Secure Mobile Agent System in Peer-to-Peer Networks: A Review of Security Mechanisms Based on Several Security Issues

Author(s):  
Dewi Agushinta R. ◽  
Adang Suhendra ◽  
Addien Febrinata ◽  
Anne Yuliyanti
2011 ◽  
pp. 131-144
Author(s):  
Sridhar Asvathanarayanan

Computing strategies have constantly undergone changes, from being completely centralized to client-servers and now to peer-to-peer networks. Databases on peer-to-peer networks offer significant advantages in terms of providing autonomy to data owners, to store and manage the data that they work with and, at the same time, allow access to others. The issue of database security becomes a lot more complicated and the vulnerabilities associated with databases are far more pronounced when considering databases on a peer-to-peer network. Issues associated with database security in a peer-to-peer environment could be due to file sharing, distributed denial of service, and so forth, and trust plays a vital role in ensuring security. The components of trust in terms of authentication, authorization, and encryption offer methods to ensure security.


Author(s):  
Anupriya Koneru ◽  
MHM Krishna Prasad

P2P communities can be seen as truly Distributed Computing applications in which group members communicate with one another to exchange information. The authors consider security issues in Peer to Peer Networks. For secure exchange of data between the group members the authors present a cryptography protocol and an Identity mechanism which can able to check even the Trust of the Peers based on the available reputation information. The authors are encapsulating the reputations of both the provider and the requester. So the requester cannot (gainfully) maliciously abort the transaction in the middle. In other words, the requester cannot take the service from the provider and then logoff without giving a recommendation to the provider.


2008 ◽  
pp. 1070-1079
Author(s):  
Sridhar Asvathanarayanan

Computing strategies have constantly undergone changes, from being completely centralized to client-servers and now to peer-to-peer networks. Databases on peer-to-peer networks offer significant advantages in terms of providing autonomy to data owners, to store and manage the data that they work with and, at the same time, allow access to others. The issue of database security becomes a lot more complicated and the vulnerabilities associated with databases are far more pronounced when considering databases on a peer-to-peer network. Issues associated with database security in a peer-to-peer environment could be due to file sharing, distributed denial of service, and so forth, and trust plays a vital role in ensuring security. The components of trust in terms of authentication, authorization, and encryption offer methods to ensure security.


2008 ◽  
Vol 19 (9) ◽  
pp. 2376-2388 ◽  
Author(s):  
Zhen-Hua LI ◽  
Gui-Hai CHEN ◽  
Tong-Qing QIU

2014 ◽  
Vol 36 (7) ◽  
pp. 1456-1464 ◽  
Author(s):  
Da-Peng QU ◽  
Xing-Wei WANG ◽  
Min HUANG

2010 ◽  
Vol 33 (2) ◽  
pp. 345-355 ◽  
Author(s):  
Chun-Qi TIAN ◽  
Jian-Hui JIANG ◽  
Zhi-Guo HU ◽  
Feng LI

Sign in / Sign up

Export Citation Format

Share Document