Collective Compress Support for Confidential Improvement on P2P Communications

Authors

  • A. David Praveen  U.G. Scholar, Department of CSE, Alpha College of Engineering, Chennai, Tamil Nadu, India
  • K. Dinesh Kumar  U.G. Scholar, Department of CSE, Alpha College of Engineering, Chennai, Tamil Nadu, India
  • M. Durai  U.G. Scholar, Department of CSE, Alpha College of Engineering, Chennai, Tamil Nadu, India
  • A. Mary  Assistant Professor, Department of CSE, Alpha College of Engineering, Chennai, Tamil Nadu, India

Keywords:

BPO, Peer-to-peer network, P2P mode

Abstract

The system is effectively used in out sourcing service (BPO), Network in LAN connection. Data consists of text, documents, image are transmitted through network, which increases the packet transmission that led to increases the traffic. The traffic is nothing but increasing the packet information that information should be analysis and displays it graphically. It is a network based project and it reduces the network traffic which transfer the speed.1)Peer-to-peer network describes a typical complex network upon which users connect together according to their sharing preference, indicated by the resources they shared. In this article, we apply analytic methods from complex networks theory to investigate the sharing preference of users as well as the correlations between different resource categories in a real peer-to-peer file sharing system, which is helpful for getting more insight into rapid development of peer-to-peer network applications. More recently, network coding based schemes have been proposed to improve the efficiency of transmission schemes. However, such schemes rely on prompt and accurate feedback to maximize its efficiency. Under the assumption that the receivers have already received subsets of the packets and the knowledge of the received and lost packets at each user is available at the source, an instantly decodable network coding scheme aiming at minimizing the mean completion delay was proposed. Network coding was also shown to be helpful for sending layered multimedia data to a set of receivers at different rate, as well as for spreading correlated data in dynamic networks. Peers do not try to collect trust information from all peers. Each peer develops its own local view of trust about the peers interacted in the past. In this way, good Peers form dynamic trust groups in their proximity and can isolate malicious peers. In SORT, peers are assumed to be strangers to each other at the beginning. A peer becomes an acquaintance of another peer after providing a service, e.g., uploading a file. If a peer has no acquaintance, it chooses to trust strangers. SORT defines three trust metrics. Reputation metric is calculated based on recommendations. It is important when deciding about strangers and new acquaintances. Reputation loses its importance as experience with an acquaintance increases. Service trust and recommendation trust are primary metrics to measure trustworthiness in the service and recommendation contexts, respectively. The service trust metric is used when selecting service providers. The recommendation trust metric is important when requesting recommendations.

References

  1. J. Paakko nen, C. Hollanti and O. Tirkkonen, "Device-to-device data storage for mobile cellular systems," in Proc. IEEE Globe communication Workshops, pp. 671-676, Dec. 2013.
  2. E. Bastug, M. Bennis and M. Debbah,"Living on the edge: The role of proactive caching in 5g wireless networks," IEEE Communication. Mag., vol.52, no. 8, pp. 82-89, Aug. 2014.
  3. L. Wang, H. Wu, and Z. Han, " Wireless distributed storage in socially enabled d2d communications," IEEE Access, vol. PP, no. 99, pp. 1-1 2016.
  4. A. D. Wyner, "The wire-tap channel," Bell System Technical Journal, vol. 54, no. 8, pp. 1355-1387, Oct. 1975.
  5. L. Wang, H. Wu, L. Liu, M. Song, and Y. Cheng, "Secrecy-oriented partner selection based on social trust in device-to-device communications," in Proc. IEEE ICC, London, UK, June 8-12, 2015.
  6. X. Chen, B. Proulx, X. Gong, and J. Zhang, "Exploiting social ties for cooperative D2D communications: a mobile social networking case," IEEE/ACM Transactions on Networking, vol. 23, no. 5, pp. 1471-1484, Jun. 2014.
  7. S. Bashar, Z. Ding, and C. Xiao, "On secrecy rate analysis of MIMO wiretap channels driven by finite-alphabet input," IEEE Transactions on Communications, vol. 60, no. 12, pp. 3816-3825, Dec. 2012.
  8. L. Wang, S. Bashar, Y. Wei, and R. Li, "Secrecy enhancement analysis against unknown eaves dropper in spatial modulation, " IEEE Communications Letters, vol. 19, no. 8, pp. 1351-1354, Nov. 2015.
  9. J. Yue, C. Ma, H. Yu, and W. Zhou, "Secrecy-based access control for device-to-device communication under-laying cellular networks," IEEE Communications Letters, vol. 17, no. 11, pp. 2068-2071, Nov. 2013.
  10. R. K. Sharma and D. B. Rawat, "Advances on security threats and countermeasures for cognitive radio networks: a survey," IEEE Communications Surveys & Tutorials, vol. 17, no. 2, pp. 1023-1043, May 2015.
  11. Z. Chu, K. Cumanan, Z. Ding, M. Johnston, and S. L. Goff, "Secrecy rate optimizations for a MIMO secrecy channel with a cooperative jammer," IEEE Transactions on Vehicular Technology, vol. 64, no. 5, pp. 1833-1847, May. 2015.
  12. R. Zhang, L. Song, Z. Han, and B. Jiao, "Physical layer security for two-way un-trusted relaying with friendly jammers," IEEE Transactions on Vehicular Technology, vol. 61, no. 8, pp. 3693-3704, Oct. 2012.
  13. A. Mukherjee, S. A. A. Fakoorian, J. Huang, and A. L. Swindlehurst, "Principles of physical layer security in multiuser wireless networks: a survey," IEEE Communications Surveys & Tutorials, vol. 16, no. 3, pp.1550-1573, Aug. 2014.
  14. W. Trappe, "The challenges facing physical layer security," IEEE Communications Magazine, vol. 53, no. 6, pp. 16-20, Jun. 2015.
  15. L. Wang, H. Tang, and M. C ierny, "Device-to-Device link policy based on social interaction information," IEEE Transactions on Vehicular Technology, vol. 64, no. 9, pp4180- 4186, Sep. 2015.

Downloads

Published

2018-02-28

Issue

Section

Research Articles

How to Cite

[1]
A. David Praveen, K. Dinesh Kumar, M. Durai, A. Mary, " Collective Compress Support for Confidential Improvement on P2P Communications, IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 3, Issue 1, pp.1632-1636, January-February-2018.