Enhanced Document Search and Sharing Tool in Organized P2p Frameworks
Journal Title: International Journal of Science Engineering and Advance Technology - Year 2016, Vol 4, Issue 10
Abstract
In internet p2p file sharing system generating more traffic. in this system file querying is important functionality which indicates the performance of p2p system .To improve file query performance cluster the common interested peers based on physical proximity .Existing methods are dedicated to only unstructured p2p systems and they don’t have strict policy for topology construction which decreases the file location efficiency. In this project proposing a proximity aware interest –clustered p2p file sharing system implemented in structured p2p file system. It forms a cluster based on node proximity as well as groups the nodes which having common interest into sub-cluster. A novel lookup function named as DHT and file replication algorithm which supports efficient file lookup and access. To reduce overhead and file searching delay the file querying may become inefficient due to the sub-interest supernode overload or failure. Thus, though the sub-interest based file querying improves querying efficiency, it is still not sufficiently scalable when there are a very large number of nodes in a sub-interest group. We then propose a distributed intra-sub-cluster file querying method in order to further improve the file querying efficiency.
Authors and Affiliations
Mohammad Aslamsultana| Dept. of CSE, University College of Engineering JNTU Kakinada (AUTONOMOUS), AP, India, SSSN Usha Devi N| Dept. of CSE, University College of Engineering JNTU Kakinada (AUTONOMOUS), AP, India
Increase of Charge-Coupled Device Resolution limits using Spatial Light Modulator
Resolution of the imaging devices is mainly restricted by the pixels pitch, the pixels size and shape. We show a methodology where a Liquid Crystal on Silicon presentation is utilized to produce diverse direct stages...
Developing A Hexapod Walking Machine
This project deals with the walking machines. A brief history and the evolution of the walking machines which are classified based on their legs, different walking mechanisms exists out of which Theo Jansen’s walki...
Dynamic Access Control In Cloud Computing Using Encryption/Decryption
Cloud computing has emerged as one of the most important paradigms in the IT industry for last few years. In general data owners and service providers are not in the same trusted domain in cloud computing. Service pr...
A Complete System To Securely Outsource Log Records To A Cloud Provider
In View Of The Fact That Log Files Hold Record Of Most System Events Including User Activities They Turn Out To Be An Important Target For Malicious Attackers. An Attacker Breaking Into A System Normally Would Try No...
Security Analysis And Perform Extensive Simulations To Demonstrate The Efficiency Of Mona For Data Sharing In The Cloud
Sharing data in a multi-owner manner while conserving data and identity privacy from an untrusted cloud is still a challenging issue due to the regular change of the membership. In this paper we propose a secure mult...