P2P Network Trust Management Survey

Peer-to-peer applications (P2P) are no longer limited to home users, and start being accepted in academic and corporate environments. While file sharing and instant messaging applications are the most traditional examples, they are no longer the only ones benefiting from the potential advantages of...

Full description

Bibliographic Details
Main Authors: Seyed Hossein Ahmadpanah, Rozita Jamili Oskouei, Abdullah Jafari Chashmi
Format: Article
Language:English
Published: Science and Research Branch,Islamic Azad University 2017-05-01
Series:Journal of Advances in Computer Engineering and Technology
Subjects:
Online Access:http://jacet.srbiau.ac.ir/article_10214_3d60e87bbc7d9cd9303cf0ce33dede18.pdf
id doaj-c373aea37c874a31a4d62cc976636bdf
record_format Article
spelling doaj-c373aea37c874a31a4d62cc976636bdf2020-11-24T21:07:31ZengScience and Research Branch,Islamic Azad UniversityJournal of Advances in Computer Engineering and Technology2423-41922423-42062017-05-01328910610214P2P Network Trust Management SurveySeyed Hossein Ahmadpanah0Rozita Jamili Oskouei1Abdullah Jafari Chashmi2Department of Computer and Information Technology , Mahdishahr Branch , Islamic Azad University , Mahdishahr , IranDepartment of Computer and Information Technology, Mahdishahr Branch, Islamic Azad University, Mahdishahr, IRANDepartment of Electrical and Telecommunications Engineering Technology, Mahdishahr Branch, Islamic Azad University, Mahdishahr, IRANPeer-to-peer applications (P2P) are no longer limited to home users, and start being accepted in academic and corporate environments. While file sharing and instant messaging applications are the most traditional examples, they are no longer the only ones benefiting from the potential advantages of P2P networks. For example, network file storage, data transmission, distributed computing, and collaboration systems have also taken advantage of such networks.The reasons why this model of computing is attractive unfold in three. First, P2P networks are scalable, i.e., deal well (efficiently) with both small groups and with large groups of participants. In this paper, we will present a summary of the main safety aspects to be considered in P2P networks, highlighting its importance for the development of P2P applications and systems on the Internet and deployment of enterprise applications with more critical needs in terms of security. P2P systems are no longer limited to home users, and start being accepted in academic and corporate environments.http://jacet.srbiau.ac.ir/article_10214_3d60e87bbc7d9cd9303cf0ce33dede18.pdfPeer to Peer NetworkFile SharingNapsterBit TorrentTrust
collection DOAJ
language English
format Article
sources DOAJ
author Seyed Hossein Ahmadpanah
Rozita Jamili Oskouei
Abdullah Jafari Chashmi
spellingShingle Seyed Hossein Ahmadpanah
Rozita Jamili Oskouei
Abdullah Jafari Chashmi
P2P Network Trust Management Survey
Journal of Advances in Computer Engineering and Technology
Peer to Peer Network
File Sharing
Napster
Bit Torrent
Trust
author_facet Seyed Hossein Ahmadpanah
Rozita Jamili Oskouei
Abdullah Jafari Chashmi
author_sort Seyed Hossein Ahmadpanah
title P2P Network Trust Management Survey
title_short P2P Network Trust Management Survey
title_full P2P Network Trust Management Survey
title_fullStr P2P Network Trust Management Survey
title_full_unstemmed P2P Network Trust Management Survey
title_sort p2p network trust management survey
publisher Science and Research Branch,Islamic Azad University
series Journal of Advances in Computer Engineering and Technology
issn 2423-4192
2423-4206
publishDate 2017-05-01
description Peer-to-peer applications (P2P) are no longer limited to home users, and start being accepted in academic and corporate environments. While file sharing and instant messaging applications are the most traditional examples, they are no longer the only ones benefiting from the potential advantages of P2P networks. For example, network file storage, data transmission, distributed computing, and collaboration systems have also taken advantage of such networks.The reasons why this model of computing is attractive unfold in three. First, P2P networks are scalable, i.e., deal well (efficiently) with both small groups and with large groups of participants. In this paper, we will present a summary of the main safety aspects to be considered in P2P networks, highlighting its importance for the development of P2P applications and systems on the Internet and deployment of enterprise applications with more critical needs in terms of security. P2P systems are no longer limited to home users, and start being accepted in academic and corporate environments.
topic Peer to Peer Network
File Sharing
Napster
Bit Torrent
Trust
url http://jacet.srbiau.ac.ir/article_10214_3d60e87bbc7d9cd9303cf0ce33dede18.pdf
work_keys_str_mv AT seyedhosseinahmadpanah p2pnetworktrustmanagementsurvey
AT rozitajamilioskouei p2pnetworktrustmanagementsurvey
AT abdullahjafarichashmi p2pnetworktrustmanagementsurvey
_version_ 1716762494205165568