Evaluating a peer-to-peer storage system in presence of malicious peers.
Samira ChaouGil UtardFranck PommereauPublished in: HPCS (2011)
Keyphrases
- peer to peer
- overlay network
- peer to peer networks
- peer to peer systems
- distributed environment
- client server
- resource discovery
- data sharing
- load balancing
- distributed computing
- super peer
- fully distributed
- file sharing
- video streaming
- digital libraries
- grid computing
- content addressable
- detect malicious
- real time
- malicious behavior
- unstructured peer to peer systems
- query routing
- ad hoc networks
- information systems
- neural network