Enhancing Security and Response Time for Secure Search in Unstructured Peer to Peer NetworkJournal: International Journal of Science and Research (IJSR) (Vol.2, No. 3)
Publication Date: 2013-03-05
Authors : A. Suganya; P. Laura Juliet;
Page : 48-51
Keywords : peer to peer network; distributed hash table; transport layer security; secure socket layer;
In a peer-to-peer (P2P) network, every machine plays the role of client and server at the same time. Peer to peer networks can be categorized into structured and unstructured peer to peer networks. In structured networks, the peer or system which start to search a file into other peers by establishing paths (i. e. the source system knows where the searching happen are). The unstructured P2P networks do not have a well-known architecture. In unstructured networks, there is no relationship between the source with other peers except neighbor peer and its location. Our proposed work is to search a file in structured and unstructured peer to peer network with authenticity, integrity, and non-reputation.
Other Latest Articles
Last modified: 2021-06-30 20:14:29