Open Access Open Access  Restricted Access Subscription or Fee Access

A Study on Sharing Encrypted Information in P2P Network

K. Swathi, G. Satyavathy

Abstract


In this paper, an encryption technique is proposed based on the general idea that offers efficiency in uploading and downloading a file or data in an encrypted form between peers. The proposed method, introduces a theoretical come practical model that forecasts the act of the system and computes the values of the practical parameters that achieve a desired performance. The proposed method provides very strong security for cooperation and also improves the presentation of P2P networks considerably. In particular, theoretical and realistic models show that it reduces the query response time and file upload and download delays by organizing the magnitude, and doubles the system’s throughput. y:"TimeBt wR C�9mso-bidi-theme-font:minor-bidi;}

A Cloud Computing is the recent trend in IT, where computing and data storage is done in data centers rather than portable Personal Computers. Cloud security is the current discussion in the IT world. In cloud the data is transferred among the server and the client. The cloud moves the application software and database to large data centers, where the management of data and services may not be fully trustworthy. This paper contains the secured data storage and retrieval in cloud using a Triple DES algorithm. Cloud storage enables users to remotely store their data and enjoy the on-demand high quality cloud applications without the burden of local hardware and software management.

Social Networks on other hand is the important aspect of IT industry. There are many social network sites which allow the users to post comments on other users’ profiles and pages. However, a number of social networking sites allow users to include multimedia content like photo/image, video etc, as part of these comments. The study encloses the attacking vector of two popular social networking Web sites, Flicker and LinkedIn. Specifically, it demonstrates three attacks in social network—the Social-DDoS attack, the Man-in-Middle attack, and Password-Based attack. The research defines the above attacks and accommodates the prevention techniques to mentioned flaws in social network.

The paper ‘Security in Cloud Computing and Social Networks’ explores the problems in cloud computing and attacks in social network with solutions for secured data storage in cloud and attack free networking sites.

eg$�ad C 9specific plans tailored for each domain and exposure area in a holistic manner. Key focus areas should include governance, risk and compliance, users (identity assurance regardless of location or device type), data (sensitive data protection no matter where it resides), applications (application security modernization), infrastructure (securing the “borderless” enterprise including cloud computing) and assets (cyber supply chain). The challenge is far broader than simply addressing one issue such as securing mobile devices or securing cloud computing environments, so by ensuring the Cyber Security strategy addresses all of these inter-related trends, business leaders can be confident of a defense-in-depth approach.

 

For businesses and governments alike, getting the Cyber Security posture right across all its elements will be vital for future growth, innovation and competitive advantage in order to truly exploit the business and economic opportunities provided by technologies such as cloud, mobile and social computing as well as smart computing and IT appliances. A Cyber Security-related mis-step in any of these rapidly emerging areas can lead to lost productivity and potentially serious damage to brand reputation. There is no single answer for success, but by working across public- and private sector partnerships and by advancing security measures particularly with regard to mission-critical systems, processes and applications that are connected into cyberspace, businesses will be able to work towards a future environment that is both open and secure and prosperous.

Keywords


Encryption, P2P Networks, Throughput, Response Time.

Full Text:

PDF

References


Rowstron A. & P. Druschel. (2001) Pastry: Scalable, distributed object location and routing for large-scale P2P systems. IFIP/ACM International Conference on Distributed Systems Platforms, Heidelberg, Germany.

N. Naoumov and K. W. Ross, Exploiting P2p Systems for DDoS Attacks, International Workshop on Peer-to-Peer Information Management (keynote address), Hong Kong, 2006.

Ville Lukkari “Security issues in P2P networks regarding person to person communication” TKK T-110.5190 Seminar on Internetworking 2006-05-4/5.

C.Tang, R. Chen, Z. Cai, A. Xie, Jianbin Hu, Liyong Tang Z. Chen SKIP: A Secure Key Issuing Scheme for P2P Networks in 2009 Fifth International Conference on Networking and Services.

Sedat Akleylek, Levent Emmungil, Urfat Nuriyev “A Modified Algorithm For Peer to Peer Security” published in Appl. Comput. Math. 6 (2007), no.2, pp.258-264.

R. Chen, W. Guo, L. Tang, J. Hu, and Z. Chen, Scalable Byzantine Fault Tolerant public key authentication for peer-to peer networks, in Euro- Par, 2008.

P. Maymounkov and D. Mazi`eres, Kademlia: A peer- to- peer information system based on the xor metric, in IPTPS, 2002, pp. 53–65.

J. Liang, R. Kumar, Y. Xi, K.W. Ross. Pollution in P2P File Sharing Systems, IEEE INFOCOM 2005, Miami, March 2005.

L. Xiong and L. Liu, “PeerTrust: Supporting Reputation- Based Trust in Peer-to-Peer Communities,” IEEE Trans. Knowledge and Data Eng., vol. 16, no. 7, pp. 843-857, July 2004.

Prashant Dewan and Partha Dasgupta,” P2P reputation Exchange Protocol Using Distributed and Decentralized Recommandation Chains, IEEE Transaction on Knowledge and Data Engineering vol 22, No.7, July 2010.

Pankaj R.Patil and D.R. Patil,”Distributed private key for P2P network message security”.

J. Risson, T. Moors. "Survey of Research Towards Robust Peer-to-Peer Networks: Search Methods." Technical Report, University of New South Wales, Sydney, Australia. 2004.

L. Zhou, L. Zhang, F. McSherry, N. Immorlica, M. Costa, and S. Chien, A First Look at Peerto-Peer Worms: Threats and Defenses, 4th International Workshop on Peer-To- Peer Systems (IPTPS'05), Ithaca, NY, 2005.

R.Zhou, K.Hwang, and M. Cai, “ Gossiptrust for Fast reputation Aggregation in Peer-to-Peer” IEEE Trans. Knowledge and Data Eng.,vol.20,no. 9, pp. 1282-1295, Aug. 2008.

L.Xiong and L. Liu, “PeerTrust: Supporting Reputation- Based Trust in Peer-to-PeerCommunities”, IEEE Trans. Knowledge and Data Eng., vol.16,no. 7, pp. 843-857, July 2009.

A. Shamir, How to share a secret, Commun. ACM, vol. 22, no. 11, pp. 612–613, 1979.

Chuiwei Lu, Xianhao Miao, Zhiyuan Lui “A Safety Algorithm of P2P Routing based on Multiple Encryption Detecting Technology” Telkomnika, vol.11,no.10,13, pp.5815-5823.

T. Sundsted. "The Practice of Peer-to-Peer Computing: Introduction and History." IBM develeoperWorks. 2001.

Jian Liang, Naoum Naoumov, and Keith W. Ross, The Index Poisoning Attack in P2P File Sharing Systems, In IEEE Conference on Computer Communication, Barcelona, Spain, 2006.

Baptiste Prˆetre”Attacks on Peer-to-Peer Networks” Dept. of Computer Science Swiss Federal Institute of Technology (ETH) Zurich Autumn 2005.

Castro M., Druschel P., Ganesh A., Rowstron A., & Wallach D.S., (2002) Security for Peer-to-Peer System.

M. Hauswirth, A. Datta, and K. Aberer, “Handling Identity in Peer-to-Peer Systems,” International Conference on Database and Expert Systems Applications, Sept. 2003.

S. Sen, J. Wang. Analyzing Peer-to-Peer Traf_c Across Large Networks, IEEE Transactions on Networking, Vol. 12, No. 2, April 2004.


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.