scholarly journals Simulative performance evaluation of a mobile peer-to-peer file-sharing system

Author(s):  
T. Hossfeld ◽  
K. Tutschku ◽  
F.-U. Andersen ◽  
H. de Meer ◽  
J.O. Oberender
Electronics ◽  
2020 ◽  
Vol 9 (10) ◽  
pp. 1610 ◽  
Author(s):  
Li-Yuan Hou ◽  
Tsung-Yi Tang ◽  
Tyng-Yeu Liang

BitTorrent (BT) is the most popular peer-to-peer file-sharing system. According to official BT information, more than 100 million active users use BT for file transfers every month. However, BT mainly relies on either a central tracker (tracker) or distributed hash table (DHT) for locating file seeders while it runs a risk of a single point of failure or cyber-attacks such as Sybil and Eclipses. To attack this problem, we proposed a Peer-to-Peer (P2P) file-sharing system called IOTA-BT by integrating BitTorrent with IOTA in this paper. The advantages of IOTA over blockchain include scalability for high throughput, compatibility with Internet of Things (IoT) footprints, zero transaction fees, partition-tolerant, and quantum-resistant cryptography. The autopeering and neighbor selection of the Coordicide of IOTA is aimed at defending a Sybil or Eclipse attack. IOTA-BT inherits these advantages from IOTA. Moreover, our experimental results have shown that the cost of executing BT functions, such as releasing torrent files and retrieving seeder information on IOTA-BT, is acceptable for improving the security of BT. IOTA-BT can indeed efficiently provide users with a P2P file-sharing environment of higher security.


2021 ◽  
Author(s):  
Khalid Abdel Hafeez

File sharing is one of the most popular applications in peer-to-peer networks where there is no control over what the peer can download or upload. This explains why file sharing got a high percentage of the overall internet traffic. Although file sharing is a legal technology, many users use it to share copyrighted materials and that's why many applications have been sued and shut down. In this thesis we will build a secure and legal file sharing system using Java bindings of JXTA protocols. The application security is derived from using digital certificates signed by a server peer who acts like a certificate authority (CA), all communications are encrypted using these digital certificates. The legal side is derived from the fact that each peer has a tokens account that will be updated and signed by the server peer only. The downloading peer has to pay some tokens for downloading a file to the uploading peer who then contacts the server peer to credit its commission from that payment. The server peer is the only one who can cash those payments to make the system forgery protected. The interaction between peers and the server peer could be on monthly basis so peers can download and upload files easliy and without the presence of the server. At the end we analyzed the security aspects and show how the implementation deals with most known peer-to-peer threats.


2021 ◽  
Author(s):  
Khalid Abdel Hafeez

File sharing is one of the most popular applications in peer-to-peer networks where there is no control over what the peer can download or upload. This explains why file sharing got a high percentage of the overall internet traffic. Although file sharing is a legal technology, many users use it to share copyrighted materials and that's why many applications have been sued and shut down. In this thesis we will build a secure and legal file sharing system using Java bindings of JXTA protocols. The application security is derived from using digital certificates signed by a server peer who acts like a certificate authority (CA), all communications are encrypted using these digital certificates. The legal side is derived from the fact that each peer has a tokens account that will be updated and signed by the server peer only. The downloading peer has to pay some tokens for downloading a file to the uploading peer who then contacts the server peer to credit its commission from that payment. The server peer is the only one who can cash those payments to make the system forgery protected. The interaction between peers and the server peer could be on monthly basis so peers can download and upload files easliy and without the presence of the server. At the end we analyzed the security aspects and show how the implementation deals with most known peer-to-peer threats.


Sign in / Sign up

Export Citation Format

Share Document