CFP last date
22 April 2024
Reseach Article

Securing Information in Peer-to-Peer Environment

by Velvizhi N, D. Manjula
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 21 - Number 8
Year of Publication: 2011
Authors: Velvizhi N, D. Manjula
10.5120/2531-3448

Velvizhi N, D. Manjula . Securing Information in Peer-to-Peer Environment. International Journal of Computer Applications. 21, 8 ( May 2011), 30-34. DOI=10.5120/2531-3448

@article{ 10.5120/2531-3448,
author = { Velvizhi N, D. Manjula },
title = { Securing Information in Peer-to-Peer Environment },
journal = { International Journal of Computer Applications },
issue_date = { May 2011 },
volume = { 21 },
number = { 8 },
month = { May },
year = { 2011 },
issn = { 0975-8887 },
pages = { 30-34 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume21/number8/2531-3448/ },
doi = { 10.5120/2531-3448 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:07:57.747823+05:30
%A Velvizhi N
%A D. Manjula
%T Securing Information in Peer-to-Peer Environment
%J International Journal of Computer Applications
%@ 0975-8887
%V 21
%N 8
%P 30-34
%D 2011
%I Foundation of Computer Science (FCS), NY, USA
Abstract

As an emerging model of communication and computation, Peer-to-Peer(P2P) networking has recently gained significant acceptance in today’s internet computing, Suffers from the problem of securing information while transferring from one peer to other peer. In existing direct path was established between source and destination peer to secure the data. We analyzed the problem of security and constructing direct path between source and destination peer which led p2p systems might compromise user privacy. To overcome the above issue we proposed an algorithm to find out the optimal path among the existing paths, through which the information can be sent and received. To enhance the system performance by implementing security measures we compared two asymmetric cryptographic algorithm with our application model(ICRQR),which is decentralized and unstructured and proved that p2p reputation model is more secured and hence increases the system performance.

References
  1. Dhruv Chopra, Henning Schulzrinne, Enricomarocco, ”Peer-to-peer overlays for real time communication: Security issues and solutions”, IEEE Comm.Surveys and tutorials,Vol.11,No.1 2009.
  2. Jinyvan Su n, Chi Zhang, Yanchao Zhang, Yuguang Fang,”SAT:A Security Architecture Achieving Anonymity and Traceability in Wireless Mesh Networks” IEEE Trans.on dependable and secure computing vol8.No.2,March2011.
  3. Srdjan capkun, Jean-pierre hubaux, Levente Buttyan “ Mobility Helps peer – to – peer security “ IEEE Trans. On Mobile computing Vol 5, No1. Jan 2006
  4. Sascha Grau, Mathias Fischer, “On complexity and approximability of optimal Dos attacks on multiple – Tree p2p streaming Topologies “IEEE trans on dependable and secure computing, Vol.8, No.2 March 2011.
  5. Z.Chen, H.yin,C.Lin, Y.chen, M.Feng “Towards a universal friendly peer – to peer media streaming metrics, analysis and explorations” ,IET Comm. April 2009.
  6. Li Lu, Jinsong Han, Yunhao Liu, Lei Hu, “Pseudo Trust : Zero – knowledge authentication in anonymous p2p” , IEEE Trans on parallel and distributed Systems. Vol. 19, No.10, OCT 2008.
  7. Srdjan Capkun, Mario Cagalj, Ghassan O Kalame, “Integrity Regions: Authentication through presence in wireless networks” , IEEE Trans on mobile computing, Vol 9,No11. Nov 2010.
  8. Chun–Hsin, Chun-Wei Huang “A Collaborative network security plat form in p2p networks” Intel. Conf on new trends n infn and service science 2009.
  9. Yanchao zhang, Yuguang fang, “ A Fine grained reputation system for reliable service selection in peer- to – peer network’s” , IEEE Trans on parallel and distributed systems Vol 18, No.8, Aug 2007.Yunhao Liu,Li Xiao,Lionel M Ni,”Building a scalable Bipartite P2p overlay Network”IEEE Trans.on parallel and distributed systems,vol.18,No.9,Sep 2007.
  10. Prashant Dewan and Partha Dasgupta “p2p reputation management using distributed identities and decentralized recommendation chains”IEEE Trans. On Knowledge and Data Engg.Vol22,No.7,July2010.
  11. M.Brinkmeier, G.Schaefer,and T.Strufe, “Optimally Dos resistant P2P technologies for live multimedia streaming, “IEEE Trans. Parallel and Distributed systems”,Volume 20 , No.6, June 2009.
  12. Y.Zhang.W.Lio,W Lou and Y.Fang” Securing mobile Adhoc networks with certficateless public keys”, IEEE Trans. Dependable and secure computing Volume 3 , No.4, October 2006.
  13. R.H.Wouhaybi and A T Campbell, “ Building Resilient Low – Diameter Peer-to- Peer Topologies”, Computer networks, Volume 52 , No.5, 2008
  14. Xiaoliang wang, Xingming Sun, Guang Sun, “CST: P2P Anonymous authentication system based on collaboration signature” IEEE con.2010.
  15. Velvizhi N,D Manjula “ICRQR: Improving Computation Power by Reducing Query Response Time in P2P Environment”Journal of computer science,Vol.7,No.3,2011.
  16. R. Chen, X. Chao, L. Tang, J. Hu, Z. Chen, CuboidTrust: A Global Reputation-Based Trust Model in Peer-to-Peer Networks, in: Autonomic and Trusted Computing, No. 4610 in LNCS,4th International Conference, ATC 2007, Springer, Hong Kong, China, 2007, pp. 203–215.
  17. F. Yu, H. Zhang, F. Yan, S. Gao, An improved global trust value computing method in P2P system, in: Autonomic and Trusted Computing, No. 4158 in LNCS, Third International Conference,ATC 2006, Springer, Wuhan, China, 2006, pp. 258–267.
  18. Y. Wang, Y. Tao, P. Yu, F. Xu, J. Lu, A Trust Evolution Model for P2P Networks, in: Autonomic and Trusted Computing, No. 4610 in LNCS, 4th International Conference, ATC 2007,Springer, Hong Kong, China, 2007, pp. 216–225.
  19. Y. Zhang, H. Chen, Z. Wu, A social network-based trust model for the semantic web, in:Autonomic and Trusted Computing, No. 4158 in LNCS, Third International Conference, ATC2006, Springer, Wuhan, China, 2006, pp. 183–192.
Index Terms

Computer Science
Information Sciences

Keywords

Unstructured peer to peer Decentralized privacy asymmetric key cryptographic reputation