P2P Network Trust Management Survey
Peer-to-peer applications (P2P) are no longer limited to home users, and start being accepted in academic and corporate environments. While file sharing and instant messaging applications are the most traditional examples, they are no longer the only ones benefiting from the potential advantages of...
Main Authors: | , , |
---|---|
Format: | Article |
Language: | English |
Published: |
Science and Research Branch,Islamic Azad University
2017-05-01
|
Series: | Journal of Advances in Computer Engineering and Technology |
Subjects: | |
Online Access: | http://jacet.srbiau.ac.ir/article_10214_3d60e87bbc7d9cd9303cf0ce33dede18.pdf |
id |
doaj-c373aea37c874a31a4d62cc976636bdf |
---|---|
record_format |
Article |
spelling |
doaj-c373aea37c874a31a4d62cc976636bdf2020-11-24T21:07:31ZengScience and Research Branch,Islamic Azad UniversityJournal of Advances in Computer Engineering and Technology2423-41922423-42062017-05-01328910610214P2P Network Trust Management SurveySeyed Hossein Ahmadpanah0Rozita Jamili Oskouei1Abdullah Jafari Chashmi2Department of Computer and Information Technology , Mahdishahr Branch , Islamic Azad University , Mahdishahr , IranDepartment of Computer and Information Technology, Mahdishahr Branch, Islamic Azad University, Mahdishahr, IRANDepartment of Electrical and Telecommunications Engineering Technology, Mahdishahr Branch, Islamic Azad University, Mahdishahr, IRANPeer-to-peer applications (P2P) are no longer limited to home users, and start being accepted in academic and corporate environments. While file sharing and instant messaging applications are the most traditional examples, they are no longer the only ones benefiting from the potential advantages of P2P networks. For example, network file storage, data transmission, distributed computing, and collaboration systems have also taken advantage of such networks.The reasons why this model of computing is attractive unfold in three. First, P2P networks are scalable, i.e., deal well (efficiently) with both small groups and with large groups of participants. In this paper, we will present a summary of the main safety aspects to be considered in P2P networks, highlighting its importance for the development of P2P applications and systems on the Internet and deployment of enterprise applications with more critical needs in terms of security. P2P systems are no longer limited to home users, and start being accepted in academic and corporate environments.http://jacet.srbiau.ac.ir/article_10214_3d60e87bbc7d9cd9303cf0ce33dede18.pdfPeer to Peer NetworkFile SharingNapsterBit TorrentTrust |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Seyed Hossein Ahmadpanah Rozita Jamili Oskouei Abdullah Jafari Chashmi |
spellingShingle |
Seyed Hossein Ahmadpanah Rozita Jamili Oskouei Abdullah Jafari Chashmi P2P Network Trust Management Survey Journal of Advances in Computer Engineering and Technology Peer to Peer Network File Sharing Napster Bit Torrent Trust |
author_facet |
Seyed Hossein Ahmadpanah Rozita Jamili Oskouei Abdullah Jafari Chashmi |
author_sort |
Seyed Hossein Ahmadpanah |
title |
P2P Network Trust Management Survey |
title_short |
P2P Network Trust Management Survey |
title_full |
P2P Network Trust Management Survey |
title_fullStr |
P2P Network Trust Management Survey |
title_full_unstemmed |
P2P Network Trust Management Survey |
title_sort |
p2p network trust management survey |
publisher |
Science and Research Branch,Islamic Azad University |
series |
Journal of Advances in Computer Engineering and Technology |
issn |
2423-4192 2423-4206 |
publishDate |
2017-05-01 |
description |
Peer-to-peer applications (P2P) are no longer limited to home users, and start being accepted in academic and corporate environments. While file sharing and instant messaging applications are the most traditional examples, they are no longer the only ones benefiting from the potential advantages of P2P networks. For example, network file storage, data transmission, distributed computing, and collaboration systems have also taken advantage of such networks.The reasons why this model of computing is attractive unfold in three. First, P2P networks are scalable, i.e., deal well (efficiently) with both small groups and with large groups of participants. In this paper, we will present a summary of the main safety aspects to be considered in P2P networks, highlighting its importance for the development of P2P applications and systems on the Internet and deployment of enterprise applications with more critical needs in terms of security. P2P systems are no longer limited to home users, and start being accepted in academic and corporate environments. |
topic |
Peer to Peer Network File Sharing Napster Bit Torrent Trust |
url |
http://jacet.srbiau.ac.ir/article_10214_3d60e87bbc7d9cd9303cf0ce33dede18.pdf |
work_keys_str_mv |
AT seyedhosseinahmadpanah p2pnetworktrustmanagementsurvey AT rozitajamilioskouei p2pnetworktrustmanagementsurvey AT abdullahjafarichashmi p2pnetworktrustmanagementsurvey |
_version_ |
1716762494205165568 |