ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

Enhancing Security and Response Time for Secure Search in Unstructured Peer to Peer Network

Journal: International Journal of Science and Research (IJSR) (Vol.2, No. 3)

Publication Date:

Authors : ; ;

Page : 48-51

Keywords : peer to peer network; distributed hash table; transport layer security; secure socket layer;

Source : Downloadexternal Find it from : Google Scholarexternal

Abstract

In a peer-to-peer (P2P) network, every machine plays the role of client and server at the same time. Peer to peer networks can be categorized into structured and unstructured peer to peer networks. In structured networks, the peer or system which start to search a file into other peers by establishing paths (i. e. the source system knows where the searching happen are). The unstructured P2P networks do not have a well-known architecture. In unstructured networks, there is no relationship between the source with other peers except neighbor peer and its location. Our proposed work is to search a file in structured and unstructured peer to peer network with authenticity, integrity, and non-reputation.

Last modified: 2021-06-30 20:14:29