• Title/Summary/Keyword: File Sharing Method

Search Result 47, Processing Time 0.03 seconds

An Access Control using Reputation Information in P2P File Sharing System (P2P 파일 공유 시스템에서 평판 정보를 이용한 접근 제어)

  • Shin Jung-Hwa;Shin Weon;Rhee Kyung-Hyune
    • The KIPS Transactions:PartA
    • /
    • v.12A no.6 s.96
    • /
    • pp.493-498
    • /
    • 2005
  • P2P service is a method that can share various information through direct connection between computer of a person who have information and a Person who have information without server in the Internet and it is getting a lot of popularity by method for free ex change of file. P2P file sharing systems have become popular as a new paradigm for information exchange. Because all users who use service in P2P file sharing system can use shared files of several users freely by equal access privilege, it is happening the 'free rider' that only download shared file of other users without share own files. Although a user share a malicious file including virus, worm or file that have title differing with actuality contents, can use file sharing service without limitation. In this paper, we propose a method that restrict access of 'free rider' that only download using reputation information that indicate reliability of user. Also, we restrict usage ons hared file of other users about users who share harmful file.

A File Name Identification Method for P2P and Web Hard Applications through Traffic Monitoring (트래픽 모니터링을 통한 P2P 및 웹 하드 다운로드 응용의 파일이름 식별 방법)

  • Son, Hyeon-Gu;Kim, Ki-Su;Lee, Young-Seok
    • Journal of KIISE:Information Networking
    • /
    • v.37 no.6
    • /
    • pp.477-482
    • /
    • 2010
  • Recently, advanced Internet applications such as Internet telephone, multimedia streaming, and file sharing have appeared. Especially, P2P or web-based file sharing applications have been notorious for their illegal usage of contents and massive traffic consumption by a few users. This paper presents a novel method to identify the P2P or web-based file names with traffic monitoring. For this purpose, we have utilized the Korean decoding method on the IP packet payload. From experiments, we have shown that the file names requested by BitTorrent, Clubbox, and Tple applications could be correctly identified.

Design and Implementation of Distributed File Transfer Server (파일 공유를 위한 분산 파일 서버 설계 및 구현)

  • 박주영;고석주;강신각
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2002.11a
    • /
    • pp.614-618
    • /
    • 2002
  • Although there are a lot of file sharing mechanisms in the Internet such as NFS and P2P, FTP is one of the most common mechanisms used until now. In this paper, we propose a more enhanced file sharing mechanism, the Distributed File Server (DFS) method. The most remarkable feature of DFS is that it can be simply adopted in the current Internet FTP services by locating a DFS node between existing FTP servers and clients without changing any existing file transfer environment. To verify the proposed mechanism we implemented a DFS prototype on RedHat 7.2 system and we finally show that it can reduce the file storage problem caused by big-sized multimedia data.

  • PDF

A Secure Model for Reading and Writing in Hadoop Distributed File System and its Evaluation (하둡 분산파일시스템에서 안전한 쓰기, 읽기 모델과 평가)

  • Pang, Sechung;Ra, Ilkyeun;Kim, Yangwoo
    • Journal of Internet Computing and Services
    • /
    • v.13 no.5
    • /
    • pp.55-64
    • /
    • 2012
  • Nowadays, as Cloud computing becomes popular, a need for a DFS(distributed file system) is increased. But, in the current Cloud computing environments, there is no DFS framework that is sufficient to protect sensitive private information from attackers. Therefore, we designed and proposed a secure scheme for distributed file systems. The scheme provides confidentiality and availability for a distributed file system using a secret sharing method. In this paper, we measured the speed of encryption and decryption for our proposed method, and compared them with that of SEED algorithm which is the most popular algorithm in this field. This comparison showed the computational efficiency of our method. Moreover, the proposed secure read/write model is independent of Hadoop DFS structure so that our modified algorithm can be easily adapted for use in the HDFS. Finally, the proposed model is evaluated theoretically using performance measurement method for distributed secret sharing model.

Peer to Peer Anonymous Protocol Based Random Walk (랜덤 워크 기반의 P2P 익명 프로토콜)

  • Cho, Jun-Ha;Rhee, Hyun-Sook;Park, Hyun-A;Lee, Dong-Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.17 no.6
    • /
    • pp.65-76
    • /
    • 2007
  • The P2P file sharing system sends the results to users by searching the files in the shared folders. In the process of it, the problem is that the transferred information includes the pathname and file information and it can be revealed who searches which files. In related to this problem, anonymous file sharing P2P protocol has been an active research area where a number of works have been produced. However, the previous studies still have a few of weakness. Therefore, We propose two anonymous P2P file sharing protocols based on the decentralized and unstructured Random Walk. The first scheme uses the dynamic onion routing where the requester can receive the wanted file without knowing other peers' IDs. The second scheme uses the IP multicast method which lowers the computational overhead. Both of them are more suited for the dynamic P2P system.

Design and Implementation of Peer-to-Peer Electronic Commerce Systems based on the File Sharing Method between Users (이용자간 파일공유방식에 기반한 P2P 전자상거래 시스템 설계 및 구현)

  • Kim Chang-Su;Seo Young-Suk
    • The Journal of Information Systems
    • /
    • v.15 no.1
    • /
    • pp.1-20
    • /
    • 2006
  • Peer-to-peer systems (P2P) are rapidly growing in importance on the Internet environment, quickly extending the range of their usage. However, peer-to-peer systems have not been widely applied in electronic commerce because they have not been established as an appropriate business model. Therefore, we firstly review the previous research relevant to peer-to-peer systems, and then analyze the business models for P2P systems presented by previous researchers. Furthermore, this study categorizes major issues in terms of the technical and business model aspects. On the basis of these reviews, we develop P2P electronic commerce systems based on the file sharing method between users, focusing on user interface friendliness. A developed P2P electronic commerce systems are programmed by using the C# based on the Microsoft.net solution. A database is implemented using the MSSQL2000. A main application technology is designed that P2P electronic commerce systems make it possible. for user to extend into BtoB Solution by using WSDL (Web Services Description Language), UDDI (Universal Description, Discovery, and Integration) and the XML that is a document for users. User interface is made as form of Internet messenger for a user's convenience and is possible to develop into a commodity transaction system based on XML. In this study, it is possible for the P2P electronic commerce system to have extended application to fields such as Internet shopping mall and property transaction in a nonprofit organization, a public institution and a large scale nonprofit institution that have a similar structure as compared with a structure of a nonprofit educational institution.

  • PDF

Android mobile server using a file-sharing system between other models (안드로이드 모바일서버를 이용한 이 기종간 파일 공유시스템)

  • Huh, Tae-Sang;Park, Sung-Hyun;Jung, Hoe-Kyung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.18 no.5
    • /
    • pp.1231-1236
    • /
    • 2014
  • Recently, diffusion and proliferation of mobile devices increases, per person n opens for the mobile device era. Mobile devices and OS types of continuously growing trend. More than 80% of market share with Google's Android and Apple's iOS as well as Samsung and Intel is developing TIZEN, Linux and Mobile was the UBUNTU which UBUNTU for Phone, UBUNTU touch, Mozilla 's Firefox OS, Microsoft 's windows mobile and many more OS are ahead of the launch. But different OS can share files between systems or technology is not. Bluetooth or WIFI Direct such technologies are present but can be transferred between compatible devices low, resulting in constraints file types also exist. In this paper, is equipped with a WiFi card in an environment where the Android mobile OS party this model and method for sharing files between different research and can share the file system based on research on.

A Distributed Architecture Based SMTP Server for Large Email Service (대용량 이메일 서비스를 위한 분산 구조 기반의 SMTP 서버)

  • Kim, Young-Jong;Kwak, Hu-Keun;Chung, Kyu-Sik
    • The KIPS Transactions:PartC
    • /
    • v.16C no.5
    • /
    • pp.597-604
    • /
    • 2009
  • An SMTP(Simple Mail Transfer Protocol) server was designed for delivering and storing user's email across a network. An SMTP server can be distributed as multiple servers for large service, huge users or massive emails. An SMTP server can be constructed by multiple servers with separating file system as email storing space, and each SMTP server can usually share each file system by using the NFS(Network File system). However the NFS is originally designed for sharing each file system across a network, and contains all attributes and features of regular file system. Using this NFS for email storing space of SMTP servers, it makes overhead due to unnecessary work of regular file system. In this paper, we propose a method to do directly operation with socket for reducing work overhead caused by the NFS. For doing directly operation with socket, this paper defines information based storing space structure and a protocol for storing emails. We performed experiments using Mailstone made by Netscape. The experimental results show the performance improvement of the proposed method compared to the existing method.

Strategies for Activating BIM-data Sharing in Construction - Based on cases of defining practical data and a survey of practitioners - (건설분야 BIM 데이터 공유 활성화 전략 - 건설 실무분야의 데이터 연계방법과 실무자 설문을 기반으로-)

  • Kim, Do-Young;Lee, Sung-Woo;Nam, Ju-Hyun;Kim, Bum-Soo;Kim, Sung-Jin
    • Journal of KIBIM
    • /
    • v.12 no.1
    • /
    • pp.72-80
    • /
    • 2022
  • It has become mandatory to designs by BIM in construction. It is urgent to make accurate decisions through the linkage between complex and various types of data in projects. In particular, block-chain based data sharing process (using BIM files, general construction submitted files) is essential to support reliable decision making in complex data flood systems. Prior to developing data sharing system based on block-chain, in this paper, a data linkage method is proposed so that practitioners can simultaneously utilize existing construction information and BIM data. Examples are shown based on the construction classification system and file expression, and incentive strategies are explored through a survey so that heterogeneous information can be used at the same time in overall projects.

A Boundary Curve Extraction Method using Triangular Elements of a Lightweight Model (경량 모델의 삼각 요소망으로부터 경계 곡선 추출 방법)

  • Kwon, Ki-Youn
    • Korean Journal of Computational Design and Engineering
    • /
    • v.22 no.1
    • /
    • pp.28-36
    • /
    • 2017
  • Sharing of CAD data plays a key role in the PLM and a lightweight model is widely used for visualizing and sharing a large data. The lightweight model is mainly composed of triangular elements to minimize file size. There is no problem at all to visually confirm the shape based on these triangular elements but there is a limit to numerically calculate the exact position on the curve or surface. In this paper, a boundary curve generation method using triangular elements is proposed to increase the utilization of lightweight models. After matching connectivity of triangular elements, boundary element edges are extracted. Boundary curves are generated by connecting of these boundary element edges. This proposed method has been tested on several models to demonstrate the feasibility.