International Journal of Scientific & Technology Research

Home About Us Scope Editorial Board Blog/Latest News Contact Us
10th percentile
Powered by  Scopus
Scopus coverage:
Nov 2018 to May 2020


IJSTR >> Volume 2- Issue 6, June 2013 Edition

International Journal of Scientific & Technology Research  
International Journal of Scientific & Technology Research

Website: http://www.ijstr.org

ISSN 2277-8616

Self Certification Based BloomCast File Retrieval In Unstructured P2P Networks

[Full Text]



Nanitha Mathew, V.Gowri



Index Terms: BloomCast, File Searching, P2P, Self Certification



Abstract: Peer-to-peer (P2P) networks are exposed to peers who fake, advertise malign code, or peers who won’t contribute. The classic security techniques like client-server networks are not enough for Peer-to-Peer networks because of its centralized nature. BloomCast is a full-text revival scheme which is used in unstructured P2P networks. It duplicates Bloom Filters rather than duplicating the documents among the network. BloomCast greatly minimizes the communication cost needed for duplication. But the main disadvantage is that it is vulnerable to malicious peers. In the proposed method self certification technique is used. Self-certification removes the need of a centralized system for sending the identities. The Self Certification mechanism helps to identify the malicious content and makes the search more effective.



[1] Hanhua Chen, Hai Jin Senior, Xucheng Luo, Yunhao Liu, Tao Gu, Kaiji Chen, and Lionel M. Ni (2012) ‘BloomCast: Efficient and Effective Full-Text Retrieval in Unstructured P2P Networks’ IEEE transactions on parallel and distributed systems,Vol. 23 No. 2

[2] Andrei Broder and Michael Mitzenmacher ‘Network applications of bloomfilter: A survey’ Internet Mathematics Vol. 1 No. 4 pp. 485-509

[3] Arulkumar C V, Jeyakumar K, Malarmathi M. and Shanmugapriya.T. (2012) ‘secure communication in unstructured P2P networks based on reputation management and self certification’ International Journal of Computer Applications Vol. 44 No.15

[4] Prashant Dewan and Partha Dasgupta (2010) ‘P2P reputation management using distributed identities and Decentralized recommendation chains’ IEEE transactions on knowledge and data engineering, Vol. 22 NO. 21

[5] Rania Salah El-Sayed and Mohammad Ali Gomaa (2008) ‘An Efficient Signature System using Optimized RSA Algorithm’ IJCSNS International Journal of Computer Science and Network Security, Vol. .8 No.12.