An Identity-Based Security for Nodes in EAD File Replication in P2P Systems
Journal: INTERNATIONAL JOURNAL OF COMPUTERS & DISTRIBUTED SYSTEMS (Vol.1, No. 3)Publication Date: 2012-10-15
Authors : Praveenkumar Bhuvaneswaran;
Page : 88-95
Keywords : Peer to Peer Systems; File Replication; File Sharing Systems; Identity based encryption.;
Abstract
An Efficient and Adaptive Decentralized (EAD) file replication algorithm achieves high query efficiency and high replica utilization. EAD enhances the utilization of file replicas by selecting query traffic hubs and frequent requesters as replica nodes, and dynamically adapting to non uniform and time-varying file popularity and node interest. EAD creates and deletes replicas in a decentralized self-adaptive manner while guarantees high replica utilization. But fails in security issues like In a P2P system where every node is identified by its unique ID. Some Malicious entities that can control ID assignment can probabilistically show themselves as the source of selected content or routing messages, and can therefore subvert the routing protocols, pollute the delivered content, or prevent placement of legitimate content. Hereby it is planned to use identity-based encryption to assist in the security in peer-to-peer systems by assigning an ID and providing the associated identity-based private key to each node.
Other Latest Articles
- GSLDA- BASED FACE DETECTION
- Implementation of Anomaly based Intrusion Detection and Prevention system using Zero Knowledge Protocol In Wireless Sensor Network
- Software Code Clone Detection Model
- CLOUD COMPUTING ENVIRONMENT: PROBLEMS IN IMPLEMENTATION
- Distributed Warehouses:A review on design methods and recent trends
Last modified: 2016-07-02 19:35:59