• Title/Summary/Keyword: peer-to-peer (p2p)

Search Result 585, Processing Time 0.03 seconds

Enhancing Location Privacy through P2P Network and Caching in Anonymizer

  • Liu, Peiqian;Xie, Shangchen;Shen, Zihao;Wang, Hui
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.5
    • /
    • pp.1653-1670
    • /
    • 2022
  • The fear that location privacy may be compromised greatly hinders the development of location-based service. Accordingly, some schemes based on the distributed architecture in peer-to-peer network for location privacy protection are proposed. Most of them assume that mobile terminals are mutually trusted, but this does not conform to realistic scenes, and they cannot make requirements for the level of location privacy protection. Therefore, this paper proposes a scheme for location attribute-based security authentication and private sharing data group, so that they trust each other in peer-to-peer network and the trusted but curious mobile terminal cannot access the initiator's query request. A new identifier is designed to allow mobile terminals to customize the protection strength. In addition, the caching mechanism is introduced considering the cache capacity, and a cache replacement policy based on deep reinforcement learning is proposed to reduce communications with location-based service server for achieving location privacy protection. Experiments show the effectiveness and efficiency of the proposed scheme.

An analysis on Peer-to-Peer communication mechanism based on self-sovereign identity (자기주권 신원 기반 피어-투-피어 통신 메커니즘 분석)

  • Choi, Gyu-Hyun;Kim, Geun-Hyung
    • Annual Conference of KIPS
    • /
    • 2021.11a
    • /
    • pp.359-362
    • /
    • 2021
  • 자기 주권 신원 증명 기술인 DID가 강력한 인증 수단으로 떠오르고 있다. 이런 DID 기술을 사용한 DIDComm은 중앙을 거치지 않는, 사용자끼리의 통신(P2P)을 가능하게 만들어 주며, 이는 강력한 보안을 제공해 준다. 본 글은 DIDComm 기술을 활용한 P2P 메신저에 대해 작성하였다. 이를 활용한 메신저는 사용자 간의 높은 보안을 가진 통신을 제공해 줄 수 있으며 앞으로의 인터넷 시대, 메타버스 시대에서 주목할 만한 기술이다.

The Degree of Life-Respect and Peer Bullying in Elementary School Students (초등학생의 생명존중과 또래괴롭힘)

  • Kim, Shin-Jeong;Park, Young-Ae;Kim, Sung-Hee;Kim, Hye-Young;Yoo, So-Young;Baek, Seong-Sook;Lee, Jung-Eun
    • Child Health Nursing Research
    • /
    • v.21 no.1
    • /
    • pp.28-36
    • /
    • 2015
  • Purpose: This study was done to provide basic data for education of elementary school students on life-respect and peer bullying prevention. Methods: Participants were 5th and 6th grade elementary school students. Data from the questionnaires of 218 participants were analyzed. Results: 1) The mean score for degree of life-respect was 4.23 (${\pm}0.38$). The types of peer bullying were 'defenders of victims' ($3.19{\pm}0.93$), 'bullies' ($2.04{\pm}0.72$), 'victims' ($1.91{\pm}0.84$), 'bystanders' ($1.79{\pm}0.80$), and 'bully-followers' ($1.66{\pm}0.60$). 2) There was a significant difference in the degree of life-respect according to gender (t=-2.410, p=.017). Likewise, in the degree of peer bullying, among the type of 'bullies' there were significant differences according to grade (t=-2.285, p=.004), and gender (t=3.191, p=.002). Also, among the types of 'bully-followers' there were significant differences according to gender (t=2.053, p=.041), and having a religion or not (t=3.319, p=.001). 3) There was a significant correlation between life-respect and types of peer bullying. Conclusion: The results of this study provide helps for more effective provision of educational programs regarding life-respect and peer bullying.

P2P Group Search Algorithm based on Preprocessing Search (전처리 검색 기반의 P2P 그룹 검색 알고리즘)

  • Kim, Boon-Hee
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.5 no.5
    • /
    • pp.522-527
    • /
    • 2010
  • In the connected environment by network, clients shared resources as that requested the file that a server had, but P2P system is alternative because of the overload of servers. To improve the performance of this P2P system, we are studying about that. In this study, we can improve a usability for users using P2P search system, and suggest a group search algorithm based on a preprocessing search.

A Resource Discovery with Data Dissemination over Unstructured Mobile P2P Networks

  • Bok, Kyoung-Soo;Kwak, Dong-Won;Yoo, Jae-Soo
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.6 no.3
    • /
    • pp.815-834
    • /
    • 2012
  • Recently, along with the innovative development of wireless communication techniques and mobile devices, mobile P2P services in mobile wireless networks have gained a lot of attention. In this paper, we propose a resource discovery scheme with data dissemination over mobile P2P networks. In the proposed scheme, each peer manages a local information table, a resource index table, and a routing table in a local database to enhance the accuracy and cost of resource discovery. The local information table stores the status of a mobile peer, and the resource index table stores the resource information of the neighbor peers via the ranking function. The routing table is used to communicate with the neighbor peers. We use a timestamp message to determine whether or not the resource index table will be changed before the resource information is exchanged. Our ranking function considers the interest and mobility of the mobile peer and prioritizes the resource information transmitted from the neighbor peers. It is shown via various experiments that the proposed scheme outperforms the existing scheme.

Benefits and Concerns of the Sharing Economy: Economic Analysis and Policy Implications

  • KIM, MIN JUNG
    • KDI Journal of Economic Policy
    • /
    • v.41 no.1
    • /
    • pp.15-41
    • /
    • 2019
  • This paper economically analyzes the benefits and concerns of the sharing economy and derives policy implications that could help to achieve the expected benefits and respond appropriately to any concerns. Primary benefits anticipated from the sharing economy are the creation of new transactions and promotional and market testing opportunities, and the main concerns include the crowding out of existing transactions as well as transaction and social risks. How these benefits and concerns are being realized in Korea is empirically examined by conducting a survey on participation experiences with the sharing economy. The sharing economy is expected to contribute to the enhancement of social welfare with its wide range of benefits if risk factors can be properly controlled. Accordingly, an institutional framework is needed to support the stable growth of the sharing economy, and the unique characteristics of non-professional, peer-to-peer transactions should be reflected in tandem with regulatory equity between existing and sharing economy suppliers. To do this, transaction-volume-based regulations are recommended. Furthermore, to secure regulatory effectiveness and to alleviate transaction risks, the pertinent obligations must be imposed on sharing platforms.

Construction and Redundancy Control of Messages Using Gossip-based Protocol on P2P Environments (P2P환경에서 Gossip 프로토콜 기반의 메시지 구성 및 중복 제어)

  • Kim, Byung-Kwan;Gu, Tae-Wan;Lee, Sung-Ryong;Jung, Yeon-Jin;Lee, Kwang-Mo
    • Annual Conference of KIPS
    • /
    • 2003.11b
    • /
    • pp.975-978
    • /
    • 2003
  • 초고속 통신망의 발달과 개인 컴퓨터의 고급화가 이루어지면서 분산 환경에서 네트워크에 연결된 이런 고급화된 컴퓨터들의 유휴자원을 이용하여 대규모의 데이터를 처리하기 위한 연구와 기존의 클라이언트-서버 환경에서의 부하를 각 컴퓨터들에게 분산시키는 연구가 활발하게 진행되고 있다. 본 논문에서는 Peer-to-Peer환경에서 메시지 제어를 위한 mesh 기반의 네트워크를 구성하고 Gossip 프로토콜을 이용한 각 peer간의 효율적인 메시지 전송 기법을 제안한다.

  • PDF

BitTorrent Network Traffic Analysis for Peer Link Prediction (피어 링크 예측을 위한 토렌트 네트워크 트래픽 분석)

  • Chung, Yeounoh;Kim, Noo-ri;Lee, Jee-Hyong
    • Annual Conference of KIPS
    • /
    • 2013.05a
    • /
    • pp.187-188
    • /
    • 2013
  • 비트토렌트는 인터넷을 통해 빠르고 효율적으로 파일을 공유할 수 있는 P2P (Peer-to-Peer) 파일전송 프로토콜이다. 파일을 P2P 네트워크 상에 분산하여 저장하고 서로 다른 환경의 피어들이 각자의 필요에 따라 쉽게 네트워크를 떠날 수 있기 때문에, 비트토렌트 네트워크는 매우 복잡하고 동적인 구조를 가진다. 본 연구에서는 이러한 네트워크 구조, 특히 피어들 간의 링크생성과 분리를 예측하여 비트토렌트 파일공유 시스템의 성능을 향상시키고자 하는 방향을 제시한다. 토렌트 크롤러 비트토렌트 네트워크 모니터링 시스템을 사용해 네트워크 부하를 최소화하며 네트워크 트래픽을 분석하고, 관찰된 네트워크 트래픽 특성을 통해 링크를 예측하는 방법을 제안한다.

A Scalable Video Coding(SVC) and Balanced Selection Algorithm based P2P Streaming Technique for Efficient Military Video Information Transmission (효율적인 국방 영상정보 전송을 위한 확장비디오코딩(SVC) 및 균형선택 알고리즘 기반의 피투피(P2P) 비디오 스트리밍 기법 연구)

  • Shin, Kyuyong;Kim, Kyoung Min;Lee, Jongkwan
    • Convergence Security Journal
    • /
    • v.19 no.4
    • /
    • pp.87-96
    • /
    • 2019
  • Recently, with the rapid development of video equipment and technology, tremendous video information is produced and utilized in military domain to acquire battlefield information or for effective command control. Note that the video playback devices currently used in the military domain ranges from low-performance tactical multi-functional terminals (TMFT) to high-performance video servers and the networks where the video information is transmitted also range from the low speed tactical information and communication network (TICN) to ultra-high speed defense broadband converged networks such as M-BcN. Therefore, there is a need for an efficient streaming technique that can efficiently transmit defense video information in heterogeneous communication equipment and network environments. To solve the problem, this paper proposes a Scalable Video Coding (SVC) and balanced selection algorithm based Peer-to-Peer (P2P) streaming technique and the feasibility of the proposed technique is verified by simulations. The simulation results based on our BitTorrent simulator show that the proposed balanced selection scheme outperforms the sequential or rarest selection algorithm.