Journal of Advances in Computer Engineering and Technology (May 2017)

P2P Network Trust Management Survey

  • Seyed Hossein Ahmadpanah,
  • Rozita Jamili Oskouei,
  • Abdullah Jafari Chashmi

Journal volume & issue
Vol. 3, no. 2
pp. 89 – 106

Abstract

Read online

Peer-to-peer applications (P2P) are no longer limited to home users, and start being accepted in academic and corporate environments. While file sharing and instant messaging applications are the most traditional examples, they are no longer the only ones benefiting from the potential advantages of P2P networks. For example, network file storage, data transmission, distributed computing, and collaboration systems have also taken advantage of such networks.The reasons why this model of computing is attractive unfold in three. First, P2P networks are scalable, i.e., deal well (efficiently) with both small groups and with large groups of participants. In this paper, we will present a summary of the main safety aspects to be considered in P2P networks, highlighting its importance for the development of P2P applications and systems on the Internet and deployment of enterprise applications with more critical needs in terms of security. P2P systems are no longer limited to home users, and start being accepted in academic and corporate environments.

Keywords