• Title/Summary/Keyword: P2p file sharing

Search Result 70, Processing Time 0.026 seconds

An Access Control using Reputation Information in P2P File Sharing System (P2P 파일 공유 시스템에서 평판 정보를 이용한 접근 제어)

  • Shin Jung-Hwa;Shin Weon;Rhee Kyung-Hyune
    • The KIPS Transactions:PartA
    • /
    • v.12A no.6 s.96
    • /
    • pp.493-498
    • /
    • 2005
  • P2P service is a method that can share various information through direct connection between computer of a person who have information and a Person who have information without server in the Internet and it is getting a lot of popularity by method for free ex change of file. P2P file sharing systems have become popular as a new paradigm for information exchange. Because all users who use service in P2P file sharing system can use shared files of several users freely by equal access privilege, it is happening the 'free rider' that only download shared file of other users without share own files. Although a user share a malicious file including virus, worm or file that have title differing with actuality contents, can use file sharing service without limitation. In this paper, we propose a method that restrict access of 'free rider' that only download using reputation information that indicate reliability of user. Also, we restrict usage ons hared file of other users about users who share harmful file.

The Effects of Trust on Customer Satisfaction and Re-use Intention in P2P File Sharing (P2P파일공유에서 신뢰가 고객만족과 재이용의도에 미치는 영향)

  • Cho, Chul-Ho;Kang, Byung-Suh
    • Journal of Korean Society for Quality Management
    • /
    • v.34 no.2
    • /
    • pp.33-47
    • /
    • 2006
  • This study was designed to examine the casual relationships among trust evaluation factors, trust, customer satisfaction, and re-use intention in the P2P file sharing service. We applied structural equation model to test the hypotheses and research model. As a result of this study, trust evaluation factors affect trust and customer satisfaction and both of trust and customer satisfaction affect re-use intention respectively and significantly. Also trust affects customer satisfaction significantly. Specifically, trust was empirically confirmed as one of the important factors preceding customer satisfaction and re-use intetion in the P2P file sharing service. Therefore, this study shows that trust is important factor that P2P companies have to emphasize to raise user satisfaction and performance.

Extended Equal Service and Differentiated Service Models for Peer-to-Peer File Sharing

  • Zhang, Jianwei;Wang, Yongchao;Xing, Wei;Lu, Dongming
    • Journal of Communications and Networks
    • /
    • v.15 no.2
    • /
    • pp.228-239
    • /
    • 2013
  • Peer-to-peer (P2P) systems have proved the most effective and popular file sharing applications in recent years. Previous studies mainly focused on equal service and differentiated service strategies when peers have no initial data before their downloads. For an upload-constrained P2P file sharing system, we model both the equal service process and the differentiated service process when the initial data distribution of peers satisfies some special conditions. Moreover, we show how to minimize the time required to distribute the file to any number of peers. The proposed fluid-based models can reveal the intrinsic relations among the initial data amount, the peer set size, and the minimum last finish time. The closed-form expressions derived from the extended models can closely approximate chunk-based models and systems, especially for relatively large files. As an application of the extended models, we show how to provide differentiated service efficiently to multiple peer sets. Since no limits are imposed on the upload bandwidth of peers or the size of each peer set, we believe that our analytic process and the results achieved can provide not only fundamental insights into bandwidth allocation and data scheduling but also a helpful reference for both improving system performance and building an effective incentive mechanism for P2P file sharing systems.

An Efficient Anonymous Mobile P2P Protocol Reducing Garbage Files (가비지 파일의 수신을 줄여줄 수 있는 효율적인 익명 모바일 P2P 프로토콜)

  • Cui, Yun-Feng;Oh, Hee-Kuk;Kim, Sang-Jin
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2008.05a
    • /
    • pp.706-709
    • /
    • 2008
  • With the increasing popularity of P2P file sharing and advancement of mobile technologies, mobile P2P has revealed its attraction. Anonymity has become an increasing requirement in mobile networks. To reduce receiving garbage files, file validation and filtering are other requirements in the mobile P2P environment. If there are effective file filtering and validation mechanism, nodes' battery duration will be saved. In this paper, we do an analysis of security and anonymity in P2P file sharing and exchange system in mobile ad hoc environment, and propose a new efficient anonymous protocol, which can provide anonymity by broadcasting with a probabilistic algorithm and hiding real hop count information, the file validation by the file's special hash value and file filtering mechanism through the collaboration of middle nodes.

ELiSyR: Efficient, Lightweight and Sybil-Resilient File Search in P2P Networks

  • Kim, Hyeong-S.;Jung, Eun-Jin;Yeom, Heon-Y.
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.4 no.6
    • /
    • pp.1311-1326
    • /
    • 2010
  • Peer-to-peer (P2P) networks consume the most bandwidth in the current Internet and file sharing accounts for the majority of the P2P traffic. Thus it is important for a P2P file sharing application to be efficient in bandwidth consumption. Bandwidth consumption as much as downloaded file sizes is inevitable, but those in file search and bad downloads, e.g. wrong, corrupted, or malicious file downloads, are overheads. In this paper, we target to reduce these overheads even in the presence of high volume of malicious users and their bad files. Sybil attacks are the example of such hostile environment. Sybil attacker creates a large number of identities (Sybil nodes) and unfairly influences the system. When a large portion of the system is subverted, either in terms of the number of users or the number of files shared in the system, the overheads due to the bad downloads rapidly increase. We propose ELiSyR, a file search protocol that can tolerate such a hostile environment. ELiSyR uses social networks for P2P file search and finds benign files in 71% of searches even when more than half of the users are malicious. Furthermore, ELiSyR provides similar success with less bandwidth than other general efforts against Sybil attacks. We compare our algorithm to SybilGuard, SybilLimit and EigenTrust in terms of bandwidth consumption and the likelihood of bad downloads. Our algorithm shows lower bandwidth consumption, similar chances of bad downloads and fairer distribution of computation loads than these general efforts. In return, our algorithm takes more rounds of search than them. However the time required for search is usually much less than the time required for downloads, so the delay in search is justifiable compared to the cost of bad downloads and subsequent re-search and downloads.

A Measurement Study of User Behavior and File Pollution in DHT-based P2P Networks (DHT 기반의 P2P 네트워크에서 사용자 행동양식 및 파일 오염에 관한 측정 연구)

  • Shin, Kyu-Yong;Yoo, Jin-Cheol;Lee, Jong-Deog
    • Journal of the Korea Society of Computer and Information
    • /
    • v.16 no.3
    • /
    • pp.131-140
    • /
    • 2011
  • File pollution (i.e., sharing of corrupted files, or contaminating index information with bogus index records) is a de facto problem in many file sharing Peer-to-Peer (P2P) systems in use today. Since pollution squanders network resources and frustrates users with unprofitable downloads (due to corrupted files) and unproductive download trials (due to bogus index records), the viability of P2P systems (and similar distributed information-sharing applications) is questionable unless properly addressed. Thus, developing effective anti-pollution mechanisms is an immediate problem in this literature. This paper provides useful information and deep insight with future researchers who want to design an effective anti-pollution mechanism throughout an extensive measurement study of user behavior and file pollution in a representative DHT-based P2P system, the Kad network.

Efficient Peer-to-Peer File Sharing Using Network Coding in MANET

  • Lee, Uichin;Park, Joon-Sang;Lee, Seung-Hoon;Ro, Won-W.;Pau, Giovanni;Gerla, Mario
    • Journal of Communications and Networks
    • /
    • v.10 no.4
    • /
    • pp.422-429
    • /
    • 2008
  • Mobile peer-to-peer (P2P) systems have recently got in the limelight of the research community that is striving to build efficient and effective mobile content addressable networks. Along this line of research, we propose a new peer-to-peer file sharing protocol suited to mobile ad hoc networks (MANET). The main ingredients of our protocol are network coding and mobility assisted data propagation, i.e., single-hop communication. We argue that network coding in combination with single-hop communication allows P2P file sharing systems in MANET to operate in a more efficient manner and helps the systems to deal with typical MANET issues such as dynamic topology and intermittent connectivity as well as various other issues that have been disregarded in previous MANET P2P researches such as addressing, node/user density, non-cooperativeness, and unreliable channel. Via simulation, we show that our P2P protocol based on network coding and single-hop communication allows shorter file downloading delays compared to an existing MANET P2P protocol.

A File Name Identification Method for P2P and Web Hard Applications through Traffic Monitoring (트래픽 모니터링을 통한 P2P 및 웹 하드 다운로드 응용의 파일이름 식별 방법)

  • Son, Hyeon-Gu;Kim, Ki-Su;Lee, Young-Seok
    • Journal of KIISE:Information Networking
    • /
    • v.37 no.6
    • /
    • pp.477-482
    • /
    • 2010
  • Recently, advanced Internet applications such as Internet telephone, multimedia streaming, and file sharing have appeared. Especially, P2P or web-based file sharing applications have been notorious for their illegal usage of contents and massive traffic consumption by a few users. This paper presents a novel method to identify the P2P or web-based file names with traffic monitoring. For this purpose, we have utilized the Korean decoding method on the IP packet payload. From experiments, we have shown that the file names requested by BitTorrent, Clubbox, and Tple applications could be correctly identified.

A Hybrid P2P File Sharing System using Trust Information (신뢰 정보를 이용하는 하이브리드 P2P 파일 공유 시스템)

  • Son Bong-Gi;Kim Hak-Jun
    • Proceedings of the Korean Institute of Intelligent Systems Conference
    • /
    • 2006.05a
    • /
    • pp.327-330
    • /
    • 2006
  • P2P 파일 공유 시스템은 중앙 서버를 거치지 않고 피어 컴퓨터들 간의 직접적인 자원 공유로 특징지워지는 P2P 기술의 대표적인 응용으로, 사용자는 인터넷을 통해 원하는 파일을 쉽게 검색, 획득, 유포할 수 있다. 그러나 악의적인 사용자가 허위 파일이나 바이러스를 유포할 수 있어, 허위파일로 인한 재전송이 빈번해짐으로써 네트워크 트래픽이 증가하고, 바이러스로 인한 피해가 발행할 수 있다. 또한, 자신의 파일에 대한 공유없이 다른 사용자들의 공유 파일만 다운로드하는 free riding 문제가 발생할 수 있다. 이 논문에서는 사용자의 파일 공유 트랜잭션 정보에 기반한 신뢰 정보를 이용하여 P2P 파일 공유 시스템의 문제점을 보완할 수 있는 시스템을 제안한다. 제안한 시스템에서 중앙 서버는 사용자의 파일 공유 트랜잭션 피드백을 이용하여 사용자 신뢰도를 구하여 허위파일이나 바이러스를 유포하는 악의적인 사용자나 free rider에 대해 시스템 사용을 제한한다. 사용자는 파일 다운로드 시에 중앙 서버로부터 사용자 메타데이터를 수신하여 자신의 선호도를 반영한 파일 신뢰도를 이용함으로써 허위파일이나 바이러스를 다운로드할 위험을 줄인다.

  • PDF

A Design and Implementation of Dynamic Hybrid P2P System with Hierarchical Group Management and Maintenance of Reliability (계층적 그룹관리와 신뢰성을 위한 동적인 변형 P2P 시스템 설계 및 구현)

  • Lee, Seok-Hee;Cho, Sang;Kim, Sung-Yeol
    • The KIPS Transactions:PartD
    • /
    • v.11D no.4
    • /
    • pp.975-982
    • /
    • 2004
  • In current P2P concept, pure P2P and Hybrid P2P structures are used commonly. Gnutella and Ktella are forms of pure P2P. and forms of Hybrid P2P are innumerable. File searching models exist in these models. These models provide group management for file sharing, searching and indexing. The general file sharing model is good at maintaining connectivity. However, it is defective in group management. Therefore, this study approaches hierarchical structure in file sharing models through routing technique and backup system. This system was designed so that the user was able to maintain group efficiency and connection reliability in large-scale network.