P2P Network Trust Management Survey

Peer-to-peer applications (P2P) are no longer limited to home users, and start being accepted in academic and corporate environments. While file sharing and instant messaging applications are the most traditional examples, they are no longer the only ones benefiting from the potential advantages of...

Full description

Bibliographic Details
Main Authors: Seyed Hossein Ahmadpanah, Rozita Jamili Oskouei, Abdullah Jafari Chashmi
Format: Article
Language:English
Published: Science and Research Branch,Islamic Azad University 2017-05-01
Series:Journal of Advances in Computer Engineering and Technology
Subjects:
Online Access:http://jacet.srbiau.ac.ir/article_10214_3d60e87bbc7d9cd9303cf0ce33dede18.pdf
Description
Summary:Peer-to-peer applications (P2P) are no longer limited to home users, and start being accepted in academic and corporate environments. While file sharing and instant messaging applications are the most traditional examples, they are no longer the only ones benefiting from the potential advantages of P2P networks. For example, network file storage, data transmission, distributed computing, and collaboration systems have also taken advantage of such networks.The reasons why this model of computing is attractive unfold in three. First, P2P networks are scalable, i.e., deal well (efficiently) with both small groups and with large groups of participants. In this paper, we will present a summary of the main safety aspects to be considered in P2P networks, highlighting its importance for the development of P2P applications and systems on the Internet and deployment of enterprise applications with more critical needs in terms of security. P2P systems are no longer limited to home users, and start being accepted in academic and corporate environments.
ISSN:2423-4192
2423-4206