p2p networks
Recently Published Documents


TOTAL DOCUMENTS

1406
(FIVE YEARS 70)

H-INDEX

32
(FIVE YEARS 3)

2021 ◽  
Vol 2021 ◽  
pp. 1-22
Author(s):  
Jinwen Xi ◽  
Shihong Zou ◽  
Guoai Xu ◽  
Yanhui Guo ◽  
Yueming Lu ◽  
...  

Blockchain technology has been widely used in many fields, such as smart cities, smart health care, and smart manufacturing, due to its anonymity, decentralization, and tamper resistance in peer-to-peer (P2P) networks. However, poor scalability has severely affected the widespread adoption of traditional blockchain technology in high-throughput and low-latency applications. Therefore, based on the three-layer architecture, this study presents a variety of solutions to improve the scalability of the blockchain. As the scale of the network expands, one of the most practical ways to achieve horizontal scalability is sharding, where the network is divided into multiple subnetworks to avoid repeated communication overhead, storage, and calculations. This study provides a systematic and comprehensive introduction to blockchain sharding, along with a detailed comparison and evaluation for primarily considered sharding mechanisms. We also provide the detailed calculations and then analyze the characteristics of existing solutions along with our insights.


2021 ◽  
Vol 11 (23) ◽  
pp. 11527
Author(s):  
Eunsam Kim ◽  
Yunho Cho ◽  
Hyoseop Shin

Distributed appliances connected to the Internet have provided various multimedia services. In particular, networked Personal Video Recorders (PVRs) can store broadcast TV programs in their storage devices or receive them from central servers, enabling people to watch the programs they want at any desired time. However, the conventional CDNs capable of supporting a large number of concurrent users have limitations in scalability because more servers are required in proportion to the increased users. To address this problem, we have developed a time-shifted live streaming system over P2P networks so that PVRs can share TV programs with each other. We propose cooperative buffering schemes to provide the streaming services for time-shifted periods even when the number of PVRs playing back at the periods is not sufficient; we do so by utilizing the idle resources of the PVRs playing at the live broadcast time. To determine which chunks to be buffered, they consider the degree of deficiency and proximity and the ratio of playback requests to chunk copies. Through extensive simulations, we show that our proposed buffering schemes can significantly extend the time-shifting hours and compare the performance of two buffering schemes in terms of playback continuity and startup delay.


10.2196/24460 ◽  
2021 ◽  
Vol 23 (11) ◽  
pp. e24460
Author(s):  
Imrana Abdullahi Yari ◽  
Tobias Dehling ◽  
Felix Kluge ◽  
Juergen Geck ◽  
Ali Sunyaev ◽  
...  

Background Patient-centered health care information systems (PHSs) enable patients to take control and become knowledgeable about their own health, preferably in a secure environment. Current and emerging PHSs use either a centralized database, peer-to-peer (P2P) technology, or distributed ledger technology for PHS deployment. The evolving COVID-19 decentralized Bluetooth-based tracing systems are examples of disease-centric P2P PHSs. Although using P2P technology for the provision of PHSs can be flexible, scalable, resilient to a single point of failure, and inexpensive for patients, the use of health information on P2P networks poses major security issues as users must manage information security largely by themselves. Objective This study aims to identify the inherent security issues for PHS deployment in P2P networks and how they can be overcome. In addition, this study reviews different P2P architectures and proposes a suitable architecture for P2P PHS deployment. Methods A systematic literature review was conducted following PRISMA (Preferred Reporting Items for Systematic Reviews and Meta-Analyses) reporting guidelines. Thematic analysis was used for data analysis. We searched the following databases: IEEE Digital Library, PubMed, Science Direct, ACM Digital Library, Scopus, and Semantic Scholar. The search was conducted on articles published between 2008 and 2020. The Common Vulnerability Scoring System was used as a guide for rating security issues. Results Our findings are consolidated into 8 key security issues associated with PHS implementation and deployment on P2P networks and 7 factors promoting them. Moreover, we propose a suitable architecture for P2P PHSs and guidelines for the provision of PHSs while maintaining information security. Conclusions Despite the clear advantages of P2P PHSs, the absence of centralized controls and inconsistent views of the network on some P2P systems have profound adverse impacts in terms of security. The security issues identified in this study need to be addressed to increase patients’ intention to use PHSs on P2P networks by making them safe to use.


Author(s):  
Savinay Mengi ◽  
Astha Gupta

A Blockchain protocol operates on top of the Internet, on a P2P network of computers that all run the protocol and hold an identical copy of the ledger of transactions, enabling P2P value transactions without a middleman though machine consensus. The concept of Blockchain first came to fame in October 2008, as part of a proposal for Bitcoin, with the aim to create P2P money without banks. Bitcoin introduced a novel solution to the age-old human problem of trust. The underlying blockchain technology allows us to trust the outputs of the system without trusting any actor within it. People and institutions who do not know or trust each other, reside in different countries, are subject to different jurisdictions, and who have no legally binding agreements with each other, can now interact over the Internet without the need for trusted third parties like banks, Internet platforms, or other types of clearing institutions. Ideas around cryptographically secured P2P networks have been discussed in the academic environment in different evolutionary stages, mostly in theoretical papers, since the 1980s. “Proof-of-Work” is the consensus mechanism that enables distributed control over the ledger. It is based on a combination of economic incentives and cryptography. Blockchain is a shared, trusted, public ledger of transactions, that everyone can inspect but which no single user controls. It is a distributed database that maintains a continuously growing list of transaction data records, cryptographically secured from tampering and revision.


Author(s):  
Tommi Meskanen ◽  
Jarkko Kuusijärvi ◽  
Valtteri Niemi

The need for peer-to-peer (p2p) communications is obvious because current centralized solutions are capturing and storing too much information from individuals communicating with each other. HELIOS platform introduces a new social media platform that is not controlled by any central operator but brings the power of possession of the data back to the users. It does not have centralized servers that store and handle receiving/sending of the messages. Instead, HELIOS platform relies on the current open-source solutions available in the p2p communities to propagate the messages to the wanted recipients of the data and/or messages. The authors of this paper propose a set of protocols to help answer one specific problem related to p2p communication. Especially, this paper proposes how to privately share data (end-point address or other) of the user with such other users who have previously connected with the user securely, either offline or online.


2021 ◽  
Vol 13 (04) ◽  
pp. 23-40
Author(s):  
Oladotun Aluko ◽  
Anton Kolonin

Blockchains combine other technologies, such as cryptography, networking, and incentive mechanisms, to enable the creation, validation, and recording of transactions between participating nodes. A consensus algorithm is used in a blockchain system to determine the shared state among distributed nodes. An important component underlying any blockchain-based system is its consensus mechanism, which principally determines the performance and security of the overall system. As the nature of peer-topeer(P2P) networks is open and dynamic, the security risk within that environment is greatly increased mostly because nodes can join and leave the network at will. Thus, it is important to have a system that can check against malicious behaviour. In this work, we propose a reputation-based consensus mechanism for blockchain-based systems, Proof-of-Reputation(PoR) where the nodes with the highest reputation values eventually become part of a consensus group that determines the state of the blockchain.


2021 ◽  
Vol 2021 ◽  
pp. 1-13
Author(s):  
Lin Zhang ◽  
Xinyan Wei ◽  
Yanwen Huang ◽  
Haiping Huang ◽  
Xiong Fu ◽  
...  

Due to the lack of trusted third parties as guarantees in peer-to-peer (P2P) networks, how to ensure trusted transactions between peers has become a research hotspot. However, the open and distributed characteristics of P2P networks have brought challenges to network security, and there are problems such as node fraud and unavailability of services in the network. To solve the problem of how to select trusted transaction peers in P2P groups, a new trust model, GT-Bidding, is proposed in this paper. This model follows the bidding process of human society. First, each service peer applies for a group of guarantee peers and carries out credit mortgages for this service. Second, based on the entropy and TOPSIS method (Technology for Order Preference by Similarity to an Ideal Solution) approaching the ideal solution, a set of ideal trading sequences is selected. Then, the transaction impact function is used to assign weights to the selected guarantee peers and service nodes, respectively; thus, the comprehensive trust of each service node can be calculated. Finally, the service peer is verified using feedback based on the specific confidence level, which encourages the reputation of the service and its guarantee peers to update. Experiments show that GT-Bidding improves the successful transaction rate and resists complex attacks.


2021 ◽  
Author(s):  
Hiroki Hanawa ◽  
Takumi Miyoshi ◽  
Taku Yamazaki ◽  
Thomas Silverston

Sign in / Sign up

Export Citation Format

Share Document