Search results
1 – 10 of over 1000The purpose of this paper is to present a P2P network security pricing model that promotes more secure online information sharing in P2P networks through the creation of networks…
Abstract
Purpose
The purpose of this paper is to present a P2P network security pricing model that promotes more secure online information sharing in P2P networks through the creation of networks with increased resistance to malicious code propagation. Online information sharing is at an all‐time high partly due to the recent growth in, and use of, online peer‐to‐peer (P2P) networks.
Design/methodology/approach
The model integrates current research findings in incentive compatible network pricing with recent developments in complex network theory. File download prices in P2P networks are linked to network security using a graph theory measurement called the Pearson coefficient. The Pearson coefficient indicates a structural dimension of scale‐free networks (scale‐free networks like the internet) called preferential attachment. Preferential attachment refers to the network property where the probability for a node to connect to a new node is greater if the new node already has a high number of connections.
Findings
The P2P network security pricing model concept is illustrated to show how the model functions to create more secure P2P networks.
Research limitations/implications
Future research in P2P network security pricing should focus on testing the model presented in this paper by numerical experiments and simulation including the tracking of malicious code propagation on networks grown under the pricing model.
Originality/value
The P2P network security pricing model demonstrated here is a different approach to network security that has a strong potential to impact on the future security of P2P and other computer based networks.
Details
Keywords
Xiao‐song Zhang, Ting Chen, Chun‐xiang Xu, Xiao‐hui Pan and Xue‐yang Wu
Nowadays, proactive P2P worm (PRWORM) poses a latent threat to internet infrastructure and common users for the fatal vulnerabilities in homogeneous P2P software. It is more…
Abstract
Purpose
Nowadays, proactive P2P worm (PRWORM) poses a latent threat to internet infrastructure and common users for the fatal vulnerabilities in homogeneous P2P software. It is more difficult to contain PRWORM because of its fast spread speed. Current techniques are not adequate to quarantine PRWORM, mainly because of their inaccuracy and slow response to attacks. The purpose of this paper is to propose an accurate and real‐time approach for PRWORM containment.
Design/methodology/approach
First, the authors present a new methodology to contain PRWORM via proper authentication of initiators of P2P communications. Second, three simple network protocols are proposed to fulfill automatic authentication.
Findings
Both simulations and strictly mathematical proof by Strand Space Model represent that the authors' work is able to accurately quarantine PRWORM in real time. Furthermore, proof shows the three network protocols are resistant to popular attacks such as man‐in‐the‐middle attack and replay attack.
Originality/value
First, the authors propose an authentication based method to contain proactive P2P worm and second, use strand space model to proof the effectiveness and security of the method.
Details
Keywords
Ying Dong, Mingshu Li, Meizhang Chen and Shengli Zheng
The Napster case has drawn enormous attention to digital intellectual property right problems of online file swapping. These peer‐to‐peer network technologies represent a powerful…
Abstract
The Napster case has drawn enormous attention to digital intellectual property right problems of online file swapping. These peer‐to‐peer network technologies represent a powerful new paradigm for networking. In this paper, we try to figure out the intellectual property right problems of peer‐to‐peer network, in order to deal with potential digital piracy to avoid similar litigation. If libraries can embrace peer‐to‐peer technologies into their own services, they will possibly develop new service models, or improve existing ones.
Details
Keywords
William T. Rupp and Alan D. Smith
Any solution that will solve the problem the entertainment industry is currently facing will need to address the underlying theme in the decline of self‐policing and morally…
Abstract
Any solution that will solve the problem the entertainment industry is currently facing will need to address the underlying theme in the decline of self‐policing and morally acceptable behavior in terms of intellectual rights. It has become a norm to download music off the Internet and transfer them onto compact discs (CDs) without compensating the artist who created the music or the firms that created, packaged, promoted, and distributed the music materials. Within the repackaged application will be technology that will allow the consumer to sample the product as well as make a purchase instantly over the Internet. This will benefit the entertainment industry in several ways: expanding the number of distribution channels (providing greater reach); utilizing the P2P‐related networks to their advantage rather than disadvantage (providing greater richness); opening international markets with relative ease; and providing faster delivery times and the ability to provide a much richer content than what is currently offered. Through a succession of models, the basic conclusion is that the Internet plays a much more important role with regards the entertainment industry than currently believed. Although the artists should rightfully be compensated for their artistic talents, it is time that a new model is created to compensate them, since the existing model is not going to work due to the inadequacies of the current distribution channels that are being used by the entertainment industry.
Details
Keywords
Rosa Ma Martín, Josep Casanovas, José Francisco Crespo and Joan Giralt
This paper aims to present the outcome of the i2CAT Foundations' research and innovation projects that use JXTA P2P technology to share audiovisual content.
Abstract
Purpose
This paper aims to present the outcome of the i2CAT Foundations' research and innovation projects that use JXTA P2P technology to share audiovisual content.
Design/methodology/approach
The project consisted of designing and developing a distributed application named eRuc that allows management and sharing of audiovisual content.
Findings
The paper finds that JXTA is suitable to develop P2P applications that share audiovisual files or that interact with different kind of devices. JXTA services and protocols provide an easy integration with other P2P services and a gain of independence from the topology of the physical network (NAT, firewalls, etc.).
Research limitations/implications
High‐quality streaming requires specifically designed P2P architectures. Further testing needs to be performed to evaluate whether the use of JXTA, together with proven, efficient P2P streaming architectures, affect the efficiency of the P2P streaming system.
Practical/implications
P2P technologies have proven to be very efficient for some kind of applications. However, there are no standard frameworks for interoperability and application development may become difficult. JXTA P2P technologies facilitate application development and integration. The authors have used JXTA in different scenarios related with audiovisual content sharing and have proven its suitability. The current work is focused in P2P streaming. Previous literature suggests that there are some proven architectures for P2P life streaming. Using JXTA together with them may prove if JTXA is suitable for applications that require high bandwidth and minimum delay.
Originality/value
The paper provides information of value to information management and technology professionals.
Details
Keywords
Rabab Hayek, Guillaume Raschia, Patrick Valduriez and Noureddine Mouaddib
The goal of this paper is to contribute to the development of both data localization and description techniques in P2P systems.
Abstract
Purpose
The goal of this paper is to contribute to the development of both data localization and description techniques in P2P systems.
Design/methodology/approach
The approach consists of introducing a novel indexing technique that relies on linguistic data summarization into the context of P2P systems.
Findings
The cost model of the approach, as well as the simulation results have shown that the approach allows the efficient maintenance of data summaries, without incurring high traffic overhead. In addition, the cost of query routing is significantly reduced in the context of summaries.
Research limitations/implications
The paper has considered a summary service defined on the APPA's architecture. Future works have to study the extension of this work in order to be generally applicable to any P2P data management system.
Practical implications
This paper has mainly studied the quantitative gain that could be obtained in query processing from exploiting data summaries. Future works aim to implement this technique on real data (not synthetic) in order to study the qualitative gain that can be obtained from approximately answering a query.
Originality/value
The novelty of the approach shown in the paper relies on the double exploitation of the summaries in P2P systems: data summaries allow for a semantic‐based query routing, and also for an approximate query answering, using their intentional descriptions.
Details
Keywords
Contemporary copyright infringement has significantly changed in the digital era, and because of the unique attributes of internet piracy and method of exchange, traditional…
Abstract
Purpose
Contemporary copyright infringement has significantly changed in the digital era, and because of the unique attributes of internet piracy and method of exchange, traditional regulatory approaches are ineffective. The characteristics of digital goods enable users to almost costlessly copy and exchange content. Much of the contemporary research fails to incorporate the necessary components of exchange that are central to digital piracy. This paper aims to examine the role of peer-to-peer network hosts and the often-omitted cyberlocker.
Design/methodology/approach
A simple framework is constructed that describes how these entities how these entities facilitate digital piracy and operate financially. This framework illustrates the objectives of piracy mediators, highlighting the avenues by which regulation can craft policy. Additional examination of online piracy highlights the challenges of contemporary policy to combat digital piracy due to the secondary consequences.
Findings
Recent policies, aimed at diminishing piracy, would infringe on consumers’ privacy, hurt business finances or strategically used by rivals to hurt the operations of legal entities. Trying to prevent illegal sources (or facilitators) of pirate goods from providing access to files continues to be challenging. In many instances, the blurry line between a legal platform for file exchange and a piracy haven creates significant regulatory problems. For known piracy promoters (host sites or cyberlockers), location and revenue streams continue to limit direct intervention.
Originality/value
This paper discusses the necessary path for piracy to occur by including previously omitted agents necessary for communication and/or distribution. My analysis incorporates these entities that facilitate piracy and the unique features of digital exchange, which has industrial and regulatory implications. Furthermore, my results highlight why regulators have been ineffective in crafting meaningful anti-piracy policy.
Details
Keywords
Hung‐Chang Hsiao, Chung‐Ta King and Shih‐Yen Gao
Resource discovery in peer‐to‐peer (P2P) systems have been extensively studied. Unfortunately, most of the systems studied are not designed to take advantage of the heterogeneity…
Abstract
Resource discovery in peer‐to‐peer (P2P) systems have been extensively studied. Unfortunately, most of the systems studied are not designed to take advantage of the heterogeneity in peer nodes. In this paper, we propose a novel P2P overlay called RATTAN, which serves as an underlay of a Gnutella‐like network. RATTAN exploits the heterogeneity of peer nodes by structuring capable nodes as the core of the overlay. Using a tree‐like structure, RATTAN can maximize the search scope with a minimal number of query messages. We evaluate RATTAN with simulation. The experiments show the following interesting results. First, RATTAN is robust by exploiting redundant overlay links. Second, the maximum bandwidth demand for processing the protocol of a single RATTAN overlay is nearly 1M bits/sec. However, around 80% of the nodes merely take 66 bits/sec. One implication is that we can use a small number of relatively capable peers (e.g., stable machines with a 100M bits/sec network interface) to process the 1M bits/sec protocol overhead and serve other peers that only need to spend 66 bits/sec for processing protocol overhead.
Details
Keywords
Keita Matsuo, Leonard Barolli, Fatos Xhafa, Akio Koyama and Arjan Durresi
This work is motivated by the need to develop decentralized peer‐to‐peer (P2P) approaches to support e‐learning and teaching activity in virtual universities. This paper aims to…
Abstract
Purpose
This work is motivated by the need to develop decentralized peer‐to‐peer (P2P) approaches to support e‐learning and teaching activity in virtual universities. This paper aims to present the implementation of the JXTA‐based e‐learning P2P system.
Design/methodology/approach
The design and implementation of a smart box environment that will be used for stimulating the learners to increase the learning efficiency is shown. The smart box is integrated with the JXTA‐overlay by using efficient message sending between peers in the system.
Findings
The proposed e‐learning P2P system is a useful tool for monitoring and controlling learners' activity.
Research limitations/implications
In the future, other effective stimulation for each learner using IC tag card will be added. Also, the Servo Motor has 12 control ports, so these will be used for implementing other stimulating functions. It is planned to extend the system with functionalities for presence mechanism of students in classrooms and activities.
Practical implications
The proposed system is evaluated by experimental results and it has a good performance.
Originality/value
This paper proposes and implements a novel e‐learning system, which is based on P2P, web and sensor technologies.
Details
Keywords
Roman Shtykh, Guozhen Zhang and Qun Jin
In this study, we propose and develop an opensource groupware system called NetIsle. NetIsle is a general purpose groupware system for uniform open groups that integrate a number…
Abstract
In this study, we propose and develop an opensource groupware system called NetIsle. NetIsle is a general purpose groupware system for uniform open groups that integrate a number of tools for online collaboration to ensure fast information exchange and sharing, increase the productivity of working groups, and reduce maintenance and administration costs. The main technologies used for the construction of the system are peer‐to‐peer (P2P) and push, which are best fitted to those principles and beliefs we build our system upon.
Details