Secure Transaction on the Peer To Peer Based Virtual Network
Anil Saroliya1, Upendra Mishra2, Ajay Rana3
1Anil Saroliya, Amity School of Engineering & Technology, Amity University Rajasthan, Jaipur, Rajasthan, India.
2Dr. Upendra Mishra, Amity School of Engineering & Technology, Amity University Rajasthan, Jaipur, Rajasthan, India.
3Dr. Ajay Rana, Amity University UtterPradesh, Noida, UP, India
Manuscript received on January 01, 2013. | Revised Manuscript received on January 02, 2013. | Manuscript published on January 05, 2013. | PP: 150-153 | Volume-2, Issue-6, January 2013. | Retrieval Number: F1127112612/2013©BEIESP
Open Access | Ethics and Policies | Cite
© The Authors. Published By: Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)
Abstract: Distributed Hash Tables or the DHT is a very crucial and attention seeking topic as far as the field of P2P network overlays is concerned; since the latter has set a new benchmark in the arena of file sharing. The use of DHTs in P2P network involves the cause of file searching within the network. The DHT protocol works by assigning a key to a single P2P function and finds the node or nodes associated to this key thereby completing the request for file search. Other functions involving the retrieval of information and its storage are facilitated by certain higher layers in the P2P network. Through the research made out in the paper, the goal is to find out various security issues related to the process and resolve them according to the routing protocols of the network. The Chord which is a DHT protocol has been taken as the target for research in this paper for certain reasons that will consequently be covered in the following.
Keywords: Structured P2P networks, distributed hash tables, routing, security, backtracking.