Document Type: Original Research Paper

Authors

1 Department of Computer and Information Technology , Mahdishahr Branch , Islamic Azad University , Mahdishahr , Iran

2 Department of Computer and Information Technology, Mahdishahr Branch, Islamic Azad University, Mahdishahr, IRAN

3 Department of Electrical and Telecommunications Engineering Technology, Mahdishahr Branch, Islamic Azad University, Mahdishahr, IRAN

Abstract

Peer-to-peer applications (P2P) are no longer limited to home users, and start being accepted in academic and corporate environments. While file sharing and instant messaging applications are the most traditional examples, they are no longer the only ones benefiting from the potential advantages of P2P networks. For example, network file storage, data transmission, distributed computing, and collaboration systems have also taken advantage of such networks.The reasons why this model of computing is attractive unfold in three. First, P2P networks are scalable, i.e., deal well (efficiently) with both small groups and with large groups of participants. In this paper, we will present a summary of the main safety aspects to be considered in P2P networks, highlighting its importance for the development of P2P applications and systems on the Internet and deployment of enterprise applications with more critical needs in terms of security. P2P systems are no longer limited to home users, and start being accepted in academic and corporate environments.

Keywords

Main Subjects

[1] Schollmeier, R. (2011, August). A definition of peer-to-peer networking for the classification of peer-to-peer architectures and applications. In Peer-to-Peer Computing, 2011. Proceedings. First International Conference on (pp. 101-102). IEEE.‏
[2] Cai, M., & Frank, M. (2014, May). RDFPeers: a scalable distributed RDF repository based on a structured peer-to-peer network. In Proceedings of the 13th international conference on World Wide Web (pp. 650-657). ACM.
[3] Ripeanu, M. (2011, August). Peer-to-peer architecture case study: Gnutella network. In Peer-to-Peer Computing, 2011. Proceedings. First International Conference on (pp. 99-100). IEEE.‏
[4] Ripeanu, M., Foster, I., & Iamnitchi, A. (2012). Mapping the gnutella network: Properties of large-scale peer-to-peer systems and implications for system design. arXiv preprint cs/0209028.‏
[5] Lua, E. K., Crowcroft, J., Pias, M., Sharma, R., & Lim, S. (2015). A survey and comparison of peer-to-peer overlay network schemes. IEEE Communications Surveys & Tutorials, 7(2), 72-93.‏
[6] Bawa, M., Garcia-Molina, H., Gionis, A., & Motwani, R. (2013). Estimating aggregates on a peer-to-peer network. submitted for publication.‏
[7] Rowstron, A., & Druschel, P. (2011, November). Pastry: Scalable, decentralized object location, and routing for large-scale peer-to-peer systems. In IFIP/ACM International Conference on Distributed Systems Platforms and Open Distributed Processing (pp. 329-350). Springer Berlin Heidelberg.‏
[8] Saroiu, S., Gummadi, P. K., & Gribble, S. D. (2011, December). Measurement study of peer-to-peer file sharing systems. In Electronic Imaging 2012 (pp. 156-170). International Society for Optics and Photonics.‏
[9] Stoica, I., Morris, R., Liben-Nowell, D., Karger, D. R., Kaashoek, M. F., Dabek, F., & Balakrishnan, H. (2013). Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on Networking (TON), 11(1), 17-32.‏
[10] Freedman, M. J., & Morris, R. (2012, November). Tarzan: A peer-to-peer anonymizing network layer. In Proceedings of the 9th ACM conference on Computer and communications security (pp. 193-206). ACM.‏
[11] Kuhn, M., Szklarczyk, D., Franceschini, A., Campillos, M., von Mering, C., Jensen, L. J., ... & Bork, P. (2015). STITCH 2: an interaction network database for small molecules and proteins. Nucleic acids research, 38(suppl 1), D552-D556.‏
[12] Naicken, S., Basu, A., Livingston, B., & Rodhetbhai, S. (2016, May). A survey of peer-to-peer network simulators. In Proceedings of The Seventh Annual Postgraduate Symposium, Liverpool, UK (Vol. 2).‏
[13] Wang, Y., & Vassileva, J. (2013, September). Trust and reputation model in peer-to-peer networks. In Peer-to-Peer Computing, 2013.(P2P 2013). Proceedings. Third International Conference on (pp. 150-157). IEEE.‏
[14] Dou, W., Wang, H. M., Jia, Y., & Zou, P. (2014). A recommendation-based peer-to-peer trust model. Journal of software, 15(4), 571-583.‏
[15] Wang, Y., & Vassileva, J. (2013, July). Bayesian network trust model in peer-to-peer networks. In International Workshop on Agents and P2P Computing (pp. 23-34). Springer Berlin Heidelberg.‏
[16] Damiani, E., di Vimercati, D. C., Paraboschi, S., Samarati, P., & Violante, F. (2012, November). A reputation-based approach for choosing reliable resources in peer-to-peer networks. In Proceedings of the 9th ACM conference on Computer and communications security (pp. 207-216). ACM.‏
[17] Cohen, E., & Shenker, S. (2012, August). Replication strategies in unstructured peer-to-peer networks. In ACM SIGCOMM Computer Communication Review (Vol. 32, No. 4, pp. 177-190). ACM.