Peer-to-peer Security

Read Complete Research Material

PEER-TO-PEER SECURITY

Peer-to-peer Security

Peer-to-peer Security

Introduction

The main purpose of this paper is to write a case study on the peer to peer security and determine the problem and on the basis of facts and evidences, find the solution to that problem.

Problem Identification

The application of peer to peer network is becoming difficult in today's world. The prevailing peer to peer network do not have security in it and its difficult to trust these networks. In order to make these peer to peer network authentic and reliable it is good that they should include the security features in it, so that the trustworthiness increases. In these theory, two peer networks have been used and these are Gnutella and Freenet and they use security in it. In order to improve it, several suggestions have been made.

Application Of Security Technology

Security and effectiveness of most distributed systems depend on trusted entities. For example, SMTP servers are trusted entities of the e-mail system on Internet. If they are misconfigured or have bugs in implementation, a security breach may occur. In a peer-to-peer system, all peers are equally trustworthy and there is no separate trusted entity. Since peers depend on each other in most operations, malicious peers can easily take advantage of trust of others to degrade the system performance. If a peer demonstrates Byzantine behavior, other peers may not instantly decide if an attack is happening. For example, if a malicious peer drops routing packets, it is hard to figure out the attack for other peers. Since no peer is trusted, asking opinions of other peers might be misleading, which makes trust establishment difficult.

Application Of Cryptography Concepts /Technologies

Cryptography, regarded as the science of secrecy, has long been the preserve of encryption services in the military.  Furthermore, the use of cryptography has led to multiple uses and applications, depending on the nature of information to protect. The concepts of cryptography have been drawn up, which led to the development and implementation of a number of specialized mechanisms.  To better identify its objectives in the short, medium and long terms, for better management of its human and material resources, the learned society has placed on digital information and its underlying security system at the heart of economic, administrative, social and political. Thus, the development of a number of activities under the daily life such as television, mobile telephony, banking, electronic commerce, electronic voting, the distribution of multimedia content, the remote administrative procedures etc. . induces the need to structure the digital world, which now escapes the physical alignment of borders, both geographically and politically. Furthermore, the use of mathematical tools and computer, is becoming increasingly necessary. The benefits that are drawn are not measured only in terms of time, but also in terms of cost. The mastery of time, reducing distances become almost zero, and lower trading costs that contributed significantly to give groups and individuals a great flexibility. However, the difficulty of establishing an ethics capable of binding to all users of digital information, the absence of legislation that addresses all the aspects it covers, ...
Related Ads