• Title/Summary/Keyword: P2P File Sharing System

Search Result 37, Processing Time 0.022 seconds

An Access Control using Reputation Information in P2P File Sharing System (P2P 파일 공유 시스템에서 평판 정보를 이용한 접근 제어)

  • Shin Jung-Hwa;Shin Weon;Rhee Kyung-Hyune
    • The KIPS Transactions:PartA
    • /
    • v.12A no.6 s.96
    • /
    • pp.493-498
    • /
    • 2005
  • P2P service is a method that can share various information through direct connection between computer of a person who have information and a Person who have information without server in the Internet and it is getting a lot of popularity by method for free ex change of file. P2P file sharing systems have become popular as a new paradigm for information exchange. Because all users who use service in P2P file sharing system can use shared files of several users freely by equal access privilege, it is happening the 'free rider' that only download shared file of other users without share own files. Although a user share a malicious file including virus, worm or file that have title differing with actuality contents, can use file sharing service without limitation. In this paper, we propose a method that restrict access of 'free rider' that only download using reputation information that indicate reliability of user. Also, we restrict usage ons hared file of other users about users who share harmful file.

Extended Equal Service and Differentiated Service Models for Peer-to-Peer File Sharing

  • Zhang, Jianwei;Wang, Yongchao;Xing, Wei;Lu, Dongming
    • Journal of Communications and Networks
    • /
    • v.15 no.2
    • /
    • pp.228-239
    • /
    • 2013
  • Peer-to-peer (P2P) systems have proved the most effective and popular file sharing applications in recent years. Previous studies mainly focused on equal service and differentiated service strategies when peers have no initial data before their downloads. For an upload-constrained P2P file sharing system, we model both the equal service process and the differentiated service process when the initial data distribution of peers satisfies some special conditions. Moreover, we show how to minimize the time required to distribute the file to any number of peers. The proposed fluid-based models can reveal the intrinsic relations among the initial data amount, the peer set size, and the minimum last finish time. The closed-form expressions derived from the extended models can closely approximate chunk-based models and systems, especially for relatively large files. As an application of the extended models, we show how to provide differentiated service efficiently to multiple peer sets. Since no limits are imposed on the upload bandwidth of peers or the size of each peer set, we believe that our analytic process and the results achieved can provide not only fundamental insights into bandwidth allocation and data scheduling but also a helpful reference for both improving system performance and building an effective incentive mechanism for P2P file sharing systems.

ELiSyR: Efficient, Lightweight and Sybil-Resilient File Search in P2P Networks

  • Kim, Hyeong-S.;Jung, Eun-Jin;Yeom, Heon-Y.
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.4 no.6
    • /
    • pp.1311-1326
    • /
    • 2010
  • Peer-to-peer (P2P) networks consume the most bandwidth in the current Internet and file sharing accounts for the majority of the P2P traffic. Thus it is important for a P2P file sharing application to be efficient in bandwidth consumption. Bandwidth consumption as much as downloaded file sizes is inevitable, but those in file search and bad downloads, e.g. wrong, corrupted, or malicious file downloads, are overheads. In this paper, we target to reduce these overheads even in the presence of high volume of malicious users and their bad files. Sybil attacks are the example of such hostile environment. Sybil attacker creates a large number of identities (Sybil nodes) and unfairly influences the system. When a large portion of the system is subverted, either in terms of the number of users or the number of files shared in the system, the overheads due to the bad downloads rapidly increase. We propose ELiSyR, a file search protocol that can tolerate such a hostile environment. ELiSyR uses social networks for P2P file search and finds benign files in 71% of searches even when more than half of the users are malicious. Furthermore, ELiSyR provides similar success with less bandwidth than other general efforts against Sybil attacks. We compare our algorithm to SybilGuard, SybilLimit and EigenTrust in terms of bandwidth consumption and the likelihood of bad downloads. Our algorithm shows lower bandwidth consumption, similar chances of bad downloads and fairer distribution of computation loads than these general efforts. In return, our algorithm takes more rounds of search than them. However the time required for search is usually much less than the time required for downloads, so the delay in search is justifiable compared to the cost of bad downloads and subsequent re-search and downloads.

An Efficient Anonymous Mobile P2P Protocol Reducing Garbage Files (가비지 파일의 수신을 줄여줄 수 있는 효율적인 익명 모바일 P2P 프로토콜)

  • Cui, Yun-Feng;Oh, Hee-Kuk;Kim, Sang-Jin
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2008.05a
    • /
    • pp.706-709
    • /
    • 2008
  • With the increasing popularity of P2P file sharing and advancement of mobile technologies, mobile P2P has revealed its attraction. Anonymity has become an increasing requirement in mobile networks. To reduce receiving garbage files, file validation and filtering are other requirements in the mobile P2P environment. If there are effective file filtering and validation mechanism, nodes' battery duration will be saved. In this paper, we do an analysis of security and anonymity in P2P file sharing and exchange system in mobile ad hoc environment, and propose a new efficient anonymous protocol, which can provide anonymity by broadcasting with a probabilistic algorithm and hiding real hop count information, the file validation by the file's special hash value and file filtering mechanism through the collaboration of middle nodes.

A Measurement Study of User Behavior and File Pollution in DHT-based P2P Networks (DHT 기반의 P2P 네트워크에서 사용자 행동양식 및 파일 오염에 관한 측정 연구)

  • Shin, Kyu-Yong;Yoo, Jin-Cheol;Lee, Jong-Deog
    • Journal of the Korea Society of Computer and Information
    • /
    • v.16 no.3
    • /
    • pp.131-140
    • /
    • 2011
  • File pollution (i.e., sharing of corrupted files, or contaminating index information with bogus index records) is a de facto problem in many file sharing Peer-to-Peer (P2P) systems in use today. Since pollution squanders network resources and frustrates users with unprofitable downloads (due to corrupted files) and unproductive download trials (due to bogus index records), the viability of P2P systems (and similar distributed information-sharing applications) is questionable unless properly addressed. Thus, developing effective anti-pollution mechanisms is an immediate problem in this literature. This paper provides useful information and deep insight with future researchers who want to design an effective anti-pollution mechanism throughout an extensive measurement study of user behavior and file pollution in a representative DHT-based P2P system, the Kad network.

A Design and Implementation of Dynamic Hybrid P2P System with Hierarchical Group Management and Maintenance of Reliability (계층적 그룹관리와 신뢰성을 위한 동적인 변형 P2P 시스템 설계 및 구현)

  • Lee, Seok-Hee;Cho, Sang;Kim, Sung-Yeol
    • The KIPS Transactions:PartD
    • /
    • v.11D no.4
    • /
    • pp.975-982
    • /
    • 2004
  • In current P2P concept, pure P2P and Hybrid P2P structures are used commonly. Gnutella and Ktella are forms of pure P2P. and forms of Hybrid P2P are innumerable. File searching models exist in these models. These models provide group management for file sharing, searching and indexing. The general file sharing model is good at maintaining connectivity. However, it is defective in group management. Therefore, this study approaches hierarchical structure in file sharing models through routing technique and backup system. This system was designed so that the user was able to maintain group efficiency and connection reliability in large-scale network.

A Hybrid P2P File Sharing System using Trust Information (신뢰 정보를 이용하는 하이브리드 P2P 파일 공유 시스템)

  • Son Bong-Gi;Kim Hak-Jun
    • Proceedings of the Korean Institute of Intelligent Systems Conference
    • /
    • 2006.05a
    • /
    • pp.327-330
    • /
    • 2006
  • P2P 파일 공유 시스템은 중앙 서버를 거치지 않고 피어 컴퓨터들 간의 직접적인 자원 공유로 특징지워지는 P2P 기술의 대표적인 응용으로, 사용자는 인터넷을 통해 원하는 파일을 쉽게 검색, 획득, 유포할 수 있다. 그러나 악의적인 사용자가 허위 파일이나 바이러스를 유포할 수 있어, 허위파일로 인한 재전송이 빈번해짐으로써 네트워크 트래픽이 증가하고, 바이러스로 인한 피해가 발행할 수 있다. 또한, 자신의 파일에 대한 공유없이 다른 사용자들의 공유 파일만 다운로드하는 free riding 문제가 발생할 수 있다. 이 논문에서는 사용자의 파일 공유 트랜잭션 정보에 기반한 신뢰 정보를 이용하여 P2P 파일 공유 시스템의 문제점을 보완할 수 있는 시스템을 제안한다. 제안한 시스템에서 중앙 서버는 사용자의 파일 공유 트랜잭션 피드백을 이용하여 사용자 신뢰도를 구하여 허위파일이나 바이러스를 유포하는 악의적인 사용자나 free rider에 대해 시스템 사용을 제한한다. 사용자는 파일 다운로드 시에 중앙 서버로부터 사용자 메타데이터를 수신하여 자신의 선호도를 반영한 파일 신뢰도를 이용함으로써 허위파일이나 바이러스를 다운로드할 위험을 줄인다.

  • PDF

Extended-CAN Mechanism to Support Keyword Search (키워드 검색 지원을 위한 확장 CAN 메커니즘)

  • Lee, Myoung-Hoon;Park, Jung-Soo;Cho, In-June
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.10 no.3
    • /
    • pp.421-429
    • /
    • 2006
  • Recently, DHT-based Structured P2P System have a attention to scalability and providing efficient lookup by routing. Retrieving content of DHT-based P2P require knowledge of the exact identifier of sharing file. But user may wish to search for sharing file using descriptive keyword or content. To resolve the problem, this paper propose Extended-CAN mechanism to support keyword search. We defined content-based keyword and identifier of sharing file, and PLS extended to KID and CKD for keyword, common keyword processing. As a result, Extended-CAN mechanism provide efficient keyword search for DHT-based Structured P2P System.

Peer to Peer Anonymous Protocol Based Random Walk (랜덤 워크 기반의 P2P 익명 프로토콜)

  • Cho, Jun-Ha;Rhee, Hyun-Sook;Park, Hyun-A;Lee, Dong-Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.17 no.6
    • /
    • pp.65-76
    • /
    • 2007
  • The P2P file sharing system sends the results to users by searching the files in the shared folders. In the process of it, the problem is that the transferred information includes the pathname and file information and it can be revealed who searches which files. In related to this problem, anonymous file sharing P2P protocol has been an active research area where a number of works have been produced. However, the previous studies still have a few of weakness. Therefore, We propose two anonymous P2P file sharing protocols based on the decentralized and unstructured Random Walk. The first scheme uses the dynamic onion routing where the requester can receive the wanted file without knowing other peers' IDs. The second scheme uses the IP multicast method which lowers the computational overhead. Both of them are more suited for the dynamic P2P system.

A Study on File Sharing Mechanism for Network Energy Efficiency: Designing & Implementation Proxying System (네트워크 에너지 효율향상을 고려한 File Sharing 기술 연구)

  • Yun, Jung-Mee;Lee, Sang-Hak
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.4 no.2
    • /
    • pp.135-140
    • /
    • 2011
  • Currently, studies have show that the network related energy consumption are increasing. and part of overall energy consumption of our society are too. So, that is important to look for energy-efficient network applications and protocols. A most of network energy consumption are due to network edge devices. in this paper, in order to cut down the emissions of carbon dioxide from ICT business, which contributes 2% of the global energy consumption, it is necessary to understand energy consumption in peer-to-peer system. In this paper, in this paper we propose a architecture based on the introduction of a p2p proxy. The model is analyzed analytically and numerically to reveal how these factors influence the overall power consumption in both steady state and flash crowd information exchange scenarios. Specifically, our results show that the proxy-based solution can provide up to 50% reduction in the energy consumption and, at the same time, a significant reduction in the average file download time.