Research of Redundancy Group Data Protection Technologies Base on P2P

被引:0
|
作者
Hu, Zhongyi [1 ]
Gao, Yupeng [1 ]
机构
[1] Wenzhou Univ, Dept Informat Engn, Wenzhou Univ Town, Zhejiang, Peoples R China
关键词
P2P; Distributed; Data Protection; Redundancy Group;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
By using the way of P2P, a redundancy group data protection system distributed based P2P is proposed. The nodes involved in the system are grouped by redundancy protection of resources and the predicted network distance. The overlay network maintained by super nodes is formed, which implements effective management of nodes. Moreover, by using the mechanism of coordination server transfer and group dynamic adjustment, the efficiency and reliability of data storage in system is promoted. The performance of this data protection system is testified on the basis of simulation experiment.
引用
下载
收藏
页码:110 / 113
页数:4
相关论文
共 50 条
  • [31] Modifiable digital content protection in P2P
    Park, H
    Kim, J
    INFORMATION SECURITY, PROCEEDINGS, 2004, 3225 : 379 - 390
  • [32] Protection of digital content for P2P networks
    Department of Computer Science, Jinan University, Guangzhou 510632, China
    J. Inf. Comput. Sci., 2006, 4 (921-927):
  • [33] A Research about Redundant Data Packet in Unstructured P2P Network
    Liu, Yuhua
    Zhu, Longquan
    Gao, Jingju
    Cheng, Wenshan
    HPCC 2008: 10TH IEEE INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPUTING AND COMMUNICATIONS, PROCEEDINGS, 2008, : 653 - 658
  • [34] Research on maximum data transmitting rate of P2P streaming system
    Wu, Guo-Fu
    Dou, Qiang
    Wen, Jun
    Song, Lei
    Dou, Wen-Hua
    Tien Tzu Hsueh Pao/Acta Electronica Sinica, 2012, 40 (03): : 459 - 465
  • [35] Research on Design and its Key Technologies of Web Service Platform in P2P Environment
    Shi Jin-yu
    Zhang We-shi
    Jiang Jian-ping
    Zhang Xiu-guo
    2008 IFIP INTERNATIONAL CONFERENCE ON NETWORK AND PARALLEL COMPUTING, PROCEEDINGS, 2008, : 345 - 350
  • [36] The Research of Worms in P2P Networks
    Xie Chunyan
    Yin Zhiyu
    PROCEEDINGS OF THE 2009 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND NATURAL COMPUTING, VOL II, 2009, : 389 - 392
  • [37] Research on key technologies of P2P transaction in virtual power plant based on blockchain
    Li, Bin
    Yang, Fan
    Qi, Bing
    Bai, XueFeng
    Sun, Yi
    Chen, Songsong
    IET SMART GRID, 2022, 5 (04) : 223 - 233
  • [38] Research and Development of P2P Worms
    Li You and Zhi-Guang Qin the School of Computer Science and Engineering
    Journal of Electronic Science and Technology, 2011, 9 (03) : 202 - 210
  • [39] The Research of P2P Recognition Technology
    Ma, Haojian
    Tan, Shunhua
    He, Zhenfeng
    2014 5TH IEEE INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING AND SERVICE SCIENCE (ICSESS), 2014, : 601 - 604
  • [40] The research of P2P network security model based on group trust relationship
    Ming, Xue, 1600, Journal of Chemical and Pharmaceutical Research, 3/668 Malviya Nagar, Jaipur, Rajasthan, India (06):