An Identity-Based Security for Nodes in EAD File Replication in P2P Systems
نویسندگان
چکیده
An Efficient and Adaptive Decentralized (EAD) file replication algorithm achieves high query efficiency and high replica utilization. EAD enhances the utilization of file replicas by selecting query traffic hubs and frequent requesters as replica nodes, and dynamically adapting to non uniform and time-varying file popularity and node interest. EAD creates and deletes replicas in a decentralized self-adaptive manner while guarantees high replica utilization. But fails in security issues like In a P2P system where every node is identified by its unique ID. Some Malicious entities that can control ID assignment can probabilistically show themselves as the source of selected content or routing messages, and can therefore subvert the routing protocols, pollute the delivered content, or prevent placement of legitimate content. Hereby it is planned to use identity-based encryption to assist in the security in peer-to-peer systems by assigning an ID and providing the associated identity-based private key to each node. Keywords— Peer to Peer Systems, File Replication, File Sharing Systems, Identity based encryption.
منابع مشابه
GGRA: a grouped gossip-based reputation aggregation algorithm
An important issue in P2P networks is the existence of malicious nodes that decreases the performance of such networks. Reputation system in which nodes are ranked based on their behavior, is one of the proposed solutions to detect and isolate malicious (low ranked) nodes. Gossip Trust is an interesting previously proposed algorithm for reputation aggregation in P2P networks based on t...
متن کاملP2P Network Trust Management Survey
Peer-to-peer applications (P2P) are no longer limited to home users, and start being accepted in academic and corporate environments. While file sharing and instant messaging applications are the most traditional examples, they are no longer the only ones benefiting from the potential advantages of P2P networks. For example, network file storage, data transmission, distributed computing, and co...
متن کاملA Genetic Programming-based trust model for P2P Networks
Abstract— Peer-to-Peer ( P2P ) systems have been the center of attention in recent years due to their advantage . Since each node in such networks can act both as a service provider and as a client , they are subject to different attacks . Therefore it is vital to manage confidence for these vulnerable environments in order to eliminate unsafe peers . This paper investigates the use of genetic ...
متن کاملAn Efficient Data Replication Strategy in Large-Scale Data Grid Environments Based on Availability and Popularity
The data grid technology, which uses the scale of the Internet to solve storage limitation for the huge amount of data, has become one of the hot research topics. Recently, data replication strategies have been widely employed in distributed environment to copy frequently accessed data in suitable sites. The primary purposes are shortening distance of file transmission and achieving files from ...
متن کاملAdaptive File Replication Algorithm for Wireless Mesh Networks
Popular files could exhaust the capacity of the file owner node, leading to low efficiency in P2P file sharing systems. File replication is an effective method to deal with this problem by distributing load over replica nodes. Recently, numerous file replication methods have been proposed for P2P content delivery networks on the Internet. However, due to mobility and resource constraints in the...
متن کامل