Enhanced Document Search and Sharing Tool in Organized P2p Frameworks
Journal Title: International Journal of Science Engineering and Advance Technology - Year 2016, Vol 4, Issue 10
Abstract
In internet p2p file sharing system generating more traffic. in this system file querying is important functionality which indicates the performance of p2p system .To improve file query performance cluster the common interested peers based on physical proximity .Existing methods are dedicated to only unstructured p2p systems and they don’t have strict policy for topology construction which decreases the file location efficiency. In this project proposing a proximity aware interest –clustered p2p file sharing system implemented in structured p2p file system. It forms a cluster based on node proximity as well as groups the nodes which having common interest into sub-cluster. A novel lookup function named as DHT and file replication algorithm which supports efficient file lookup and access. To reduce overhead and file searching delay the file querying may become inefficient due to the sub-interest supernode overload or failure. Thus, though the sub-interest based file querying improves querying efficiency, it is still not sufficiently scalable when there are a very large number of nodes in a sub-interest group. We then propose a distributed intra-sub-cluster file querying method in order to further improve the file querying efficiency.
Authors and Affiliations
Mohammad Aslamsultana| Dept. of CSE, University College of Engineering JNTU Kakinada (AUTONOMOUS), AP, India, SSSN Usha Devi N| Dept. of CSE, University College of Engineering JNTU Kakinada (AUTONOMOUS), AP, India
Encryption is used in a correspondence framework to secure data in the transmitted messages from sender to receiver. To execute the encryption in addition to decryption ye transmitter and receiver ought to have compa...
A Novel DNA Encryption Technique Using Efficient Key Generation Method For Secure Data
Information innovation is creating orderly, meanwhile security of information is genuine concern. There are diverse customers and affiliations who need to keep their vital data from attackers and software engineers....
Implementation of Repeated Data Elimination and Improving Security in HCloud
Data deduplication is one of essential data weight methodologies for taking out duplicatescopies of repeating data, and has been for the most part used as a piece of circulated stockpiling to reduce the measure of st...
Condition Examine And Flaw Determination In Induction Motor- An Exploration
Induction motor notably three phase induction motor plays dynamic role in the industry due to their advantages over other electrical motors. Therefore, there is anextreme demand for their intenseand secure operation....
A Tangible Structure To Comprehend Circuits Cipher text-Policy Based Hybrid Encryption With Verifiable Delegation (VD-CPABE)
Since strategy for general circuits empowers to accomplish the most grounded type of access control, a development for acknowledging circuit ciphertext-approach attribute based half and half encryption with obvious a...