Search results

1 – 10 of over 1000
Article
Publication date: 2 October 2007

Daniel O. Rice

The purpose of this paper is to present a P2P network security pricing model that promotes more secure online information sharing in P2P networks through the creation of networks

1670

Abstract

Purpose

The purpose of this paper is to present a P2P network security pricing model that promotes more secure online information sharing in P2P networks through the creation of networks with increased resistance to malicious code propagation. Online information sharing is at an all‐time high partly due to the recent growth in, and use of, online peer‐to‐peer (P2P) networks.

Design/methodology/approach

The model integrates current research findings in incentive compatible network pricing with recent developments in complex network theory. File download prices in P2P networks are linked to network security using a graph theory measurement called the Pearson coefficient. The Pearson coefficient indicates a structural dimension of scale‐free networks (scale‐free networks like the internet) called preferential attachment. Preferential attachment refers to the network property where the probability for a node to connect to a new node is greater if the new node already has a high number of connections.

Findings

The P2P network security pricing model concept is illustrated to show how the model functions to create more secure P2P networks.

Research limitations/implications

Future research in P2P network security pricing should focus on testing the model presented in this paper by numerical experiments and simulation including the tracking of malicious code propagation on networks grown under the pricing model.

Originality/value

The P2P network security pricing model demonstrated here is a different approach to network security that has a strong potential to impact on the future security of P2P and other computer based networks.

Details

Online Information Review, vol. 31 no. 5
Type: Research Article
ISSN: 1468-4527

Keywords

Article
Publication date: 1 March 2013

Xiao‐song Zhang, Ting Chen, Chun‐xiang Xu, Xiao‐hui Pan and Xue‐yang Wu

Nowadays, proactive P2P worm (PRWORM) poses a latent threat to internet infrastructure and common users for the fatal vulnerabilities in homogeneous P2P software. It is more…

Abstract

Purpose

Nowadays, proactive P2P worm (PRWORM) poses a latent threat to internet infrastructure and common users for the fatal vulnerabilities in homogeneous P2P software. It is more difficult to contain PRWORM because of its fast spread speed. Current techniques are not adequate to quarantine PRWORM, mainly because of their inaccuracy and slow response to attacks. The purpose of this paper is to propose an accurate and real‐time approach for PRWORM containment.

Design/methodology/approach

First, the authors present a new methodology to contain PRWORM via proper authentication of initiators of P2P communications. Second, three simple network protocols are proposed to fulfill automatic authentication.

Findings

Both simulations and strictly mathematical proof by Strand Space Model represent that the authors' work is able to accurately quarantine PRWORM in real time. Furthermore, proof shows the three network protocols are resistant to popular attacks such as man‐in‐the‐middle attack and replay attack.

Originality/value

First, the authors propose an authentication based method to contain proactive P2P worm and second, use strand space model to proof the effectiveness and security of the method.

Details

COMPEL - The international journal for computation and mathematics in electrical and electronic engineering, vol. 32 no. 2
Type: Research Article
ISSN: 0332-1649

Keywords

Article
Publication date: 1 April 2002

Ying Dong, Mingshu Li, Meizhang Chen and Shengli Zheng

The Napster case has drawn enormous attention to digital intellectual property right problems of online file swapping. These peer‐to‐peer network technologies represent a powerful…

3131

Abstract

The Napster case has drawn enormous attention to digital intellectual property right problems of online file swapping. These peer‐to‐peer network technologies represent a powerful new paradigm for networking. In this paper, we try to figure out the intellectual property right problems of peer‐to‐peer network, in order to deal with potential digital piracy to avoid similar litigation. If libraries can embrace peer‐to‐peer technologies into their own services, they will possibly develop new service models, or improve existing ones.

Details

The Electronic Library, vol. 20 no. 2
Type: Research Article
ISSN: 0264-0473

Keywords

Article
Publication date: 1 February 2004

William T. Rupp and Alan D. Smith

Any solution that will solve the problem the entertainment industry is currently facing will need to address the underlying theme in the decline of self‐policing and morally…

5551

Abstract

Any solution that will solve the problem the entertainment industry is currently facing will need to address the underlying theme in the decline of self‐policing and morally acceptable behavior in terms of intellectual rights. It has become a norm to download music off the Internet and transfer them onto compact discs (CDs) without compensating the artist who created the music or the firms that created, packaged, promoted, and distributed the music materials. Within the repackaged application will be technology that will allow the consumer to sample the product as well as make a purchase instantly over the Internet. This will benefit the entertainment industry in several ways: expanding the number of distribution channels (providing greater reach); utilizing the P2P‐related networks to their advantage rather than disadvantage (providing greater richness); opening international markets with relative ease; and providing faster delivery times and the ability to provide a much richer content than what is currently offered. Through a succession of models, the basic conclusion is that the Internet plays a much more important role with regards the entertainment industry than currently believed. Although the artists should rightfully be compensated for their artistic talents, it is time that a new model is created to compensate them, since the existing model is not going to work due to the inadequacies of the current distribution channels that are being used by the entertainment industry.

Details

Information Management & Computer Security, vol. 12 no. 1
Type: Research Article
ISSN: 0968-5227

Keywords

Article
Publication date: 23 October 2007

Rosa Ma Martín, Josep Casanovas, José Francisco Crespo and Joan Giralt

This paper aims to present the outcome of the i2CAT Foundations' research and innovation projects that use JXTA P2P technology to share audiovisual content.

Abstract

Purpose

This paper aims to present the outcome of the i2CAT Foundations' research and innovation projects that use JXTA P2P technology to share audiovisual content.

Design/methodology/approach

The project consisted of designing and developing a distributed application named eRuc that allows management and sharing of audiovisual content.

Findings

The paper finds that JXTA is suitable to develop P2P applications that share audiovisual files or that interact with different kind of devices. JXTA services and protocols provide an easy integration with other P2P services and a gain of independence from the topology of the physical network (NAT, firewalls, etc.).

Research limitations/implications

High‐quality streaming requires specifically designed P2P architectures. Further testing needs to be performed to evaluate whether the use of JXTA, together with proven, efficient P2P streaming architectures, affect the efficiency of the P2P streaming system.

Practical/implications

P2P technologies have proven to be very efficient for some kind of applications. However, there are no standard frameworks for interoperability and application development may become difficult. JXTA P2P technologies facilitate application development and integration. The authors have used JXTA in different scenarios related with audiovisual content sharing and have proven its suitability. The current work is focused in P2P streaming. Previous literature suggests that there are some proven architectures for P2P life streaming. Using JXTA together with them may prove if JTXA is suitable for applications that require high bandwidth and minimum delay.

Originality/value

The paper provides information of value to information management and technology professionals.

Details

Internet Research, vol. 17 no. 5
Type: Research Article
ISSN: 1066-2243

Keywords

Article
Publication date: 21 November 2008

Rabab Hayek, Guillaume Raschia, Patrick Valduriez and Noureddine Mouaddib

The goal of this paper is to contribute to the development of both data localization and description techniques in P2P systems.

Abstract

Purpose

The goal of this paper is to contribute to the development of both data localization and description techniques in P2P systems.

Design/methodology/approach

The approach consists of introducing a novel indexing technique that relies on linguistic data summarization into the context of P2P systems.

Findings

The cost model of the approach, as well as the simulation results have shown that the approach allows the efficient maintenance of data summaries, without incurring high traffic overhead. In addition, the cost of query routing is significantly reduced in the context of summaries.

Research limitations/implications

The paper has considered a summary service defined on the APPA's architecture. Future works have to study the extension of this work in order to be generally applicable to any P2P data management system.

Practical implications

This paper has mainly studied the quantitative gain that could be obtained in query processing from exploiting data summaries. Future works aim to implement this technique on real data (not synthetic) in order to study the qualitative gain that can be obtained from approximately answering a query.

Originality/value

The novelty of the approach shown in the paper relies on the double exploitation of the summaries in P2P systems: data summaries allow for a semantic‐based query routing, and also for an approximate query answering, using their intentional descriptions.

Details

International Journal of Pervasive Computing and Communications, vol. 4 no. 4
Type: Research Article
ISSN: 1742-7371

Keywords

Article
Publication date: 4 September 2019

Jason M. Walter

Contemporary copyright infringement has significantly changed in the digital era, and because of the unique attributes of internet piracy and method of exchange, traditional…

Abstract

Purpose

Contemporary copyright infringement has significantly changed in the digital era, and because of the unique attributes of internet piracy and method of exchange, traditional regulatory approaches are ineffective. The characteristics of digital goods enable users to almost costlessly copy and exchange content. Much of the contemporary research fails to incorporate the necessary components of exchange that are central to digital piracy. This paper aims to examine the role of peer-to-peer network hosts and the often-omitted cyberlocker.

Design/methodology/approach

A simple framework is constructed that describes how these entities how these entities facilitate digital piracy and operate financially. This framework illustrates the objectives of piracy mediators, highlighting the avenues by which regulation can craft policy. Additional examination of online piracy highlights the challenges of contemporary policy to combat digital piracy due to the secondary consequences.

Findings

Recent policies, aimed at diminishing piracy, would infringe on consumers’ privacy, hurt business finances or strategically used by rivals to hurt the operations of legal entities. Trying to prevent illegal sources (or facilitators) of pirate goods from providing access to files continues to be challenging. In many instances, the blurry line between a legal platform for file exchange and a piracy haven creates significant regulatory problems. For known piracy promoters (host sites or cyberlockers), location and revenue streams continue to limit direct intervention.

Originality/value

This paper discusses the necessary path for piracy to occur by including previously omitted agents necessary for communication and/or distribution. My analysis incorporates these entities that facilitate piracy and the unique features of digital exchange, which has industrial and regulatory implications. Furthermore, my results highlight why regulators have been ineffective in crafting meaningful anti-piracy policy.

Details

Digital Policy, Regulation and Governance, vol. 21 no. 5
Type: Research Article
ISSN: 2398-5038

Keywords

Article
Publication date: 1 May 2005

Hung‐Chang Hsiao, Chung‐Ta King and Shih‐Yen Gao

Resource discovery in peer‐to‐peer (P2P) systems have been extensively studied. Unfortunately, most of the systems studied are not designed to take advantage of the heterogeneity…

Abstract

Resource discovery in peer‐to‐peer (P2P) systems have been extensively studied. Unfortunately, most of the systems studied are not designed to take advantage of the heterogeneity in peer nodes. In this paper, we propose a novel P2P overlay called RATTAN, which serves as an underlay of a Gnutella‐like network. RATTAN exploits the heterogeneity of peer nodes by structuring capable nodes as the core of the overlay. Using a tree‐like structure, RATTAN can maximize the search scope with a minimal number of query messages. We evaluate RATTAN with simulation. The experiments show the following interesting results. First, RATTAN is robust by exploiting redundant overlay links. Second, the maximum bandwidth demand for processing the protocol of a single RATTAN overlay is nearly 1M bits/sec. However, around 80% of the nodes merely take 66 bits/sec. One implication is that we can use a small number of relatively capable peers (e.g., stable machines with a 100M bits/sec network interface) to process the 1M bits/sec protocol overhead and serve other peers that only need to spend 66 bits/sec for processing protocol overhead.

Details

International Journal of Pervasive Computing and Communications, vol. 1 no. 2
Type: Research Article
ISSN: 1742-7371

Keywords

Article
Publication date: 29 August 2008

Keita Matsuo, Leonard Barolli, Fatos Xhafa, Akio Koyama and Arjan Durresi

This work is motivated by the need to develop decentralized peer‐to‐peer (P2P) approaches to support e‐learning and teaching activity in virtual universities. This paper aims to…

Abstract

Purpose

This work is motivated by the need to develop decentralized peer‐to‐peer (P2P) approaches to support e‐learning and teaching activity in virtual universities. This paper aims to present the implementation of the JXTA‐based e‐learning P2P system.

Design/methodology/approach

The design and implementation of a smart box environment that will be used for stimulating the learners to increase the learning efficiency is shown. The smart box is integrated with the JXTA‐overlay by using efficient message sending between peers in the system.

Findings

The proposed e‐learning P2P system is a useful tool for monitoring and controlling learners' activity.

Research limitations/implications

In the future, other effective stimulation for each learner using IC tag card will be added. Also, the Servo Motor has 12 control ports, so these will be used for implementing other stimulating functions. It is planned to extend the system with functionalities for presence mechanism of students in classrooms and activities.

Practical implications

The proposed system is evaluated by experimental results and it has a good performance.

Originality/value

This paper proposes and implements a novel e‐learning system, which is based on P2P, web and sensor technologies.

Details

International Journal of Web Information Systems, vol. 4 no. 3
Type: Research Article
ISSN: 1744-0084

Keywords

Article
Publication date: 1 August 2005

Roman Shtykh, Guozhen Zhang and Qun Jin

In this study, we propose and develop an opensource groupware system called NetIsle. NetIsle is a general purpose groupware system for uniform open groups that integrate a number…

Abstract

In this study, we propose and develop an opensource groupware system called NetIsle. NetIsle is a general purpose groupware system for uniform open groups that integrate a number of tools for online collaboration to ensure fast information exchange and sharing, increase the productivity of working groups, and reduce maintenance and administration costs. The main technologies used for the construction of the system are peer‐to‐peer (P2P) and push, which are best fitted to those principles and beliefs we build our system upon.

Details

International Journal of Pervasive Computing and Communications, vol. 1 no. 3
Type: Research Article
ISSN: 1742-7371

Keywords

1 – 10 of over 1000