A Study on Peer-to-Peer Allocation for File Sharing Systems
DOI:
https://doi.org/10.32628/CSEIT1952253Keywords:
Peer-to-Peer Content Distribution, File Sharing System, Social Networking, and Cloud Computing.Abstract
Many Internet renovate supplier (ISPs) have organize peer-to-peer (P2P) hoard in their system in order to decrease valuable inter-ISP transfer. Capable heading question is important to the in general presentation of peer-to-peer (P2P) file contribution systems. Come together aristocracy by their extensive soothe can significantly get better the good quality association of file hesitation. Clustering aristocracy by their corporeal nearness can also get better file enquiry recital. P2P rose to successful profitable system in the internet. It represent the best embodiment of the end to end quarrel, the regularly doubtful plan philosophy that guide the intend of the internet. A work of fiction P2P architecture is planned which attaches ratings to the uploaded text directly. These ratings then develop into as score constituent in its XML statement which has quite a few youngster basics for in twist classification. Eventually, we communicate possible attack on the secrecy of these system and provide examples of demanding attack and martial protector second-hand by the organization we elucidate.
References
- H. Schulze and K. Mochalski, “Internet Study 2008/2009,” 2009. [Online]. Available: http://www.ipoque.com/resources/internet-studies
- P. Eckersley, F. von Lohmann, and S. Schoen, “Packet forgery by ISPs: A report on the Comcast affair,” White paper, Nov. 2007.
- V. Aggarwal, A. Feldmann, and C. Scheideler, “Can ISPs and P2P systems co-operate for improved performance?” SIGCOMM Comput. Commun. Rev., vol. 37, no. 3, pp. 29–40, Jul. 2007.
- Peer-to-Peer Systems, (2001)” in Proc. International Conference on Distributed Systems Platforms (Middleware), pp. 329–350.
- D. Frey, A.-M. Kermarrec, M. Raynal, J. Stainer, (2013) "Trust-aware peer sampling: Performance and privacy tradeoffs", Theor. Comput. Sci., vol. 512, pp. 67-83.
- W. Galuba, K. Aberer, Z. Despotovic, W. Kellerer, (2010) "Leveraging social networks for increased bittorrent robustness", Proc. 7th IEEE Conf. Consumer Commun. Netw. Conf., pp. 159-163.
- R. Eidenbenz, T. Locher, R. Wattenhofer, “Hidden Communication in P2P Networks Steganographic Handshake and Broadcast,” Proc. of IEEE INFOCOM 2011, April 2011, pp. 954–962.
- S. Hand, T. Roscoe, “Mnemosyne: Peer-to-Peer Steganographic Storage”, Proc. of IPTPS 2002, LNCS 2429, pp. 130–140, 2002.
- R. Anderson, R. Needham, A. Shamir. “The Steganographic File System,” Proc. of International Workshop on Information Hiding, 1998.
- W. Mazurczyk, M. Smolarczyk, K. Szczypiorski, “Retransmission Steganography and Its Detection,” Soft Computing, Vol. 15, Issue 3, pp. 505–515, 2011.
Downloads
Published
Issue
Section
License
Copyright (c) IJSRCSEIT

This work is licensed under a Creative Commons Attribution 4.0 International License.