge of the Internet with vulnerabilities to passive and active
attacks. The attacks occur using interactions between the trading peers as a transaction
takes place. In this paper, we propose Sybil attack, an active attack, it means some
data is missing in transferring the data from one place to another place this is called
active attack. And passive attack means data is not missing in transferring the data
from one place to another place this is called passive attack. a central authority control
is used in existing system. In our proposed system two techniques we are using Sybil
trust central authority control and Homogeneous configuration. In our approach,
duplicated Sybil attack peers can be identified as the neighbor peers become
acquainted and hence more trusted to each other. Security and performance analysis
shows that Sybil attack can be minimized by our proposed neighbor similarity trust.
Each peer has an identity, which is either honest or Sybil.
EXISTING SYSTEM PROPOSED SYSTEM
EXISTING CONCEPT: - PROPOSED CONCEPT: -
In Existing system was concentrates on social In Proposed system are establish. In this paper,
networks and trusted certification, has not we focus on the active attacks in P2P e-
been able to prevent Sybil attack peers from commerce.
doing transactions
Our work exploits the neighbor similarity trust When a peer is compromised, all the
relationship to address Sybil attack restriction information will be extracted.
helps to bind the number of peers against any
additional attack among the neighbors.
EXISTING TECHNIQUE:- PROPOSED TECHNIQUE: -
Sybil Central Authority Computation cost.
Homogeneous Configuration.
TECHNIQUE DEFINITION: TECHNIQUE DEFINITION:-
Sybil attacks have appeared in many scenarios, In this paper, the principal building block of
with wide implications for security, safety and Sybil-trust approach is the identifier distribution
trust. process.
For example, an internet poll can be rigged In the approach, all the peers with similar
using multiple IP addresses to submit a large behavior in a group can be used as identifier
number of votes. source.
DRAWBACKS: ADVANTAGES:-
Data inconsistency to be unvested by network Time consumption is determined by the process
is not validating. of Sybil trust
Time interval was sustained by means of Ensure the peer connection to establish attack
misintersection process. detection.
APPLICATIONS
E-Commerce Web sites.
http://www.storehippo.com/.
HARDWARE REQUIREMENTS
Processor : Pentium iv 2.6 GHZ, Intel core 2 duo.
Ram : 512 mb ram
Monitor : 15” color
Hard disk : 40 GB
SOFTWARE REQUIREMENTS
Front End : JAVA (SWINGS)
Back End : MY SQL 5.5
Operating System : Windows 07
IDE : Eclipse
PROPOSED SYSTEM FUTURE ENCHANCEMENT