A New Eager Replication Approach Using a Non-Blocking Protocol Over a Decentralized P2P Architecture

2020 ◽  
Vol 11 (2) ◽  
pp. 69-100
Author(s):  
Katembo Kituta Ezéchiel ◽  
Shri Kant Ojha ◽  
Ruchi Agarwal

Eager replication of distributed databases over a decentralized Peer-to-Peer (P2P) network is often likely to generate unreliability because participants can be or cannot be available. Moreover, the conflict between transactions initiated by different peers to modify the same data is probable. These problems are responsible of perpetual transaction abortion. Thus, a new Four-Phase-Commit (4PC) protocol that allows transaction commitment with available peers and recovering unavailable peers when they become available again has been designed using the nested transactions and the distributed voting technique. After implementing the new algorithm with C#, experiments made it possible to analyse the performance which revealed that the new algorithm is efficient because in one second it can replicate a considerable number of records, such as when an important volume of data can be queued for subsequent recovery of the concerned slave peers when they become available again.

2018 ◽  
Vol 7 (2.7) ◽  
pp. 1051
Author(s):  
Gera Jaideep ◽  
Bhanu Prakash Battula

Peer to Peer (P2P) network in the real world is a class of systems that are made up of thousands of nodes in distributed environments. The nodes are decentralized in nature. P2P networks are widely used for sharing resources and information with ease. Gnutella is one of the well known examples for such network. Since these networks spread across the globe with large scale deployment of nodes, adversaries use them as a vehicle to launch DDoS attacks. P2P networks are exploited to make attacks over hosts that provide critical services to large number of clients across the globe. As the attacker does not make a direct attack it is hard to detect such attacks and considered to be high risk threat to Internet based applications. Many techniques came into existence to defeat such attacks. Still, it is an open problem to be addressed as the flooding-based DDoS is difficult to handle as huge number of nodes are compromised to make attack and source address spoofing is employed. In this paper, we proposed a framework to identify and secure P2P communications from a DDoS attacks in distributed environment. Time-to-Live value and distance between source and victim are considered in the proposed framework. A special agent is used to handle information about nodes, their capacity, and bandwidth for efficient trace back. A Simulation study has been made using NS2 and the experimental results reveal the significance of the proposed framework in defending P2P network and target hosts from high risk DDoS attacks.  


Author(s):  
Federico Franzoni ◽  
Xavier Salleras ◽  
Vanesa Daza

AbstractOver the past decade, the Bitcoin P2P network protocol has become a reference model for all modern cryptocurrencies. While nodes in this network are known, the connections among them are kept hidden, as it is commonly believed that this helps protect from deanonymization and low-level attacks. However, adversaries can bypass this limitation by inferring connections through side channels. At the same time, the lack of topology information hinders the analysis of the network, which is essential to improve efficiency and security. In this paper, we thoroughly review network-level attacks and empirically show that topology obfuscation is not an effective countermeasure. We then argue that the benefits of an open topology potentially outweigh its risks, and propose a protocol to reliably infer and monitor connections among reachable nodes of the Bitcoin network. We formally analyze our protocol and experimentally evaluate its accuracy in both trusted and untrusted settings. Results show our system has a low impact on the network, and has precision and recall are over 90% with up to 20% of malicious nodes in the network.


Author(s):  
Rajendra G. Singh ◽  
Margaret A. Bernard

In this research, improving on the quality of Reusable Learning Objects (RLOs) on a Peer-To-Peer (P2P) network is considered. The RLO was first redesigned to have a fundamentally inherent pedagogical structure, which gave it an immediate foundational level of quality in terms of opportunities related to reusability. Applying the Learning Object Review Instrument 1.5 (LORI 1.5) demonstrated that some of the elements are inherent in this new RLO design, so there was no need to constantly have such features evaluated with LORI. A modified LORI was therefore developed in order to evaluate the remaining features of the RLO. The research identified these remaining elements to produce a Review Rubric for scoring the RLO’s quality. In addition, an algorithm is given which considers one or more subject-matter experts as part of a review process. Utilizing the subject-matter experts in a P2P network involved the creation of special nodes to ensure data integrity and post-availability of the review scores for RLOs. The research concludes that the redesigned RLOs along with the corresponding Review Rubric and scoring algorithm produces a system suitable for a P2P network, where for the first time, RLOs can be shared of assured quality to promote eLearning within P2P networks.


Author(s):  
Jinsu Kim Et.al

In the case of a general goods carry-in/out management system, each device is registered by assigning a unique number to RFID, and is managed as data from a server. In this method, a single server is used, and integrity corruption behavior may occur due to errors of the single server or external attacks. Blockchain uses a peer-to-peer (P2P) network to strengthen data integrity through consensus between each client. In addition, since it does not rely on a single server, the availability of a single system can be improved in that the error of a single system does not significantly affect the entire network. In order to prevent damage to the integrity of the system, we propose a mechanism to strengthen integrity through blockchain


2011 ◽  
Vol 3 (2) ◽  
pp. 56-63
Author(s):  
Mark Scanlon ◽  
Alan Hannaway ◽  
Mohand-Tahar Kechadi

The popularity of Peer-to-Peer (P2P) Internet communication technologies being exploited to aid cybercrime is ever increasing. P2P systems can be used or exploited to aid in the execution of a large number of online criminal activities, e.g., copyright infringement, fraud, malware and virus distribution, botnet creation, and control. P2P technology is perhaps most famous for the unauthorised distribution of copyrighted materials since the late 1990’s, with the popularity of file-sharing programs such as Napster. In 2004, P2P traffic accounted for 80% of all Internet traffic and in 2005, specifically BitTorrent traffic accounted for over 60% of the world’s P2P bandwidth usage. This paper outlines a methodology for investigating a documented P2P network, BitTorrent, using a sample investigation for reference throughout. The sample investigation outlined was conducted on the top 100 most popular BitTorrent swarms over the course of a one week period.


Author(s):  
Ricci S.C. Ieong ◽  
Pierre K.Y. Lai ◽  
K. P. Chow ◽  
Michael Y.K. Kwan ◽  
Frank Y.W. Law

The community of peer-to-peer (P2P) file-sharing networks has been expanding swiftly since the appearance of the very first P2P application (Napster) in 2001. These networks are famous for their excellent file transfer rates and adversely, the flooding of copyright-infringed digital materials. Recently, a number of documents containing personal data or sensitive information have been shared in an unbridled manner over the Foxy network (a popular P2P network in Chinese regions). These incidents have urged the authors to develop an investigation model for tracing suspicious P2P activities. Unfortunately, hindered by the distributed design and anonymous nature of these networks, P2P investigation can be practically difficult and complicated. In this chapter, the authors briefly review the characteristics of current P2P networks. By observing the behaviors of these networks, they propose some heuristic rules for identifying the first uploader of a shared file. Also, the rules have been demonstrated to be applicable to some simulated cases. The authors believe their findings provide a foundation for future development in P2P file-sharing networks investigation.


Author(s):  
Pallavi Priyadarshini ◽  
Mark Stamp

Peer-to-peer (P2P) networks have proliferated and become ubiquitous. A school of thought has emerged that harnessing the established user-base and ease of content dissemination of such networks presents a potentially lucrative opportunity. However, content creators have been reluctant to adopt P2P networks as a distribution vehicle since these networks are plagued with piracy. This chapter focuses on developing a solution for distributing digital content in P2P networks in a way that established businesses and amateur artists alike can profit. We propose a content distribution system that employs Digital Rights Management (DRM) technologies and is independent of the underlying P2P network. Our system relies on innovative uses of security technologies to deter piracy. In addition, we include various non-technical features that encourage users to “play by the rules”.


Author(s):  
Ioannis Karydis

In this chapter we present the most significant trends in recent research in the field of content-based music information retrieval in peer-to-peer networks. Despite the diminished attention the area has received in general terms, the relatively close area of metadata MIR in P2P is by far new. As metadata prove to be inefficient for the purposes of MIR as well as the peculiarities of music in comparison to text and image data, developing dedicated solutions for CBMIR in P2P networks becomes a necessity while the challenges faced therein, unique. Depending on the type of P2P network, a number of prominent research works are presented and compared in this chapter.


Author(s):  
Shanthi Makka ◽  
Gagandeep Arora ◽  
B. B. Sagar

Blockchain technology makes use of a centralized, peer-to-peer (P2P) network of databases, also called nodes, to validate and record digital transactions between individual users located anywhere across the globe. These transactions often take place through the exchange of cryptocurrencies such as bitcoins, Ethereum, and Ripple, etc. The security and transparency that is inherently present in digital transactions place blockchain technology in high demand across various industrial applications. Each node updates its database in real-time as and when transactions occur. The transaction gets authorized only when a majority of the nodes in the network validate the transaction. Once the verification is complete, a block, consisting of hash and keys, is generated for each new transaction and is linked to previous transactions in every database. Every node updates its database with the new block. A hacker would have to break down every node in the system to commit fraud. Blockchain could play a major role in maintaining the cyber security of digital transactions in the future.


Sign in / Sign up

Export Citation Format

Share Document