Open Access Open Access  Restricted Access Subscription Access
Open Access Open Access Open Access  Restricted Access Restricted Access Subscription Access

A Study on Sharing Encrypted Information in P2P Network


Affiliations
1 Sri Ramakrishna College of Arts & Science for Women, Coimbatore-641044, India
     

   Subscribe/Renew Journal


In this paper, an encryption technique is proposed based on the general idea that offers efficiency in uploading and downloading a file or data in an encrypted form between peers. The proposed method, introduces a theoretical come practical model that forecasts the act of the system and computes the values of the practical parameters that achieve a desired performance. The proposed method provides very strong security for cooperation and also improves the presentation of P2P networks considerably. In particular, theoretical and realistic models show that it reduces the query response time and file upload and download delays by organizing the magnitude, and doubles the system’s throughput.

Keywords

Encryption, P2P Networks, Throughput, Response Time.
User
Subscription Login to verify subscription
Notifications
Font Size

Abstract Views: 248

PDF Views: 3




  • A Study on Sharing Encrypted Information in P2P Network

Abstract Views: 248  |  PDF Views: 3

Authors

K. Swathi
Sri Ramakrishna College of Arts & Science for Women, Coimbatore-641044, India
G. Satyavathy
Sri Ramakrishna College of Arts & Science for Women, Coimbatore-641044, India

Abstract


In this paper, an encryption technique is proposed based on the general idea that offers efficiency in uploading and downloading a file or data in an encrypted form between peers. The proposed method, introduces a theoretical come practical model that forecasts the act of the system and computes the values of the practical parameters that achieve a desired performance. The proposed method provides very strong security for cooperation and also improves the presentation of P2P networks considerably. In particular, theoretical and realistic models show that it reduces the query response time and file upload and download delays by organizing the magnitude, and doubles the system’s throughput.

Keywords


Encryption, P2P Networks, Throughput, Response Time.