Skip to main content
Log in

An Effective and Secure Data Sharing in P2P Network Using Biased Contribution Index Based Rumour Riding Protocol (BCIRR)

  • Published:
Optical Memory and Neural Networks Aims and scope Submit manuscript

Abstract

Data sharing in the Peer to Peer (P2P) networks became an important function in the trustworthy computing. Secure and load balancing control in file sharing is vital to enhance the overall performance of P2P file sharing system. In literature many methods of load balancing control and security control have been used but it is not able to attain the best results in P2P networks. Hence, in this paper, Biased Contribution Index Based Rumour Riding Protocol (BCIRR) is developed to attain the load balancing control and security enhancement of P2P networks. The proposed method is concentrated to achieve two main objective function such as load balancing control and security enhancement. The proposed protocol is a combination of Biased Contribution Index (BCI) and Enhanced Rumour Riding protocol (ERR). Here, load balancing control of the P2P network is attained with the utilization of the BCI and security enhancement of the P2P network is attained with the utilization of the ERR. The proposed protocol will be implemented in the Matlab platform and the performance of the proposed protocol is analysed with different performance metrics such as Packet loss, Delivery ratio, Average end to end delay and Throughput. To analysis the effectiveness of proposed method, it will be compared with the existing method of Catching Algorithms (CA).

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1.
Fig. 2.
Fig. 3.
Fig. 4.
Fig. 5.
Fig. 6.
Fig. 7.
Fig. 8.
Fig. 9.
Fig. 10.

Similar content being viewed by others

REFERENCES

  1. Mocanu, B., Pop, F., Mihaita, A., Dobre, C., and Castiglione, A., Data fusion technique in spider peer-to-peer networks in smart cities for security enhancements, Int. J. Inf. Sci., 2019, vol. 479, pp. 607–621.

    Google Scholar 

  2. Dorfleitner, G., Priberny, C., Schuster, Stoiber, J., Weber, M., Castro, I.D., and Kammler, J., Description-text related soft information in peer-to-peer lending–Evidence from two leading European platforms, Int. J. Banking Finance, 2016, vol. 64, pp. 169–187.

    Article  Google Scholar 

  3. Zhi, Li, Barenji, A.V., and Huang, G.Q., Toward a blockchain cloud manufacturing system as a peer to peer distributed network platform, Int. J. Rob. Comput.-Integr. Manuf., 2018, vol. 54, pp. 133–144.

    Article  Google Scholar 

  4. Yaodong, Huang, Song, X., Ye, F., Yang, Y., and Li, X., Fair and efficient caching algorithms and strategies for peer data sharing in pervasive edge computing environments, IEEE Trans. Mobile Comput., 2020, vol. 19, no. 4.

  5. Ravichandran, C.G. and Xavier, J.L., Highly available hypercube tokenized sequential matrix partitioned data sharing in Large P2P Networks, Int. J. Circuits Syst., 2016, vol. 7, no. 09.

  6. Horacio, Paggi, Soriano, J., and Lara, J.A., A multi-agent system for minimizing information indeterminacy within information fusion scenarios in peer-to-peer networks with limited resources, Int. J. Inf. Sci., 2018, vol. 451, pp. 271–294.

    Google Scholar 

  7. Horacio, Paggi, Lara, J.A., and Soriano, J., Structures generated in a multiagent system performing information fusion in peer-to-peer resource-constrained networks, Int. J. Neural Comput. Appl., 2018, pp. 1–19.

  8. Ramkumar, V., Secure Data Sharing in Peer to Peer Network Using Replication and DHT Algorithm, Int. J. Innovative Res. Comput. Commun. Eng., 2016, vol. 4, no. 3.

  9. Poenaru, A., Istrate, R., and Pop, F., AFT: Adaptive and fault tolerant peer-to-peer overlay—A user-centric solution for data sharing, Int. J. Future Gener. Comput. Syst., 2018, vol. 80, pp. 583–595.

    Article  Google Scholar 

  10. Balu Deokate, Lal, C., Trcek, D., and Conti, M., Mobility-aware cross-layer routing for peer-to-peer networks, Int. J. Comput. Electr. Eng., 2019, vol. 73, pp. 209–226.

    Article  Google Scholar 

  11. Moufida, Rahmani and Benchaïba, M., PCSM: an efficient multihop proximity aware clustering scheme for mobile peer-to-peer systems, Int. J. Ambient Intell. Humanized Comput., 2018, pp. 1–18.

  12. Abhinav, Jain and Kumar, S., Friend Share: A secure and reliable framework for file sharing on network, Int. J. Network Comput. Appl., 2018, vol. 120, pp. 1–16.

  13. Jianwei, Zhang, Zhang, X., Sun, M., and Yang, C., Maximizing streaming efficiency of multiple streams in peer-to-peer networks, Int. J. Network Comput. Appl., 2018, vol. 124, pp. 108–120.

    Article  Google Scholar 

  14. Thiyagarajan R. and Priya, B.M., An enhancement of EAACK using P2P ACK and RSA public key cryptography, Int. J. Measurement, 2019, vol. 136, pp. 116–121.

    Article  Google Scholar 

  15. Amna, Qureshi, Megias, D., and Rifa-Pous, H., Framework for preserving security and privacy in peer-to-peer content distribution systems, Int. J. Expert Syst. Appl., 2015, vol. 42, no. 3, pp. 1391–1408.

    Article  Google Scholar 

  16. Imran, Memon, I., Hussain, Akhtar, R., and Chen, G., Enhanced privacy and authentication: An efficient and secure anonymous communication for location-based service using asymmetric cryptography scheme, Int. J. Wireless Pers. Commun., 2015, vol. 84, no. 2, pp. 1487–1508.

    Article  Google Scholar 

  17. Farash, M.S., Security analysis and enhancements of an improved authentication for session initiation protocol with provable security, Int. J. Peer-to-Peer Networking Appl., 2016, vol. 9, no. 1, pp. 82–91.

    Article  Google Scholar 

  18. Awasthi, K.S. and Singh, Y.N., Biased Contribution Index: A Simpler Mechanism to Maintain Fairness in Peer to Peer Network, arXiv:1606.00717, 2016.

  19. Kumar, S.A. and Singh, Y.N., Simplified Biased Contribution Index (SBCI): A mechanism to make P2P network fair and efficient for resource sharing, Int. J. Parallel Distrib. Comput., 2019, vol. 124, pp. 106–118.

    Article  Google Scholar 

  20. Awasthi, S.K. and Singh, Y.N., Biased contribution index: a new faster convergent index to maintain the fairness in peer-to-peer networks, Electron. Lett., 2018, vol. 54, no. 20, pp. 1174–1176.

    Article  Google Scholar 

  21. Christo, M.S. and Meenakshi, S., Enhancing Rumour Riding protocol in P2P network with Cryptographic puzzle through challenge question method, Int. J. Comput. Electr. Eng., 2018, no. 65, pp. 122–138.

  22. Ruchir, Gupta and Singh, Y.N., Reputation aggregation in peer-to-peer network using differential gossip algorithm, IEEE Trans. Knowledge Data Eng., 2015, vol. 27, no. 10, pp. 2812–2823.

  23. Karthiga, R.R. and Aravindhan, K., Enhancing performance of user authentication protocol with resist to password reuse attacks, Int. J. Comput. Eng. Res., 2012, vol. 2, no. 8, pp. 106–115.

    Google Scholar 

  24. Yibin, Li, K., Gai, Qiu, L., Qiu, M., and Zhao, H., Intelligent cryptography approach for secure distributed big data storage in cloud computing, Int. J. Inf. Sci., 2017, vol. 387, pp. 103–115.

    Google Scholar 

  25. Wen, M., Lu, R., Lei, J., Li, H., Liang, X., and Shen, X., SESA: An efficient searchable encryption scheme for auction in emerging smart grid marketing, Int. J. Secur. Commun. Networks, 2014, vol. 7, no. 1, pp. 234–244.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Dharmendra Kumar.

Ethics declarations

Disclosure of potential conflicts of interest: There is no potential of conflict of Interest between the authors regarding the manuscript preparation and submission.

Research involving human participants and/or animals: There is no involvement of human participants or animals used in this manuscript.

Informed consent: There is nothing to report.

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Kumar, D., Pandey, M. An Effective and Secure Data Sharing in P2P Network Using Biased Contribution Index Based Rumour Riding Protocol (BCIRR). Opt. Mem. Neural Networks 29, 336–353 (2020). https://doi.org/10.3103/S1060992X20040104

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.3103/S1060992X20040104

Keywords:

Navigation