Peer to Peer (P2P) Social Networks: An Improvement on Availability in a Trusted Way
نویسندگان
چکیده
Online Social Networks (OSNs) provide the easiest way to stay connected to the people dear and important to us. People are using social networking sites for sending messages, sharing files and expressing their thoughts to others. Popular social networking sites like Facebook, MySpace are web based. Users register with their services and agree to provide their private data to the OSN providers. OSN providers use centralized server. User data can be shared and updated easily in this fashion. But OSN providers give users a limited control over their data. Social networking sites actually contain huge amount of personal data which is a great source for learning the habits of consumers and can be used for commercial benefits. As the social networking sites are centralized, they also exhibit scalability and connectivity problems. So, the new generation social networks need to be distributed, free from third party and users will have full control over their data. Peer to Peer (P2P) infrastructure has become really important for designing distributed social networks. The features of a P2P based system are: P2P scales so well, locality of peers can be taken into account and social networking can be done without any internet connectivity in some mobile devices, people will have full control over their content. So, P2P based social networks can be our new generation of social networks with high degree of privacy and scalability. But the dimension shift from the centralized paradigm to a P2P paradigm makes the whole system really challenging. How the information will be stored, shared and cached in secured way are the major challenges of a P2P based social network. Existing P2P based social networks use friend peers as a trusted medium for caching other user data to improve the availability. In this research, we propose a new idea for caching data in non-friend trusted peers in a secured way. We will show system architecture for implementing this idea, protocols and algorithms for this technique which can be used by any existing P2P based social network for improving availability.
منابع مشابه
A Novel Caching Strategy in Video-on-Demand (VoD) Peer-to-Peer (P2P) Networks Based on Complex Network Theory
The popularity of video-on-demand (VoD) streaming has grown dramatically over the World Wide Web. Most users in VoD P2P networks have to wait a long time in order to access their requesting videos. Therefore, reducing waiting time to access videos is the main challenge for VoD P2P networks. In this paper, we propose a novel algorithm for caching video based on peers' priority and video's popula...
متن کاملA Novel Caching Strategy in Video-on-Demand (VoD) Peer-to-Peer (P2P) Networks Based on Complex Network Theory
The popularity of video-on-demand (VoD) streaming has grown dramatically over the World Wide Web. Most users in VoD P2P networks have to wait a long time in order to access their requesting videos. Therefore, reducing waiting time to access videos is the main challenge for VoD P2P networks. In this paper, we propose a novel algorithm for caching video based on peers' priority and video's popula...
متن کاملA Genetic Programming-based trust model for P2P Networks
Abstract— Peer-to-Peer ( P2P ) systems have been the center of attention in recent years due to their advantage . Since each node in such networks can act both as a service provider and as a client , they are subject to different attacks . Therefore it is vital to manage confidence for these vulnerable environments in order to eliminate unsafe peers . This paper investigates the use of genetic ...
متن کاملP2P Network Trust Management Survey
Peer-to-peer applications (P2P) are no longer limited to home users, and start being accepted in academic and corporate environments. While file sharing and instant messaging applications are the most traditional examples, they are no longer the only ones benefiting from the potential advantages of P2P networks. For example, network file storage, data transmission, distributed computing, and co...
متن کاملSecuring Peer-to-Peer Networks Using Trusted Computing
It seems likely that TCG-compliant computing platforms will become widespread over the next few years. Once one accepts that the Trusted Computing paradigm offers an interesting and powerful set of security features, the natural question arises: for what purposes can this technology be exploited? In this chapter, we examine the application of Trusted Computing to securing Peer-to-Peer (P2P) net...
متن کامل