International Journal of Computer Applications
The wide qualities of Peer-To-Peer (P2P) network have given to many advantages and threats for enhancement of distributed computing. The best way to reduce threats is adding a reputation-based globally trusted model. Many present trust models are failing to restrain effectively some behaviors like collusive attacks, but pay no heed towards the security of this mechanism. Off late, Peer-To-Peer (P2P) computing has become popular and well recognized in a wide range of applications, like file-sharing, digital content delivery, and P2P computing. But the fact remains that, peer anonymity and autonomy make P2P networks easy towards attacks by any peer who is not rust worthy.