IJSTR

International Journal of Scientific & Technology Research

IJSTR@Facebook IJSTR@Twitter IJSTR@Linkedin
Home About Us Scope Editorial Board Blog/Latest News Contact Us
CALL FOR PAPERS
AUTHORS
DOWNLOADS
CONTACT
QR CODE
IJSTR-QR Code

IJSTR >> Volume 2- Issue 6, June 2013 Edition



International Journal of Scientific & Technology Research  
International Journal of Scientific & Technology Research

Website: http://www.ijstr.org

ISSN 2277-8616



Self Certification Based BloomCast File Retrieval In Unstructured P2P Networks

[Full Text]

 

AUTHOR(S)

Nanitha Mathew, V.Gowri

 

KEYWORDS

Index Terms: BloomCast, File Searching, P2P, Self Certification

 

ABSTRACT

Abstract: Peer-to-peer (P2P) networks are exposed to peers who fake, advertise malign code, or peers who won’t contribute. The classic security techniques like client-server networks are not enough for Peer-to-Peer networks because of its centralized nature. BloomCast is a full-text revival scheme which is used in unstructured P2P networks. It duplicates Bloom Filters rather than duplicating the documents among the network. BloomCast greatly minimizes the communication cost needed for duplication. But the main disadvantage is that it is vulnerable to malicious peers. In the proposed method self certification technique is used. Self-certification removes the need of a centralized system for sending the identities. The Self Certification mechanism helps to identify the malicious content and makes the search more effective.

 

REFERENCES

[1] Hanhua Chen, Hai Jin Senior, Xucheng Luo, Yunhao Liu, Tao Gu, Kaiji Chen, and Lionel M. Ni (2012) ‘BloomCast: Efficient and Effective Full-Text Retrieval in Unstructured P2P Networks’ IEEE transactions on parallel and distributed systems,Vol. 23 No. 2

[2] Andrei Broder and Michael Mitzenmacher ‘Network applications of bloomfilter: A survey’ Internet Mathematics Vol. 1 No. 4 pp. 485-509

[3] Arulkumar C V, Jeyakumar K, Malarmathi M. and Shanmugapriya.T. (2012) ‘secure communication in unstructured P2P networks based on reputation management and self certification’ International Journal of Computer Applications Vol. 44 No.15

[4] Prashant Dewan and Partha Dasgupta (2010) ‘P2P reputation management using distributed identities and Decentralized recommendation chains’ IEEE transactions on knowledge and data engineering, Vol. 22 NO. 21

[5] Rania Salah El-Sayed and Mohammad Ali Gomaa (2008) ‘An Efficient Signature System using Optimized RSA Algorithm’ IJCSNS International Journal of Computer Science and Network Security, Vol. .8 No.12.