Normal view MARC view ISBD view

Peer-to-peer storage : security and protocols

By: Oualha, Nouha.
Contributor(s): Roudier, Yves.
Material type: materialTypeLabelBookSeries: Computer science, technology and applications series. Publisher: New York : Nova Science Publishers, 2010Description: xii, 63 p. : ill. ; 23 cm.ISBN: 9781616681999.Subject(s): Computer science | Technology and applications | Peer-to-peer architectureDDC classification: 004.56 Summary: Peer-to-peer (P2P) has proven as a most successful way to produce large scale, reliable, and cost-effective applications, as illustrated for file sharing or VoIP. P2P storage is an emerging field of application which allows peers to collectively leverage their resources towards ensuring the reliability and availability of user data. Providing assurances in both domains requires not only ensuring the confidentiality and privacy of the data storage process, but also thwarting peer misbehavior through the introduction of proper security and cooperation enforcement mechanisms. This book highlights how the continuous observation of peer behavior and monitoring of the storage process is an important requirement to secure a storage system.
Tags from this library: No tags from this library for this title. Log in to add tags.

Includes bibliographical references and index.

Peer-to-peer (P2P) has proven as a most successful way to produce large scale, reliable, and cost-effective applications, as illustrated for file sharing or VoIP. P2P storage is an emerging field of application which allows peers to collectively leverage their resources towards ensuring the reliability and availability of user data. Providing assurances in both domains requires not only ensuring the confidentiality and privacy of the data storage process, but also thwarting peer misbehavior through the introduction of proper security and cooperation enforcement mechanisms. This book highlights how the continuous observation of peer behavior and monitoring of the storage process is an important requirement to secure a storage system.

There are no comments for this item.

Log in to your account to post a comment.

Powered by Koha