Premium Essay

Security Aspects of Peer-to-Peer Computing

In:

Submitted By shaylabrock
Words 2656
Pages 11
Security Aspects of Peer-to-Peer Computing

Shayla J. Brock INSY 4900.51 May 9, 2014

It is important to enable peers to represent and update their trust in other peers in open networks for sharing files, and especially services. A trust model and a method for building reputation based on recommendations in peer-to-peer networks. Since trust is multifaceted, peers need to develop differentiated trust in aspects of other peers’ capability. The peer’s needs are different in different situations. Depending on the situation, a peer may need to consider it’s trust in a specific aspect of another peer’s capability or in multiple aspects. There are networks that provide a flexible method to present differentiated trust and combine different aspects of trust. The evaluation of the model using a simulation shows that the system where peers communicate their experiences outperforms the system where peers do not share recommendations with each other and that a differentiated trust adds to the performance in terms of percentage of successful interactions. Currently, a new and highly interesting paradigm for communication on the Internet, known as Peer-to-Peer (P2P), is emerging. Although originally designed exclusively for pragmatic file swapping applications, Peer-to-Peer mechanisms can be used to access any kind of distributed resources and may offer new possibilities for Internet based applications. Computer and network security, or cybersecurity, are critical issues. But merely protecting the systems that hold data about citizens, corporations, and

Similar Documents

Free Essay

It332 Unit 2

...Online IT332 Principles of Information Systems Architecture Professor Denver Martin May 27, 2016 Table of Contents Part 1: Examine the Three Architectures: Peer-to-Peer, Client/Server, and Web-based 3 Part 2: Propose One Architecture in Detail 4 Part 3: Examine and Explain the Role of Protocols for Your Proposed Architecture 5 Part 4: Explain and Detail the Supporting Infrastructure for the Proposed Architecture 6 References 7 Part 1: Examine the Three Architectures: Peer-to-Peer, Client/Server, and Web-based A peer-to-peer network (P2P) is a network where all computers, workstations, and/or terminals are treated equally, i.e. the permissions and access is leveled across the board, and any one of the computers in the network can become the host (Englander, 2014). A way I worked this into my life was, while deployed, I set up a network where all computers connected to that network could share information and files as needed, so long as they were given access to the network in the first place. It was a small group, about 8 points of connection, using TCP/IP to communicate between the terminals, and was effective, however, I think we would have experienced some ‘bogging down’ of the network if we increased the number of people that had access to it. Because of the innate security risk that P2P networks exhibit, no sensitive information was permitted to be stored or shared on this network for any reason. Client-server architecture is application based...

Words: 1094 - Pages: 5

Free Essay

Peer-to-Peer

...Exploiting Agent Technology in the design of Peer-to-Peer Applications Steven Willmott, Josep M. Pujol and Ulises Cort´s e Universitat Polit`cnica de Catalunya e a Llenguatges i Sistemes Inform`tics Campus Nord, M´dul C5-C6, C/Jordi Girona 1-3, Barcelona (08034), Spain o {steve, jmpujol, ia}@lsi.upc.es Abstract. Peer-to-peer (P2P) architectures exhibit attractive properties for a wide range of real world systems. As a result they are increasingly being applied in the design of applications ranging from highcapacity file sharing and global scale distributed computing to business team-ware. The objective of this paper is to outline a number of areas in which Agent techniques for the management of social problems such as decision making or fair trading amongst autonomous agents could be used to help structure P2P actions. In particular we focus on approaches from mechanism design, argumentation theory and norms / rules and electronic institutions. 1 Introduction Peer-to-peer (P2P) architectures exhibit attractive properties for a wide range of real world systems. As a result they are increasingly being applied in the design of applications ranging from high-capacity file sharing and global scale distributed computing to business team-ware. In addition their benefits however, P2P systems also fundamentally change the networking paradigm used in an application often causing tensions with other application goals such as security, predictability, performance guarantees, billing...

Words: 3969 - Pages: 16

Free Essay

Benefits of Twisted Pair Cable

...is no one dedicated to information technology or networking on the staff and there are 20 Windows peer-to-peer client computers connected via coax cable. The president also addresses her concerns for growth. She feels that the company will double in size over the next two years, but does not want a drastic overhaul. For this assignment I will hit 4 main topics. First I will describe what changes I would suggest for the current network type and explain why I am doing it. Second, I will describe why I would recommend upgrading to twisted pair cable from coax cable for all current and new client computers on the network. Third, I will discuss the possibility of implementing fiber optic cable in to the network. Finally, I will display research costs and analysis to facilitate an upgrade on the network. As above mentioned, the current network is 20 Windows peer-to-peer client computers utilizing the bus topology. Also important to note is the fact this company lacks an employee with an IT background, therefore they have been inclined to set up a simple peer-to-peer network due to its ease of configuration. Unfortunately for Ocper, if they want to effectively expand, they will need to change this network type, because a peer-to-peer network is not flexible. As the network grows, adding or changing important elements of the network may grow cumbersome. Additionally, the peer-to-peer network for this client is dire need of a centralized resource. I would highly recommend that...

Words: 1053 - Pages: 5

Premium Essay

Information Security

...Information Security August 10, 2012 One of the biggest issues in the Information Technology field these days is information security. Today almost anything can be found on the internet. Even like how to videos on how to put in a window, break-into a house, or even hack computers. The digital age has many perks but it also has many down falls to it as well. The perks that we enjoy so much from the internet also leaves us open to identity theft and company information theft. This gives Information Technology professionals a lot to think about when they consider Information Technology. One of the biggest threats facing the IT industries today is the end users non-malicious security violations that leave companies vulnerable to attack. In a recent Computer Security Institute survey, 41 percent of the participating U.S organizations reported security incidents. (Guo, 2012 p. 203-236) Also according to the same survey it was found that 14 percent of the respondents stated that nearly all of their company’s loses and or breaches were do to non-malicious and or careless behavior by the end users. (Guo, 2012 p. 203-236) Some of the end users behaviors that help these threats along were the peer-to-peer file-sharing software installed by the end user that might compromise company computers. Some other examples of security being compromised by end users would be people that use sticky notes to write there passwords down and leave them where other people can see them...

Words: 1422 - Pages: 6

Premium Essay

Cloud Computin

...Cloud computing is a service delivery model via internet which provides online computing and storage power to users. Being an internet based remote service; users can access the cloud services anytime, anywhere. Cloud computing allows and makes it easier to access technology-enabled services to the users who don’t have adequate technological know-how. These literatures are more focused on core cloud computing service model being deployed and deployment model followed by the cloud service providers. Additionally anticipated and achieved benefits, challenges and growing deployment trend are also analyzed. Methodology This literature review surveyed existing literature available on the database using systematic approach. Each literature is taken from the CEO magazine, Australian computer society and UWS library catalogue and few literatures from Google scholar. For the timely updated information we limited our literature and taken only published journal article after 2005, because cloud computing is come into mainstream practice from that year. Briefly abstract and title of the papers was studied peer-reviewed journal articles are chosen. Cloud computing model All these literature categorize entire cloud computing in three major service models. * Software as a service, SaaS model In this model, application and functional services are designed to be hosted online and delivered via typical web browser. Users don’t have to have a physical copy of the software installed on...

Words: 1348 - Pages: 6

Premium Essay

Cloud Computing

...Cloud Computing Cloud computing is the delivery of computing as a service rather than a product. Resources like software and information are provided to computers and communication devices as a utility like electricity or water. This cloud computing service is done through a computer network, which is the internet typically. Cloud computing is known as encapsulation by some users since the physical location and configuration of how the resources are shared to the devices is often not revealed to the end user. It is like using the electricity. The end user doesn’t have to know the whereabouts of the physical location where the electricity is produced nor how the components are configured from there to their home. They just use the feature or resource instead. Similar to this cloud computing describes the consumption of IT services through the common most computer network available in the world, the internet. Virtualized resources can be shared remotely with ease-of-access exploiting the facilities provided by the internet. The end user must have a tool or an application (Web Browser) installed on their local computers which provides the platform for the sharing of resources. Providers of cloud computing deliver applications or tools via the internet, which are accessed using web browsers and desktop mobile apps, while the main resources (business software and data) are stored in a server located in a remote location. Screen-sharing technology is used sometimes to provide...

Words: 2900 - Pages: 12

Premium Essay

It456 Db2

... Security Architecture Design IT456_DB2 Security architecture is an important aspect of any security system safeguarding an organizations data, employee/client demographic information and many other vital data. Deployment of an effective scalable network security system requires proper design according to the risk analysis and employing security principles in best practices and maintaining a satisfactory level of compliance. www.disa.mil/.../mil Should any of the key areas of the security infrastructure be compromised it will have devastating effects on the reliability, availability, viability of operational abilities and integrity of data. As well the system vulnerabilities are more easily. Attacks are carried out on these compromised infrastructures including industrial espionage, revenge, financial gain, and terrorism. ISSA.com/security Some of the principles used in the design of a secure Infrastructure are compartmentalization of information, principle of least privilege, weakest link, defense in depth, authentication password security, antivirus, packet filtering,, firewalls, policies both permitting and restricting activities, DMZ’s and designing the security around and for the most critical systems. Do not forget the ever more important intrusion detection...

Words: 727 - Pages: 3

Premium Essay

The Influence of Internet Finance for Sme Financing in China

...foundation of promoting national economy development, constructing the subject of market economy and promoting the development of social stability in China (Wang, 2011). In recent years, the economic situation has experienced dramatic change and this huge variation stimulates financing needs of SMEs in China greatly. Nevertheless, the majority of SMEs have financing difficulties due to their personal limitations and insufficient external support. As a result, it is hard for them to have a further development. With the advent of the information technology revolution, Internet Finance is considered as a new effective way to solve the financial difficulties of SMEs and it brings about many positive influences, although there are some negative aspects to improve. This essay will firstly inform background information about the reasons for SME financing difficulty as well as Internet finance’s current condition. Additionally, it will give evidence for the main argument that there are more positive influences than negative influences of Internet finance on minor enterprises’ financing issue. Finally, some practical suggestions will be put forward, helping Chinese SMEs to find the optimal choice in financing. Background There are more SMEs in China than before in accordance with the relevant statistics. According to Wang (2011), SMEs account for 99.9% of the total number of firms, provide more than 60% of GDP and 70% of import and export trade. The data reveal that SME is an important...

Words: 2241 - Pages: 9

Premium Essay

Bitcoin

...SUMMARY: Virtual currencies are increasingly becoming a part of not only the virtual world but also in the real world. There are various problems associated with virtual currencies. Due to its similar nature to real currency, a lot of questions have risen regarding its acceptance among the people in the market, and the reliability factor. In the following paper, we have discussed the different types of virtual currencies based on their exchange factor. Bitcoins, a type 3 virtual currency is one of the most popular crypto currencies. We have discussed the characteristics and the process of transacting Bitcoins in detail, emphasizing on the pros and cons of its usage. We have also compared it with the ‘fiat’ money and mentioned its legal aspects. In the end we have mentioned a few areas for further research in relation to Bitcoins. TABLE OF CONTENTS: Sr no. | Content | Page no. | 1.2.3.4.5.6.7.8.9.10. 11. | IntroductionTypes of virtual currenciesIntroduction to BitcoinsTransaction Process for BitcoinsMethods for transacting BitcoinsStorage of BitcoinsNeed for legal statusCurrent scenarioConclusionAnnexureReferences | 456688910121415 | INTRODUCTION: The definition of money has constantly being reviewed over a period of time. Initially money was traded in the form of commodities for commodities by the name of barter system. However in the 18th...

Words: 4384 - Pages: 18

Premium Essay

Network Design Consultation

...recommend this kind of design is because of mobility. Mobility is what allows information to be accessed from anywhere which will enhance productivity and service. Another reason that I would recommend this kind of design is because Installation is very simple and you don’t have to go through the trouble of running cable everywhere. Another this type of design is good is because that the cost of maintenance is reduced significantly especially in terms of if and when you decide to expand your network as well. Scalability is also another very important factor because Wireless LAN systems can be configured in a variety of topologies to meet the needs of specific applications and installations. Configurations are easily changed and range from peer-to-peer networks suitable for a small number of users to full infrastructure networks of thousands of users that enable roaming over a broad area. Now in terms of the network architecture I would recommend using a Client server Architecture the reason being this type of architecture will allow clients to share data as well as storage space. Not only that but this type of architecture allows for the option of using shared applications as well as data and devices. In terms of the internet configuration I would recommend going with a LAN for a few reasons. The first reason being that it allows for centeralized IT administration which means that it makes it easier to manage multiple computers especially having a small business on a platform and...

Words: 2247 - Pages: 9

Premium Essay

An Evolution of Computer Science Research

...Abbreviated version of this report is published as "Trends in Computer Science Research" Apirak Hoonlor, Boleslaw K. Szymanski and M. Zaki, Communications of the ACM, 56(10), Oct. 2013, pp.74-83 An Evolution of Computer Science Research∗ Apirak Hoonlor, Boleslaw K. Szymanski, Mohammed J. Zaki, and James Thompson Abstract Over the past two decades, Computer Science (CS) has continued to grow as a research field. There are several studies that examine trends and emerging topics in CS research or the impact of papers on the field. In contrast, in this article, we take a closer look at the entire CS research in the past two decades by analyzing the data on publications in the ACM Digital Library and IEEE Xplore, and the grants awarded by the National Science Foundation (NSF). We identify trends, bursty topics, and interesting inter-relationships between NSF awards and CS publications, finding, for example, that if an uncommonly high frequency of a specific topic is observed in publications, the funding for this topic is usually increased. We also analyze CS researchers and communities, finding that only a small fraction of authors attribute their work to the same research area for a long period of time, reflecting for instance the emphasis on novelty (use of new keywords) and typical academic research teams (with core faculty and more rapid turnover of students and postdocs). Finally, our work highlights the dynamic research landscape in CS, with its focus constantly ...

Words: 15250 - Pages: 61

Premium Essay

Cloud Computing

...Cloud Computing Kevin Chang Chantal O’Connor Tameika Lee Richard Roberts Information Technology – INT1001 Lecturer: Lushane Jones University of Technology, Jamaica 4th November 2010 ABSTRACT This paper discusses what is meant by the term cloud computing, the difference between private and public cloud computing, the benefits and challenges that are being derived from adopting cloud computing and how it will change the way we work. It cites examples of enterprises that have adopted the concept, stating the success or lack thereof. It also discusses the possible future of cloud computing. WHAT IS CLOUD COMPUTING? Cloud computing is a general term for anything that involves delivering hosted services over the Internet. These services are broadly divided into three categories: Infrastructure-as-a-Service (IaaS), Platform-as-a-Service (PaaS) and Software-as-a-Service (SaaS). The name cloud computing was inspired by the cloud symbol that is often used to represent the Internet in flowcharts and diagrams. See Figure 1. A visual representation of the Cloud including some companies that offer cloud based services. A cloud service has three individual characteristics that differentiate it from traditional hosting. It is sold on demand, typically by the minute or the hour. It is elastic, a user can have as much or as little of a service as they want at any given time and the service are fully managed by the provider (the consumer needs nothing...

Words: 3240 - Pages: 13

Free Essay

Rakamakafoo

...C O U R S E 5 6 5 Networking Technologies Volume 1 This document should only be used by a Novell-certified instructor. Ifyouthinkthisdocumentwaspirated,call1-800-PIRATESor1-801-861-7101. Networking Technologies Instructor Guide (Volume 1) Education INSTRUCTOR GUIDE 100-004273-001 Revision 1.0 Proprietary Statement Copyright © Novell, Inc. 1994, 1997, 1998. All rights reserved. No part of this publication may be reproduced, photocopied, stored on a retrieval system, or transmitted without the express prior consent of the publisher. This manual, and any portion thereof, may not be copied without the express written permission of Novell, Inc. Novell, Inc. 1555 North Technology Way Orem, Utah 84097-2399 Disclaimer Novell, Inc. makes no representations or warranties with respect to the contents or use of this manual, and specifically disclaims any express or implied warranties of merchantability or fitness for any particular purpose. Further, Novell, Inc. reserves the right to revise this publication and to make changes in its content at any time, without obligation to notify any person or entity of such revisions or changes. Further, Novell, Inc. makes no representations or warranties with respect to any NetWare software, and specifically disclaims any express or implied warranties of merchantability or fitness for any particular purpose. Further, Novell, Inc. reserves the right to make changes to any and all parts of NetWare software...

Words: 27853 - Pages: 112

Premium Essay

Dsc340

...Ch. 5. Moore's Law and More: Fast, Cheap Computing, Disruptive Innovation, and What This Moore's Law definition: Chip performance per dollar doubles every eighteen months. Moore’s Law applies to chips—broadly speaking, to processors and chip-based storage. Microprocessor is the brain of a computing device. It’s the part of the computer that executes the instructions of a computer program. For processors, Moore’s Law means that next generation chips should be twice as fast in about eighteen months, but cost the same as today’s models. Random-access memory (RAM ) Fast, chip-based volatile storage in a computing device Flash memory Nonvolatile, chip-based storage Volatile memory: Storage that is wiped clean when power is cut off from a device Nonvolatile memory: Storage that retains data even when powered down. Solid state electronics: Semiconductor-based devices Semiconductors: Substance such as silicon dioxide used inside most computer chips that is capable of enabling and inhibiting the flow of electricity Optical fiber line: High-speed glass or plastic-lined networking cable used in telecommunications ...

Words: 2104 - Pages: 9

Premium Essay

Security Issues

...|[pic] |Syllabus | | |College of Information Systems & Technology | | |CMGT/582 | | |Security & Ethics | Copyright © 2010, 2009 by University of Phoenix. All rights reserved. Course Description The ethical issues examined in the course include information privacy, accessibility, and ownership from an organizational perspective. Information laws, regulations, and compliance requirements are examined in this course as well as the considerations for creating a safe digital environment within the organization. Policies Faculty and students or learners will be held responsible for understanding and adhering to all policies contained within this syllabus and the following two additional documents: University policies: You must be logged into the student website to view this document. Instructor policies: This document is posted in the Course Materials forum. University policies are subject to change. Be sure to read the policies at the beginning of each class. Policies...

Words: 2637 - Pages: 11