file sharing system
Recently Published Documents


TOTAL DOCUMENTS

122
(FIVE YEARS 16)

H-INDEX

11
(FIVE YEARS 1)

2021 ◽  
Author(s):  
Khalid Abdel Hafeez

File sharing is one of the most popular applications in peer-to-peer networks where there is no control over what the peer can download or upload. This explains why file sharing got a high percentage of the overall internet traffic. Although file sharing is a legal technology, many users use it to share copyrighted materials and that's why many applications have been sued and shut down. In this thesis we will build a secure and legal file sharing system using Java bindings of JXTA protocols. The application security is derived from using digital certificates signed by a server peer who acts like a certificate authority (CA), all communications are encrypted using these digital certificates. The legal side is derived from the fact that each peer has a tokens account that will be updated and signed by the server peer only. The downloading peer has to pay some tokens for downloading a file to the uploading peer who then contacts the server peer to credit its commission from that payment. The server peer is the only one who can cash those payments to make the system forgery protected. The interaction between peers and the server peer could be on monthly basis so peers can download and upload files easliy and without the presence of the server. At the end we analyzed the security aspects and show how the implementation deals with most known peer-to-peer threats.


2021 ◽  
Author(s):  
Khalid Abdel Hafeez

File sharing is one of the most popular applications in peer-to-peer networks where there is no control over what the peer can download or upload. This explains why file sharing got a high percentage of the overall internet traffic. Although file sharing is a legal technology, many users use it to share copyrighted materials and that's why many applications have been sued and shut down. In this thesis we will build a secure and legal file sharing system using Java bindings of JXTA protocols. The application security is derived from using digital certificates signed by a server peer who acts like a certificate authority (CA), all communications are encrypted using these digital certificates. The legal side is derived from the fact that each peer has a tokens account that will be updated and signed by the server peer only. The downloading peer has to pay some tokens for downloading a file to the uploading peer who then contacts the server peer to credit its commission from that payment. The server peer is the only one who can cash those payments to make the system forgery protected. The interaction between peers and the server peer could be on monthly basis so peers can download and upload files easliy and without the presence of the server. At the end we analyzed the security aspects and show how the implementation deals with most known peer-to-peer threats.


Electronics ◽  
2020 ◽  
Vol 9 (10) ◽  
pp. 1610 ◽  
Author(s):  
Li-Yuan Hou ◽  
Tsung-Yi Tang ◽  
Tyng-Yeu Liang

BitTorrent (BT) is the most popular peer-to-peer file-sharing system. According to official BT information, more than 100 million active users use BT for file transfers every month. However, BT mainly relies on either a central tracker (tracker) or distributed hash table (DHT) for locating file seeders while it runs a risk of a single point of failure or cyber-attacks such as Sybil and Eclipses. To attack this problem, we proposed a Peer-to-Peer (P2P) file-sharing system called IOTA-BT by integrating BitTorrent with IOTA in this paper. The advantages of IOTA over blockchain include scalability for high throughput, compatibility with Internet of Things (IoT) footprints, zero transaction fees, partition-tolerant, and quantum-resistant cryptography. The autopeering and neighbor selection of the Coordicide of IOTA is aimed at defending a Sybil or Eclipse attack. IOTA-BT inherits these advantages from IOTA. Moreover, our experimental results have shown that the cost of executing BT functions, such as releasing torrent files and retrieving seeder information on IOTA-BT, is acceptable for improving the security of BT. IOTA-BT can indeed efficiently provide users with a P2P file-sharing environment of higher security.


Author(s):  
R. Sheeja ◽  
Chidambaranathan Bibin ◽  
Priya R Krishnan ◽  
R. Nishanth ◽  
S. Gopinath ◽  
...  

Author(s):  
Febri Romadhon ◽  
Toibah Umi Kalsum ◽  
Eko Prasetyo Rohmawan

Junior High School 8 Lubuk Linggau is one of the schools located in Lubuk Linggau City in South Sumatra Province. It has already 30 computers in the Laboratory, but the computers are not connected to each other, so it is often difficult for the teachers who teach in sending files to all computers. The purpose of this research is to utilize Samba Server in Client Server-Based Data Exchange. The research method used is the Network Development Life Cycle (NDLC) method. The samba installation and configuration process is successful, and the client can access files that have been shared by the server. Network configuration for Laptop Server with IP Address 192.168.1.1, Laptop Clientwith IP Address 192.168.1.2 through 192.168.1.50. Base don the testing that has beendone, a computer that is used as a server often lags/error freezes, thus a server computer with more adequate specifications is needed. The suggestion from the researcher is tobe able to use a file sharing system using samba server, where the files that will be shared are on the file server.


Sign in / Sign up

Export Citation Format

Share Document